πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Don’t get locked out of your own website – update this WordPress plugin now! ⚠

In theory, crooks could mess up your site so vistors can't see your content, then lock you out so you can't jump in and fix it.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2019-7014

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-7013

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
❌ Zoom Removes Data-Mining LinkedIn Feature ❌

The feature, criticized for "undisclosed data-mining," is only the latest privacy faux pas for Zoom this month.

πŸ“– Read

via "Threatpost".
πŸ•΄ Name That Toon: The Devil You Know? πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
πŸ” Survey: 37% of workers unaware of ransomware, putting businesses at risk πŸ”

Almost 40% of employees surveyed admitted to not knowing what ransomware is, and many of them have already been victims, according to security provider Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-7012

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-7011

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-7010

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-7009

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ A Hacker's Perspective on Securing VPNs As You Go Remote πŸ•΄

As organizations rush to equip and secure their newly remote workforce, it's important to keep things methodical and purposeful

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-7008

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-6999

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20635

codeBeamer before 9.5.0-RC3 does not properly restrict the ability to execute custom Java code and access the Java class loader via computed fields.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-14868

In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-13371

An external control of system vulnerability in FortiOS may allow an authenticated, regular user to change the routing settings of the device via connecting to the ZebOS component.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 5 Ways Enterprises Inadvertently Compromise Their Network Security πŸ•΄

Is your organization carelessly leaving its networks vulnerable to invasion? Check out these five common oversights to see if your resources are at risk.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Prioritizing High-Risk Assets: A 4-Step Approach to Mitigating Insider Threats πŸ•΄

Sound insider threat detection programs combine contextual data and a thorough knowledge of employee roles and behaviors to pinpoint the biggest risks.

πŸ“– Read

via "Dark Reading: ".
πŸ” Solar Panel Data Behind Latest Trade Secret Theft Case πŸ”

A multimillion dollar solar installation firm is alleging one of its former employees took its data to start a competing firm just 11 miles away.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Companies Are Failing to Deploy Key Solution for Email Security πŸ•΄

A single -- albeit complex-to-deploy -- technology could stop the most expensive form of fraud, experts say. Why aren't more companies adopting it?

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft to hospitals: 11 tips on how to combat ransomware πŸ”

Hospitals are under cyberattack even as they struggle to combat the coronavirus. Microsoft is offering hospitals security tips to try to help.

πŸ“– Read

via "Security on TechRepublic".