πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 7 Ways Parents Can Better Protect Their Online-Gamer Offspring πŸ•΄

It's 11 a.m. Are your kids locked in their rooms playing games online?

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft: We'll give you $100,000 if you can hack our Azure Sphere IoT platform πŸ”

Microsoft is offering researchers $100,000 if they can crack the company's custom-built Linux OS for Internet of Things devices.

πŸ“– Read

via "Security on TechRepublic".
❌ Hackers Dumpster Dive for Taxpayer Data in COVID-19 Relief Money Scams ❌

Threat actors are buying and selling taxpayer data on hacker forums as well as using phishing and other campaigns to steal various U.S. government payouts.

πŸ“– Read

via "Threatpost".
πŸ•΄ Pandemic Could Accelerate Passwordless Authentication πŸ•΄

As we celebrate another World Password Day, security pros are hopeful that when we move out of the stay-at-home period, companies will continue to focus on digital technologies - and ditching passwords.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybersecurity Home School: Garfield Teaches Security πŸ•΄

The famous cartoon cat can help kids ages 6 to 11 learn to be more secure when they're online.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep38: Crashing iPhones, ransomware tales and human chatbots – Naked Security Podcast ⚠

Get the latest cybersecurity news, opinion and advice.

πŸ“– Read

via "Naked Security".
πŸ•΄ Threat-Modeling Basics Using MITRE ATT&CK πŸ•΄

When risk managers consider the role ATT&CK plays in the classic risk equation, they have to understand the role of threat modeling in building a complete risk scenario.

πŸ“– Read

via "Dark Reading: ".
πŸ” Credit card skimmer caught hiding behind website favicon πŸ”

A website seemingly offering images and icons for download is actually a cover-up for a credit card skimming operation, says Malwarebytes.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to combat cyberattacks that exploit Microsoft's Remote Desktop Protocol πŸ”

Hackers who gain access to a remote system can launch malware, spread spam, and perform identity theft, according to McAfee.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-18868

Blaauw Remote Kiln Control through v3.00r4 allows an unauthenticated attacker to access MySQL credentials in cleartext in /engine/db.inc, /lang/nl.bak, or /lang/en.bak.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18867

Browsable directories in Blaauw Remote Kiln Control through v3.00r4 allow an attacker to enumerate sensitive filenames and locations, including source code. This affects /ajax/, /common/, /engine/, /flash/, /images/, /Images/, /jscripts/, /lang/, /layout/, /programs/, and /sms/.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18865

Information disclosure via error message discrepancies in authentication functions in Blaauw Remote Kiln Control through v3.00r4 allows an unauthenticated attacker to enumerate valid usernames.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-5493

ATTO FibreBridge 7500N firmware versions prior to 2.90 are susceptible to a vulnerability which allows an unauthenticated remote attacker to cause Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
⚠ Vcrypt ransomware holds your files hostage without encrypting them ⚠

Here's a ransomware story with a bit of a difference. Some of your files get wiped out, but others can be recovered without paying.

πŸ“– Read

via "Naked Security".
πŸ” World Password Day: We're moving toward a passwordless infrastructure πŸ”

As we celebrate World Password Day, companies of all sizes are looking to password alternatives including YubiKeys, Google Titan keys, and biometrics. A Gartner analyst weighs in.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 13% of SMBs have already experienced a cyberattack since the COVID-19 pandemic began πŸ”

More than one in five also acknowledge transitioning to remote work without a policy, according to an Alliant Cybersecurity report.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-18872

Weak password requirements in Blaauw Remote Kiln Control through v3.00r4 allow a user to set short or guessable passwords (e.g., 1 or 1234).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18871

A path traversal in debug.php accessed via default.php in Blaauw Remote Kiln Control through v3.00r4 allows an authenticated attacker to upload arbitrary files, leading to arbitrary remote code execution.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18870

A path traversal via the iniFile parameter in excel.php in Blaauw Remote Kiln Control through v3.00r4 allows an authenticated attacker to download arbitrary files from the host machine.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18869

Leftover Debug Code in Blaauw Remote Kiln Control through v3.00r4 allows a user to execute arbitrary php code via /default.php?idx=17.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18866

Unauthenticated SQL injection via the username in the login mechanism in Blaauw Remote Kiln Control through v3.00r4 allows a user to extract arbitrary data from the rkc database.

πŸ“– Read

via "National Vulnerability Database".