πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-0681

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) uses hard-coded credentials, which may allow remote attackers to login to the Management page and change the configuration.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0680

Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) uses hard-coded credentials, which may allow remote attackers to read/send mail or change the configuration.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0679

Cross-site scripting vulnerability in multiple FXC Inc. network devices (Managed Ethernet switch FXC5210/5218/5224 firmware prior to version Ver1.00.22, Managed Ethernet switch FXC5426F firmware prior to version Ver1.00.06, Managed Ethernet switch FXC5428 firmware prior to version Ver1.00.07, Power over Ethernet (PoE) switch FXC5210PE/5218PE/5224PE firmware prior to version Ver1.00.14, and Wireless LAN router AE1021/AE1021PE firmware all versions) allows attacker with administrator rights to inject arbitrary web script or HTML via the administrative page.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0673

Directory traversal vulnerability in Cybozu Garoon 3.5.0 to 4.6.3 allows authenticated attackers to read arbitrary files via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
❌ Managing the Risk of IT-OT Convergence ❌

Why manufacturing and logistics are especially challenged.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Thought you deleted your iPhone photos? Hackers find a way to get them back ⚠

The hacking duo @fluoroacetate demonstrated zero-day exploits against phones from Apple, Samsung and Xiaomi at the recent Pwn2Own contest.

πŸ“– Read

via "Naked Security".
πŸ•΄ Cyber Crooks Diversify Business with Multi-Intent Malware πŸ•΄

The makers of malware have realized that if they're going to invest time and money in compromising cyber defenses, they should do everything they can to monetize their achievement.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cloud, China, Generic Malware Top Security Concerns for 2019 πŸ•΄

FireEye researchers unveil an extensive list of security risks waiting in the new year's wings.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Congress Passes Bill for New Federal Cybersecurity Agency πŸ•΄

Cybersecurity and Infrastructure Security Agency Act now headed to President Trump for signing into law.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Congress Passes Bill to Create New Federal Cybersecurity Agency πŸ•΄

Cybersecurity and Infrastructure Security Agency Act now headed to President Trump for signing into law.

πŸ“– Read

via "Dark Reading: ".
❌ tRat Emerges as New Pet for APT Group TA505 ❌

The modular malware seems to be in a testing phase, but TA505's interest made researchers take note.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge πŸ•΄

Building cybersecurity skills is a must; paying a lot for the education is optional. Here are seven options for increasing knowledge without depleting a budget.

πŸ“– Read

via "Dark Reading: ".
⚠ AI-generated β€˜skeleton keys’ fool fingerprint scanners ⚠

Artificial intelligence can be used to 'grow' fake fingerprints that pack in common features, fooling scanners.

πŸ“– Read

via "Naked Security".
⚠ Hacking MiSafes’ smartwatches for kids is child’s play ⚠

Researchers describe breaking into the watches as "probably the simplest hack we have ever seen."

πŸ“– Read

via "Naked Security".
⚠ Judge asks if Alexa is witness to a double murder ⚠

A judge has ordered Amazon to turn over any recordings an Echo device may have made around the time a horrific crime occurred.

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Europe Speaker Q&A: SoarTech's Fernando Maymi on 'Synthetic Humans' πŸ•΄

Ahead of his Black Hat Europe appearance, SoarTech's Fernando Maymi explains how and why synthetic humans are critical to the future of cybersecurity.

πŸ“– Read

via "Dark Reading: ".
πŸ” Workers unaware of travel-related cybersecurity threats, survey finds πŸ”

This holiday season, over half of adults plan to travel with work devices. Most don't appreciate the risks.

πŸ“– Read

via "Security on TechRepublic".
⚠ How to rob an ATM? Let me count the ways… ⚠

A comprehensive new report lifts the lid on the sketchy state of ATM security.

πŸ“– Read

via "Naked Security".
πŸ” AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape πŸ”

Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The majority of business pros aren't able to prevent cyberattacks πŸ”

Only 25% of organizations feel confident in their abilities to respond effectively to cyberattacks, according to recent Ponemon Institute study.

πŸ“– Read

via "Security on TechRepublic".