🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🔐 Why Microsoft's Office 365 has become an all-access pass for phishers to exploit 🔐

Cybercriminals are tapping into the widespread use of Office 365 to spread malware in an attempt to steal account credentials, according to email security provider Vade Secure.

📖 Read

via "Security on TechRepublic".
🔐 How to enable 2FA for groups in Nextcloud 🔐

Nextcloud allows you to enforce groups to use two-factor authentication. Let's find out how to create a group and then add them to 2FA enforcement.

📖 Read

via "Security on TechRepublic".
🕴 Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely 🕴

The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2015-8536

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow cross-site request forgery.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2015-8535

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A directory traversal vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow a user to execute arbitrary code with elevated privileges.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2015-8534

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow a user to execute arbitrary code with elevated privileges.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2015-7336

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior that could allow the signature check of an update to be bypassed.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2015-7335

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A race condition was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior that could allow a user to execute arbitrary code with elevated privileges.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2015-7334

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type COMMAND type could allow a user to execute arbitrary code with elevated privileges.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2015-7333

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type INF and INF_BY_COMPATIBLE_ID command types could allow a user to execute arbitrary code with elevated privileges.

📖 Read

via "National Vulnerability Database".
🔏 Friday Five 3/27 🔏

Cybercrime groups capitalize on pandemic anxiety, Norwegian Cruise Line suffers data breach, and more - catch up on all the week's news with the Friday Five.

📖 Read

via "Subscriber Blog RSS Feed ".
🕴 The Wild, Wild West(world) of Cybersecurity 🕴

Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2015-5684

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A buffer overflow vulnerability was reported, (fixed and publicly disclosed in 2015) in the Lenovo Service Engine (LSE), affecting various versions of BIOS for Lenovo Notebooks, that could allow a remote user to execute arbitrary code on the system.

📖 Read

via "National Vulnerability Database".
🔐 Cybercriminals attack KEEN shoe drive for people affected by coronavirus pandemic 🔐

KEEN is providing shoes to people most impacted by the COVID-19 pandemic, but their website was bombarded by malicious bots.

📖 Read

via "Security on TechRepublic".
🕴 Virgin Media Could Pay GB pound 4.5B for Leak Affecting 900,000 Customers 🕴

A misconfigured database holding personal data was left available online between April 2019 and February 2020.

📖 Read

via "Dark Reading: ".
🔐 How to listen to port traffic on a Linux server 🔐

Every network administrator needs to know how to listen to port traffic on a server. Here's one way to do it on Linux.

📖 Read

via "Security on TechRepublic".
🕴 Malicious USB Drive Hides Behind Gift Card Lure 🕴

Victims are being enticed to insert an unknown USB drive into their computers.

📖 Read

via "Dark Reading: ".
🔐 How to create a Kubernetes security policy 🔐

If you're looking to take your Kubernetes security to the next level, you'll want to start working with pod security policies. Here's a quick introduction to this feature.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2020-10823

A stack-based buffer overflow in /cgi-bin/activate.cgi through var parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 1 of 3).

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-10817

The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.

📖 Read

via "National Vulnerability Database".