🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2019-7011

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-7010

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-7009

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
🕴 A Hacker's Perspective on Securing VPNs As You Go Remote 🕴

As organizations rush to equip and secure their newly remote workforce, it's important to keep things methodical and purposeful

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2019-7008

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-6999

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-20635

codeBeamer before 9.5.0-RC3 does not properly restrict the ability to execute custom Java code and access the Java class loader via computed fields.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-14868

In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-13371

An external control of system vulnerability in FortiOS may allow an authenticated, regular user to change the routing settings of the device via connecting to the ZebOS component.

📖 Read

via "National Vulnerability Database".
🕴 5 Ways Enterprises Inadvertently Compromise Their Network Security 🕴

Is your organization carelessly leaving its networks vulnerable to invasion? Check out these five common oversights to see if your resources are at risk.

📖 Read

via "Dark Reading: ".
🕴 Prioritizing High-Risk Assets: A 4-Step Approach to Mitigating Insider Threats 🕴

Sound insider threat detection programs combine contextual data and a thorough knowledge of employee roles and behaviors to pinpoint the biggest risks.

📖 Read

via "Dark Reading: ".
🔏 Solar Panel Data Behind Latest Trade Secret Theft Case 🔏

A multimillion dollar solar installation firm is alleging one of its former employees took its data to start a competing firm just 11 miles away.

📖 Read

via "Subscriber Blog RSS Feed ".
🕴 Companies Are Failing to Deploy Key Solution for Email Security 🕴

A single -- albeit complex-to-deploy -- technology could stop the most expensive form of fraud, experts say. Why aren't more companies adopting it?

📖 Read

via "Dark Reading: ".
🔐 Microsoft to hospitals: 11 tips on how to combat ransomware 🔐

Hospitals are under cyberattack even as they struggle to combat the coronavirus. Microsoft is offering hospitals security tips to try to help.

📖 Read

via "Security on TechRepublic".
Google Squashes High-Severity Flaws in Chrome Browser

Google is rolling out the newest Chrome browser version, 80.0.3987.162, in the coming days.

📖 Read

via "Threatpost".
🕴 Bad Bots Build Presence Across the Web 🕴

Bots that mimic human behavior are driving a growing percentage of website traffic while contributing to an avalanche of misinformation.

📖 Read

via "Dark Reading: ".
🕴 A Day in The Life of a Pen Tester 🕴

Two penetration testers share their day-to-day responsibilities, challenges they encounter, and the skills they value most on the job.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2019-19348

An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/apb-base, affecting versions before the following 4.3.5, 4.2.21, 4.1.37, and 3.11.188-4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-19346

An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/mariadb-apb, affecting versions before the following 4.3.5, 4.2.21, 4.1.37, and 3.11.188-4 . An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-19097

ABB eSOMS versions 4.0 to 6.0.3 accept connections using medium strength ciphers. If a connection is enabled using such a cipher, an attacker might be able to eavesdrop and/or intercept the connection.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-19096

The Redis data structure component used in ABB eSOMS versions 6.0 to 6.0.2 stores credentials in clear text. If an attacker has file system access, this can potentially compromise the credentials' confidentiality.

📖 Read

via "National Vulnerability Database".