πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-13060

Easy!Appointments 1.3.0 has a Guessable CAPTCHA issue.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-10125

Contao before 4.5.7 has XSS in the system log.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Fewer Vulnerabilities in Web Frameworks, but Exploits Remain Steady πŸ•΄

Attackers continue to focus on web and application frameworks, such as Apache Struts and WordPress, fighting against a decline in vulnerabilities, according to an analysis.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Hellman & Friedman Acquires Checkmarx for $1.5B πŸ•΄

The private equity firm will buy Checkmarx from Insight Partners, which will continue to own a minority interest.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable 2FA on a per-user basis in Nextcloud πŸ”

If you want to enable two-factor authentication for Nextcloud on a per-user basis, it's just a simple app installation away.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable 2FA on a per-user basis in Nextcloud πŸ”

If you want to enable two-factor authentication for Nextcloud on a per-user basis, it's just a simple app installation away.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Edge Shares Privacy-Busting Telemetry, Research Alleges ❌

An academic study found Microsoft's Edge browser to be the least private, due to it sending device identifiers and web browsing pages to back-end servers.

πŸ“– Read

via "Threatpost".
πŸ” 88% of IT pros say world is in permanent state of cyberwar πŸ”

A Venafi study looked into what digital infrastructure will suffer from cyberattacks, which are most vulnerable, and what it means.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Case Almost Closed: Motorola Wins Multimillion Dollar Trade Secret Case πŸ”

A jury ruled the telecom is owed upwards to $420 million in damages after a Chinese company was caught stealing its trade secrets for radios.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Five Indicted on Romance and Lottery Fraud Charges πŸ•΄

Fraudsters allegedly targeted elderly victims, ultimately wringing more than $4 million from their bank accounts.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-11073

A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-19325

tcpdump 4.9.2 (and probably lower versions) is prone to a heap-based buffer over-read in the EXTRACT_32BITS function (extract.h, called from the rx_cache_find function, print-rx.c) due to improper serviceId sanitization.

πŸ“– Read

via "National Vulnerability Database".
❌ Convincing Google Impersonation Opens Door to MiTM, Phishing ❌

Using homographic characters is an easy way to execute a convincing fake site.

πŸ“– Read

via "Threatpost".
πŸ•΄ Privacy in a Pandemic: What You Can (and Can't) Ask Employees πŸ•΄

Businesses struggle to strike a balance between workplace health and employees' privacy rights in the midst of a global health emergency.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-12842

Bitcoin Core before 0.14 allows an attacker to create an ostensibly valid SPV proof for a payment to a victim who uses an SPV wallet, even if that payment did not actually occur. Completing the attack would cost more than a million dollars, and is relevant mainly only in situations where an autonomous system relies solely on an SPV proof for transactions of a greater dollar amount.

πŸ“– Read

via "National Vulnerability Database".
⚠ Europol busts up two SIM-swapping hacking rings ⚠

What a nightmare: your phone goes dead, and you can't log into your bank account because it's controlled by a hacker who's draining you dry.

πŸ“– Read

via "Naked Security".
❌ Activities of a Nigerian Cybercriminal Uncovered ❌

Rise and fall of a Nigerian cybercriminal called β€˜Dton,’ who made hundreds of thousands of dollars in a 7-year campaign, outlined in new report.

πŸ“– Read

via "Threatpost".
⚠ WordPress to get automatic updates for plugins and themes ⚠

Good news for website admins: the ability to automatically update plugins and themes is being beta-tested for WordPress 5.5, due in August.

πŸ“– Read

via "Naked Security".
⚠ Tor browser fixes bug that allows JavaScript to run when disabled ⚠

The Tor browser has a bug that could allow JavaScript to execute on websites even when users think they’ve disabled it for maximum anonymity.

πŸ“– Read

via "Naked Security".
⚠ Slack fixes account-stealing bug ⚠

Slack has fixed a bug that allowed attackers to hijack user accounts by tampering with their HTTP sessions.

πŸ“– Read

via "Naked Security".
πŸ•΄ Many Ransomware Attacks Can be Stopped Before They Begin πŸ•΄

The tendency by many attackers to wait for the right time to strike gives defenders an opening, FireEye says.

πŸ“– Read

via "Dark Reading: ".