πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2014-8939

Lexiglot through 2014-11-20 allows remote attackers to obtain sensitive information (full path) via an include/smarty/plugins/modifier.date_format.php request if PHP has a non-recommended configuration that produces warning messages.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-8938

Lexiglot through 2014-11-20 allows local users to obtain sensitive information by listing a process because the username and password are on the command line.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-8937

Lexiglot through 2014-11-20 allows denial of service because api/update.php launches svn update operations that use a great deal of resources.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-7175

FarLinX X25 Gateway through 2014-09-25 allows attackers to write arbitrary data to fsUI.xyz via fsSaveUIPersistence.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-7174

FarLinX X25 Gateway through 2014-09-25 allows directory traversal via the log-handling feature.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-7173

FarLinX X25 Gateway through 2014-09-25 allows command injection via shell metacharacters to sysSaveMonitorData.php, fsx25MonProxy.php, syseditdate.php, iframeupload.php, or sysRestoreX25Cplt.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Why organizations shouldn't automatically give in to ransomware demands πŸ”

A ransomware incident analyzed by IBM X-Force shows that the attacker wouldn't have been able to decrypt the data, even if the ransom was paid.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 26 IoT Flaws Enable Denial-of-Service Attacks, Privilege Escalation πŸ•΄

Research details vulnerabilities in the Zephyr Real Time Operating Systems and MCUboot, both used in IoT devices and sensors.

πŸ“– Read

via "Dark Reading: ".
πŸ” Phishing campaign caught spoofing Zoom πŸ”

The campaign impersonates Zoom emails, but steals the Microsoft account credentials of its victims, says security firm Abnormal Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 48% of employees are less likely to follow safe data practices when working from home πŸ”

According to a Tessian survey, data protection concerns go out the window for remote employees.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Apple Pays Researcher $100,000 for Critical Vulnerability πŸ•΄

Apple has fixed a flaw in the "Sign in with Apple" feature that could have enabled attackers to break into user accounts for third-party services.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Data on Indian Mobile Payments App Reportedly Exposed via Open S3 Bucket πŸ•΄

Over 7 million records exposed, according to vpnMentor, but app maker says there is no sign of malicious use.

πŸ“– Read

via "Dark Reading: ".
⚠ Crime agency turns to Google ads to deter teen DDoS hackers ⚠

The UK's National Crime Agency has hit on a simple way to stop teens from being sucked into cybercrime – using Google Ads.

πŸ“– Read

via "Naked Security".
⚠ Hacker posts database stolen from Dark Net free hosting provider DH ⚠

Some 7,600 dark-web sites were obliterated in an attack on the most popular provider of .onion free hosting services, Daniel's Hosting.

πŸ“– Read

via "Naked Security".
❌ Podcast: Why Identity Access Management is the New Perimeter ❌

DivvyCloud discusses the changing nature of identity access management (IAM) - and what kind of challenges and opportunities that is creating for businesses.

πŸ“– Read

via "Threatpost".
❌ Apple Jailbreak Zero-Day Gets a Patch ❌

The zero-day vulnerability tracked as CVE-2020-9859 is exploited by the "Uncover" jailbreak tool released last week.

πŸ“– Read

via "Threatpost".
πŸ•΄ Banking on Data Security in a Time of Insecurity πŸ•΄

How banks can maintain security and data integrity in the middle of a pandemic.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against Business Email Compromise attacks πŸ”

BEC scams accounted for half of all cybercrime losses in the US in 2019, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic πŸ•΄

For now, security teams face freezes in projects and hiring - and budget cuts, security industry analysts say.

πŸ“– Read

via "Dark Reading: ".
❌ Octopus Scanner Sinks Tentacles into GitHub Repositories ❌

At least 26 different open-source code repositories were found to be infected with an unusual attack on the open-source software supply chain.

πŸ“– Read

via "Threatpost".
πŸ•΄ Thycotic Buys Onion ID to Extend PAM Portfolio πŸ•΄

The acquisition brings three new products into Thycotic's privileged access management lineup.

πŸ“– Read

via "Dark Reading: ".