πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-18701

Certain NETGEAR devices are affected by reflected XSS. This affects R6700 before 1.0.1.36 and R6900 before 1.0.1.34.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18700

Certain NETGEAR devices are affected by stored XSS. This affects D6400 before 1.0.0.60, D7000 before 1.0.1.50, D8500 before 1.0.3.29, EX6200 before 1.0.3.84, EX7000 before 1.0.0.60, R6250 before 1.0.4.16, R6300v2 before 1.0.4.18, R6400 before 1.01.32, R6400v2 before 1.0.2.44, R6700 before 1.0.1.36, R6900 before 1.0.1.34, R6900P before 1.3.0.8, R7000 before 1.0.9.14, R7000P before 1.3.0.8, R7100LG before 1.0.0.34, R7300DST before 1.0.0.56, R7900 before 1.0.1.26, R8000 before 1.0.4.4, R8300 before 1.0.2.106, R8500 before 1.0.2.106, R9000 before 1.0.2.52, WNDR3400v3 before 1.0.1.16, WNR3500Lv2 before 1.2.0.46, and WNDR3700v5 before 1.1.0.48.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to protect your Nintendo account after the recent data breach πŸ”

A breach has impacted the accounts of some 160,000 Nintendo users. Here's what to do if you're one of them.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-18699

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R7800 before 1.0.2.40 and R9000 before 1.0.2.52.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18698

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6100 before 1.0.1.20, R7800 before 1.0.2.40, and R9000 before 1.0.2.52.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18697

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R7800 before 1.0.2.40 and R9000 before 1.0.2.52.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Find Your Framework: Thinking Fast and Slow πŸ•΄

Economist Daniel Kahneman's classic book has lessons for those in security, especially now.

πŸ“– Read

via "Dark Reading: ".
πŸ” Kapersky offers free cybersecurity training to assist teams working remotely πŸ”

Telecommuting comes with its own set of cybersecurity risks. Kaspersky has announced a free training module to help remote teams make more informed cybersecurity decisions.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybercrime Group Steals $1.3M from Banks πŸ•΄

A look at how the so-called Florentine Banker Group lurked for two months in a sophisticated business email compromise attack on Israeli and UK financial companies.

πŸ“– Read

via "Dark Reading: ".
πŸ” Adult dating site attacks targeted colleges with remote access trojan πŸ”

Aimed at students and faculty at colleges in the US, this phishing campaign tried to infect machines with the Hupigon remote access trojan, says security provider Proofpoint.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Apple Downplays Threat Posed by Newly Disclosed Zero-Days in iOS πŸ•΄

Bugs don't pose an immediate threat, and there is no evidence they were exploited, as ZecOps claimed earlier this week, Apple says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 4/24 πŸ”

267 million Facebook profiles found being sold on the dark web, the virtual NFL draft raises cybersecurity concerns, and email phishing campaigns target US healthcare providers - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Latest Apple Text-Bomb Crashes iPhones via Message Notifications ❌

Sindhi-language characters can crash iPhones and other iOS/macOS devices if a victim views texts, Twitter posts or messages within various apps containing them.

πŸ“– Read

via "Threatpost".
❌ SAS@home Virtual Summit Showcases New Threat Intel, Industry Changes ❌

The free online conference, scheduled for April 28-30, will feature top security researchers from across the industry.

πŸ“– Read

via "Threatpost".
❌ Single Malicious GIF Opened Microsoft Teams to Nasty Attack ❌

Now patched flaw allowed attacker to take over an organization’s entire roster of Microsoft Teams accounts.

πŸ“– Read

via "Threatpost".
⚠ Monday review – the hot 16 stories of the week ⚠

It's weekly roundup time!

πŸ“– Read

via "Naked Security".
⚠ Web shell warning issued by US and Australia ⚠

The US NSA and its Australian counterpart the ASD have published a set of guidelines to help companies avoid a common kind of attack: web shell exploits.

πŸ“– Read

via "Naked Security".
❌ Eight Common OT / Industrial Firewall Mistakes ❌

Firewalls are easy to misconfigure. While the security consequences of such errors may be acceptable for some firewalls, the accumulated risks of misconfigured firewalls in a defense-in-depth OT network architecture are generally unacceptable.

πŸ“– Read

via "Threatpost".
πŸ•΄ COVID-19 Quarantine: A Unique Learning Opportunity for Defenders πŸ•΄

Use these spare moments at home to master new skills that will help protect your organization and enhance your career.

πŸ“– Read

via "Dark Reading: ".
πŸ” Container security meets Kubernetes: What IT pros need to know πŸ”

Docker brought containers into the enterprise; static scanning makes sure they are secure when the images are created. Who watches them when they run?

πŸ“– Read

via "Security on TechRepublic".
πŸ›  URLCrazy Domain Name Typo Tool 0.7.1 πŸ› 

URLCrazy is a tool that can generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. It generates 15 types of domain variants, knows over 8000 common misspellings, supports multiple keyboard layouts, can check if a typo is a valid domain, tests if domain typos are in use, and estimates the popularity of a typo.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".