πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ France: Let’s make the internet safer! US: β€˜How about NO?!’ ⚠

Don't cry for us, Argentina: Critics saw potential for government meddling without court order, among other issues.

πŸ“– Read

via "Naked Security".
⚠ DARPA uses a remote island to stage a cyberattack on the US power grid ⚠

It enacted a worst-case, "black start" scenario: swaths of the country's grid offline for a month, battery backups exhausted.

πŸ“– Read

via "Naked Security".
⚠ Official Google Twitter account hacked in Bitcoin scam ⚠

The epidemic of Twitter-based Bitcoin scams took another twist this week as attackers tweeted scams directly from two verified high-profile accounts.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2015-9274

HarfBuzz before 1.0.4 allows remote attackers to cause a denial of service (invalid read of two bytes and application crash) because of GPOS and GSUB table mishandling, related to hb-ot-layout-gpos-table.hh, hb-ot-layout-gsub-table.hh, and hb-ot-layout-gsubgpos-private.hh.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Learn How to Better Protect your Network at Black Hat Europe πŸ•΄

Whether you're sussing out vulnerabilities or defending enterprise networks, Black Hat Europe's lineup of Briefings, Trainings, and Arsenal tools will help you take things to the next level.

πŸ“– Read

via "Dark Reading: ".
πŸ” Micro data centers are changing IT's role in the retail industry in unexpected ways πŸ”

As brick-and-mortar retailers use micro data centers to power unique customer experiences and compete with online giants like Amazon, they're ramping up IT to manage these mission-critical systems.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ From Reactive to Proactive: Security as the Bedrock of the SDLC πŸ•΄

Secure code development should be a priority, not an afterthought, and adopting the software development life cycle process is a great way to start.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cyber Monday shoppers will overlook past cybersecurity breaches for a good deal πŸ”

Some 62% of online shoppers are willing to shop sites vulnerable to breaches for a discount on Cyber Monday, a DomainTools report says.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The top 5 myths about cloud-based security πŸ”

Enterprises are turning to security in the cloud for greater flexibility and reduced complexity, but several misconceptions exist. Here's the truth, according to a Forcepoint report.

πŸ“– Read

via "Security on TechRepublic".
❌ Ahead of Black Friday, Rash of Malware Families Takes Aim at Holiday Shoppers ❌

As consumers skip the store crowds in favor of online deals, cyberattackers have geared up to victimize them.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ More Than 50% of Free Mobile VPN Apps Have Chinese Ties πŸ•΄

In addition, most have "unacceptable" privacy policies and "non-existent user support."

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Japan Cyber Minister Says He Has Never Used a Computer πŸ•΄

Yoshitaka Sakurada, who recently took on the role after a cabinet shuffling, says it's up to the government to deal with it.

πŸ“– Read

via "Dark Reading: ".
❌ Connected Wristwatch Allows Hackers to Stalk, Spy On Children ❌

"Our advice is to stop using this watch" as mitigations are not available, researchers told Threatpost.

πŸ“– Read

via "Threatpost | The first stop for security news".
ATENTIONβ€Ό New - CVE-2018-0687

Cross-site scripting vulnerability in Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0686

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) allows remote authenticated attackers to upload and execute any executable files via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0685

SQL injection vulnerability in the Denbun POP version V3.3P R4.0 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via HTTP requests for mail search.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0684

Buffer overflow in Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R3.0 and earlier, Denbun IMAP version V3.3I R3.0 and earlier) allows remote attackers to execute arbitrary code or cause a denial-of-service (DoS) condition via multipart/form-data format data.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0683

Buffer overflow in Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) allows remote attackers to execute arbitrary code or cause a denial-of-service (DoS) condition via Cookie data.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0682

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) does not properly manage sessions, which allows remote attackers to read/send mail or change the configuration via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0681

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) uses hard-coded credentials, which may allow remote attackers to login to the Management page and change the configuration.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0680

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) uses hard-coded credentials, which may allow remote attackers to read/send mail or change the configuration.

πŸ“– Read

via "National Vulnerability Database".