🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2019-7014

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-7013

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
Zoom Removes Data-Mining LinkedIn Feature

The feature, criticized for "undisclosed data-mining," is only the latest privacy faux pas for Zoom this month.

📖 Read

via "Threatpost".
🕴 Name That Toon: The Devil You Know? 🕴

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

📖 Read

via "Dark Reading: ".
🔐 Survey: 37% of workers unaware of ransomware, putting businesses at risk 🔐

Almost 40% of employees surveyed admitted to not knowing what ransomware is, and many of them have already been victims, according to security provider Kaspersky.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2019-7012

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-7011

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-7010

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-7009

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
🕴 A Hacker's Perspective on Securing VPNs As You Go Remote 🕴

As organizations rush to equip and secure their newly remote workforce, it's important to keep things methodical and purposeful

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2019-7008

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-6999

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-20635

codeBeamer before 9.5.0-RC3 does not properly restrict the ability to execute custom Java code and access the Java class loader via computed fields.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-14868

In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-13371

An external control of system vulnerability in FortiOS may allow an authenticated, regular user to change the routing settings of the device via connecting to the ZebOS component.

📖 Read

via "National Vulnerability Database".
🕴 5 Ways Enterprises Inadvertently Compromise Their Network Security 🕴

Is your organization carelessly leaving its networks vulnerable to invasion? Check out these five common oversights to see if your resources are at risk.

📖 Read

via "Dark Reading: ".
🕴 Prioritizing High-Risk Assets: A 4-Step Approach to Mitigating Insider Threats 🕴

Sound insider threat detection programs combine contextual data and a thorough knowledge of employee roles and behaviors to pinpoint the biggest risks.

📖 Read

via "Dark Reading: ".
🔏 Solar Panel Data Behind Latest Trade Secret Theft Case 🔏

A multimillion dollar solar installation firm is alleging one of its former employees took its data to start a competing firm just 11 miles away.

📖 Read

via "Subscriber Blog RSS Feed ".
🕴 Companies Are Failing to Deploy Key Solution for Email Security 🕴

A single -- albeit complex-to-deploy -- technology could stop the most expensive form of fraud, experts say. Why aren't more companies adopting it?

📖 Read

via "Dark Reading: ".
🔐 Microsoft to hospitals: 11 tips on how to combat ransomware 🔐

Hospitals are under cyberattack even as they struggle to combat the coronavirus. Microsoft is offering hospitals security tips to try to help.

📖 Read

via "Security on TechRepublic".
Google Squashes High-Severity Flaws in Chrome Browser

Google is rolling out the newest Chrome browser version, 80.0.3987.162, in the coming days.

📖 Read

via "Threatpost".