πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2015-7342

JNews Joomla Component before 8.5.0 allows SQL injection via upload thumbnail, Queue Search Field, Subscribers Search Field, or Newsletters Search Field.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cyber Resiliency, Cloud & the Evolving Role of the Firewall πŸ•΄

Today's defenses must be creative in both isolating threats and segmenting environments to prevent attacks. Here's why.

πŸ“– Read

via "Dark Reading: ".
πŸ” Federal Employees Worked to Defraud Govt Through Stolen Data πŸ”

A one-time inspector general at the Department of Homeland Security was indicted on Friday on charges he conspired to steal the U.S. government's proprietary software and databases.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2015-7341

JNews Joomla Component before 8.5.0 allows arbitrary File Upload via Subscribers or Templates, as demonstrated by the .php5 extension.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-7340

JEvents Joomla Component before 3.4.0 RC6 has SQL Injection via evid in a Manage Events action.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-7339

JCE Joomla Component 2.5.0 to 2.5.2 allows arbitrary file upload via a .php file extension for an image file to the /com_jce/editor/libraries/classes/browser.php script.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-7338

SQL Injection exists in AcyMailing Joomla Component before 4.9.5 via exportgeolocorder in a geolocation_longitude request to index.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-1634

SQL Injection exists in Advanced Newsletter Magento extension before 2.3.5 via the /store/advancednewsletter/index/subscribeajax/an_category_id/ PATH_INFO.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-1487

Lexmark Markvision Enterprise before 2.3.0 misuses the Apache Commons Collections Library, leading to remote code execution because of Java deserialization.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4538

Lexmark X, W, T, E, and C devices before 2012-02-09 allow attackers to obtain sensitive information by reading passwords within exported settings.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3269

Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Microsoft Disabled Legacy Authentication Across the Company πŸ•΄

The process was not smooth or straightforward, employees say in a discussion of challenges and lessons learned during the multi-year project.

πŸ“– Read

via "Dark Reading: ".
❌ Spear-Phishing Attack Lures Victims With β€˜HIV Results’ ❌

Attackers are purporting to send victims HIV test results - but in reality are convincing them to download the Koadic RAT.

πŸ“– Read

via "Threatpost".
⚠ Phone carriers may soon be forced to adopt anti-robocall tech ⚠

US carriers haven't been doing enough to block robocalls voluntarily. The Federal Communications Commission's response? Fine - we'll make you.

πŸ“– Read

via "Naked Security".
πŸ•΄ Keys to Hiring Cybersecurity Pros When Certification Can't Help πŸ•΄

There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.

πŸ“– Read

via "Dark Reading: ".
⚠ Ex-Inspector General indicted for stealing data on 250k govt colleagues ⚠

Crime doesn't pay, even if you have the audacity to try to sell your employer its own, free software and personal data on your own colleagues.

πŸ“– Read

via "Naked Security".
⚠ Google data puts innocent man at the scene of a crime ⚠

The man became a suspect because location data from his Android phone was swept up in a surveillance dragnet called a geofence warrant.

πŸ“– Read

via "Naked Security".
❌ Variant of Paradise Ransomware Targets Office IQY Files ❌

Threat actors can easily infiltrate networks because attacks evade detection by typical security protections.

πŸ“– Read

via "Threatpost".
⚠ Watch out for Office 365 and G Suite scams, FBI warns businesses ⚠

The FBI has warned users of Microsoft Office 365 and Google G Suite hosted email about Business Email Compromise (BEC) scams.

πŸ“– Read

via "Naked Security".
πŸ•΄ Over 80% of Medical Imaging Devices Run on Outdated Operating Systems πŸ•΄

New data on live Internet of Things devices in healthcare and other organizations shines a light on security risks.

πŸ“– Read

via "Dark Reading: ".