πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2016-1487

Lexmark Markvision Enterprise before 2.3.0 misuses the Apache Commons Collections Library, leading to remote code execution because of Java deserialization.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4538

Lexmark X, W, T, E, and C devices before 2012-02-09 allow attackers to obtain sensitive information by reading passwords within exported settings.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3269

Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Microsoft Disabled Legacy Authentication Across the Company πŸ•΄

The process was not smooth or straightforward, employees say in a discussion of challenges and lessons learned during the multi-year project.

πŸ“– Read

via "Dark Reading: ".
❌ Spear-Phishing Attack Lures Victims With β€˜HIV Results’ ❌

Attackers are purporting to send victims HIV test results - but in reality are convincing them to download the Koadic RAT.

πŸ“– Read

via "Threatpost".
⚠ Phone carriers may soon be forced to adopt anti-robocall tech ⚠

US carriers haven't been doing enough to block robocalls voluntarily. The Federal Communications Commission's response? Fine - we'll make you.

πŸ“– Read

via "Naked Security".
πŸ•΄ Keys to Hiring Cybersecurity Pros When Certification Can't Help πŸ•΄

There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.

πŸ“– Read

via "Dark Reading: ".
⚠ Ex-Inspector General indicted for stealing data on 250k govt colleagues ⚠

Crime doesn't pay, even if you have the audacity to try to sell your employer its own, free software and personal data on your own colleagues.

πŸ“– Read

via "Naked Security".
⚠ Google data puts innocent man at the scene of a crime ⚠

The man became a suspect because location data from his Android phone was swept up in a surveillance dragnet called a geofence warrant.

πŸ“– Read

via "Naked Security".
❌ Variant of Paradise Ransomware Targets Office IQY Files ❌

Threat actors can easily infiltrate networks because attacks evade detection by typical security protections.

πŸ“– Read

via "Threatpost".
⚠ Watch out for Office 365 and G Suite scams, FBI warns businesses ⚠

The FBI has warned users of Microsoft Office 365 and Google G Suite hosted email about Business Email Compromise (BEC) scams.

πŸ“– Read

via "Naked Security".
πŸ•΄ Over 80% of Medical Imaging Devices Run on Outdated Operating Systems πŸ•΄

New data on live Internet of Things devices in healthcare and other organizations shines a light on security risks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How Network Metadata Can Transform Compromise Assessment πŸ•΄

Listen more closely and your network's metadata will surrender insights the bad guys counted on keeping secret

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-10065

An issue was discovered in Open Ticket Request System (OTRS) 7.0 through 7.0.6. An attacker who is logged into OTRS as a customer user can use the search result screens to disclose information from internal FAQ articles, a different vulnerability than CVE-2019-9753.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-18894

Certain older Lexmark devices (C, M, X, and 6500e before 2018-12-18) contain a directory traversal vulnerability in the embedded web server.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14502

controllers/quizzes.php in the Kiboko Chained Quiz plugin before 1.0.9 for WordPress allows remote unauthenticated users to execute arbitrary SQL commands via the 'answer' and 'answers' parameters.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Intel's data center CPUs vulnerability could lead to "devastating" attacks πŸ”

Security researchers found vulnerabilities that can affect multi-tenant environments such as public clouds or shared enterprise workloads.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ What Should I Do About Vulnerabilities Without Fixes? πŸ•΄

With better tools that identify potential threats even before developers address them, a new problem has arisen.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-10992

In HPE Storage Essentials 9.5.0.142, there is Unauthenticated Java Deserialization with remote code execution via OS commands in a request to invoker/JMXInvokerServlet, aka PSRT110461.

πŸ“– Read

via "National Vulnerability Database".
πŸ” HHS Finalizes New Health Data Rules To Improve Data Governance πŸ”

The U.S. Department of Health and Human Services finalized two new rules designed to give patients better control over their data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".