🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🔐 Micro data centers are changing IT's role in the retail industry in unexpected ways 🔐

As brick-and-mortar retailers use micro data centers to power unique customer experiences and compete with online giants like Amazon, they're ramping up IT to manage these mission-critical systems.

📖 Read

via "Security on TechRepublic".
🕴 From Reactive to Proactive: Security as the Bedrock of the SDLC 🕴

Secure code development should be a priority, not an afterthought, and adopting the software development life cycle process is a great way to start.

📖 Read

via "Dark Reading: ".
🔐 Cyber Monday shoppers will overlook past cybersecurity breaches for a good deal 🔐

Some 62% of online shoppers are willing to shop sites vulnerable to breaches for a discount on Cyber Monday, a DomainTools report says.

📖 Read

via "Security on TechRepublic".
🔐 The top 5 myths about cloud-based security 🔐

Enterprises are turning to security in the cloud for greater flexibility and reduced complexity, but several misconceptions exist. Here's the truth, according to a Forcepoint report.

📖 Read

via "Security on TechRepublic".
Ahead of Black Friday, Rash of Malware Families Takes Aim at Holiday Shoppers

As consumers skip the store crowds in favor of online deals, cyberattackers have geared up to victimize them.

📖 Read

via "Threatpost | The first stop for security news".
🕴 More Than 50% of Free Mobile VPN Apps Have Chinese Ties 🕴

In addition, most have "unacceptable" privacy policies and "non-existent user support."

📖 Read

via "Dark Reading: ".
🕴 Japan Cyber Minister Says He Has Never Used a Computer 🕴

Yoshitaka Sakurada, who recently took on the role after a cabinet shuffling, says it's up to the government to deal with it.

📖 Read

via "Dark Reading: ".
Connected Wristwatch Allows Hackers to Stalk, Spy On Children

"Our advice is to stop using this watch" as mitigations are not available, researchers told Threatpost.

📖 Read

via "Threatpost | The first stop for security news".
ATENTION New - CVE-2018-0687

Cross-site scripting vulnerability in Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0686

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) allows remote authenticated attackers to upload and execute any executable files via unspecified vectors.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0685

SQL injection vulnerability in the Denbun POP version V3.3P R4.0 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via HTTP requests for mail search.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0684

Buffer overflow in Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R3.0 and earlier, Denbun IMAP version V3.3I R3.0 and earlier) allows remote attackers to execute arbitrary code or cause a denial-of-service (DoS) condition via multipart/form-data format data.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0683

Buffer overflow in Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) allows remote attackers to execute arbitrary code or cause a denial-of-service (DoS) condition via Cookie data.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0682

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) does not properly manage sessions, which allows remote attackers to read/send mail or change the configuration via unspecified vectors.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0681

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) uses hard-coded credentials, which may allow remote attackers to login to the Management page and change the configuration.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0680

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) uses hard-coded credentials, which may allow remote attackers to read/send mail or change the configuration.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0679

Cross-site scripting vulnerability in multiple FXC Inc. network devices (Managed Ethernet switch FXC5210/5218/5224 firmware prior to version Ver1.00.22, Managed Ethernet switch FXC5426F firmware prior to version Ver1.00.06, Managed Ethernet switch FXC5428 firmware prior to version Ver1.00.07, Power over Ethernet (PoE) switch FXC5210PE/5218PE/5224PE firmware prior to version Ver1.00.14, and Wireless LAN router AE1021/AE1021PE firmware all versions) allows attacker with administrator rights to inject arbitrary web script or HTML via the administrative page.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-0673

Directory traversal vulnerability in Cybozu Garoon 3.5.0 to 4.6.3 allows authenticated attackers to read arbitrary files via unspecified vectors.

📖 Read

via "National Vulnerability Database".
Managing the Risk of IT-OT Convergence

Why manufacturing and logistics are especially challenged.

📖 Read

via "Threatpost | The first stop for security news".
Thought you deleted your iPhone photos? Hackers find a way to get them back

The hacking duo @fluoroacetate demonstrated zero-day exploits against phones from Apple, Samsung and Xiaomi at the recent Pwn2Own contest.

📖 Read

via "Naked Security".
🕴 Cyber Crooks Diversify Business with Multi-Intent Malware 🕴

The makers of malware have realized that if they're going to invest time and money in compromising cyber defenses, they should do everything they can to monetize their achievement.

📖 Read

via "Dark Reading: ".