ATENTIONβΌ New - CVE-2012-0953
π Read
via "National Vulnerability Database".
A race condition was discovered in the Linux drivers for Nvidia graphics which allowed an attacker to exfiltrate kernel memory to userspace. This issue was fixed in version 295.53.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-0952
π Read
via "National Vulnerability Database".
A heap buffer overflow was discovered in the device control ioctl in the Linux driver for Nvidia graphics cards, which may allow an attacker to overflow 49 bytes. This issue was fixed in version 295.53.π Read
via "National Vulnerability Database".
β More crypto-stealing Chrome extensions swatted by Google β
π Read
via "Naked Security".
Google deleted more malicious extensions from the Chrome Web Store after they were found to be phishing cryptocurrency users.π Read
via "Naked Security".
Naked Security
More crypto-stealing Chrome extensions swatted by Google
Google deleted more malicious extensions from the Chrome Web Store after they were found to be phishing cryptocurrency users.
β Vote for Naked Security in the European Blogger Awards 2020! β
π Read
via "Naked Security".
If you enjoy what you read, hear and see from the Naked Security team, please vote for us - it means a lot!π Read
via "Naked Security".
Naked Security
Vote for Naked Security in the European Blogger Awards 2020!
If you enjoy what you read, hear and see from the Naked Security team, please vote for us β it means a lot!
β Podcast: Shifting Cloud Security Left With Infrastructure-as-Code β
π Read
via "Threatpost".
Companies are looking to "shift left" with Infrastructure-as-Code (IaC) security capabilities to boost improve developer productivity, avoid misconfigurations and prevent policy violations.π Read
via "Threatpost".
Threat Post
Podcast: Shifting Cloud Security Left With Infrastructure-as-Code
Companies are looking to "shift left" with Infrastructure-as-Code (IaC) security capabilities to improve developer productivity, avoid misconfigurations and prevent policy violations.
π΄ Why DevSecOps Is Critical for Containers and Kubernetes π΄
π Read
via "Dark Reading: ".
DevSecOps is a big and sometimes difficult shift for organizations. The key to success? Take small steps.π Read
via "Dark Reading: ".
Dark Reading
Why DevSecOps Is Critical for Containers and Kubernetes
DevSecOps is a big and sometimes difficult shift for organizations. The key to success? Take small steps.
π΄ Cyber Subterfuge and Curious Sharks Threaten the World's Subsea Fiber-Optic Cables π΄
π Read
via "Dark Reading: ".
Malware, spies, and hackers, plus erosion and sharks, pose huge risks to the fiber optics that transmit almost all the world's data.π Read
via "Dark Reading: ".
Dark Reading
Cyber Subterfuge and Curious Sharks Threaten the World's Subsea Fiber-Optic Cables
Malware, spies, and hackers, plus erosion and sharks, pose huge risks to the fiber optics that transmit almost all the world's data.
β Report: Microsoftβs GitHub Account Gets Hacked β
π Read
via "Threatpost".
The Shiny Hunters hacking group said it stole 500 GB of data from the tech giantβs repositories on the developer platform, which it owns.π Read
via "Threatpost".
Threat Post
Report: Microsoftβs GitHub Account Gets Hacked
The Shiny Hunters hacking group said it stole 500 GB of data from the tech giantβs repositories on the developer platform, which it owns.
β Hackers Breach 3.5 Million MobiFriends Dating App Credentials β
π Read
via "Threatpost".
The emails, hashed passwords and usernames of 3.5 million users of the dating app MobiFriends were put up for sale on an underground forum.π Read
via "Threatpost".
Threat Post
Hackers Breach 3.5 Million MobiFriends Dating App Credentials
The emails, hashed passwords and usernames of 3.5 million users of the dating app MobiFriends were put up for sale on an underground forum.
ATENTIONβΌ New - CVE-2019-14898
π Read
via "National Vulnerability Database".
The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.π Read
via "National Vulnerability Database".
π΄ DocuSign Phishing Campaign Uses COVID-19 as Bait π΄
π Read
via "Dark Reading: ".
The newly discovered campaign lures victims with a supposed file concerning the coronavirus pandemic.π Read
via "Dark Reading: ".
Dark Reading
DocuSign Phishing Campaign Uses COVID-19 as Bait
The newly discovered campaign lures victims with a supposed file concerning the coronavirus pandemic.
π Friday Five: 5/8 π
π Read
via "Subscriber Blog RSS Feed ".
Nintendo suffers a server breach, a new phishing campaign targets the financial industry, and more - catch up on the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 5/8
Nintendo suffers a server breach, a new phishing campaign targets the financial industry, and more - catch up on the week's news with the Friday Five.
π΄ As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints π΄
π Read
via "Dark Reading: ".
A majority of firms expect to keep more employees working remotely post-pandemic, forcing businesses to undertake more comprehensive digital and cloud transformations.π Read
via "Dark Reading: ".
Dark Reading
As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints
A majority of firms expect to keep more employees working remotely post-pandemic, forcing businesses to undertake more comprehensive digital and cloud transformations.
π 4 ways to make sure your IoT sensors are secure π
π Read
via "Security on TechRepublic".
With so many IoT devices in use today, security is a major issue. Here are some steps to make sure your data is safe.π Read
via "Security on TechRepublic".
TechRepublic
4 ways to make sure your IoT sensors are secure
With so many IoT devices in use today, security is a major issue. Here are some steps to make sure your data is safe.
ATENTIONβΌ New - CVE-2019-10170
π Read
via "National Vulnerability Database".
A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10169
π Read
via "National Vulnerability Database".
A flaw was found in KeycloakΓ’β¬β’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running application.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-5491
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-5480
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-15514
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-13657
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-13656
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".