πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-16848

A Denial of Service (DoS) condition is possible in OpenStack Mistral in versions up to and including 7.0.3. Submitting a specially crafted workflow definition YAML file containing nested anchors can lead to resource exhaustion culminating in a denial of service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18869

A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.

πŸ“– Read

via "National Vulnerability Database".
⚠ You’ve heard of sextortion – now there’s β€œbreachstortion”, too.. ⚠

Sextortion again - but with "we hacked your website and stole all your data" instead of "we hacked your webcam and made a video".

πŸ“– Read

via "Naked Security".
πŸ•΄ Microsoft Releases Update for DoS Flaw in .NET Core πŸ•΄

Customers are advised to install the latest version of PowerShell to fully address CVE-2020-1108.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 things to know about security breaches πŸ”

Verizon's annual Data Breach Investigations Report confirmed 3,950 data breaches across 16 industries. Tom Merritt explains five things to know about these breaches.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 things to know about security breaches πŸ”

Verizon's annual Data Breach Investigations Report confirmed 3,950 data breaches across 16 industries. Tom Merritt explains five things to know about these breaches.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-20838

libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21246

Caddy before 0.10.13 mishandles TLS client authentication, as demonstrated by an authentication bypass caused by the lack of the StrictHostMatching mode.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21245

Pound before 2.8 allows HTTP request smuggling, a related issue to CVE-2016-10711.

πŸ“– Read

via "National Vulnerability Database".
❌ WFH Alert: Critical Bug Found in Old D-Link Router Models ❌

Researchers find six bugs in consumer D-Link DIR-865L Wireless AC 1750 Dual Band Cloud Router.

πŸ“– Read

via "Threatpost".
❌ Intel Adds Anti-Malware Protection in Tiger Lake CPUs ❌

Intel's Tiger Lake CPUs will come with Control-flow Enforcement Technology (CET), aimed at battling common control-flow hijacking attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ Intel Tackles Malware Related to Memory Security at Hardware Level πŸ•΄

New control-flow enforcement technology will become available with upcoming Tiger Lake mobile processor, chipmaker says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Following Breach, Marketplace Minted Target of New CCPA Lawsuit πŸ”

The online marketplace, which specializes in greeting cards and wedding invites, was hit with a class action lawsuit under the California Consumer Privacy Act last week, alleging it failed to protect its customers PII.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Twitter Disrupts Wide-Ranging Political Disinformation Campaigns ❌

This removal, of 32K accounts, is not the first time Twitter has taken action to protect its users from influence operations. Researchers weighed in on the practice with Threatpost.

πŸ“– Read

via "Threatpost".
πŸ•΄ Now-Former eBay Security Team Members Charged in Bizarre Cyberstalking Campaign πŸ•΄

A bloody pig mask, doxing threats, and a foiled surveillance attempt were among the actions six ex-eBay employees took against an editor and publisher of a newsletter.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ryuk Continues to Dominate Ransomware Response Cases πŸ•΄

Analysis reveals how Ryuk's operators are changing their techniques and using new means to break in.

πŸ“– Read

via "Dark Reading: ".
❌ Shadow IT: Why It’s Still a Major Risk in Today’s Environments ❌

According to industry analyst firm Gartner, as many as one-third of successful attacks on enterprises target data that are housed in unsanctioned IT resources.

πŸ“– Read

via "Threatpost".
⚠ Eavesdroppers can use light bulbs to listen in from afar ⚠

Researchers have developed an ingenious way to eavesdrop from a distance without relying on planted bugs: they just stare at a light bulb.

πŸ“– Read

via "Naked Security".
⚠ β€˜Anonymous’ takes down Atlanta Police Dept. site after police shooting ⚠

Hackers affiliating themselves with the hacktivist label have joined the Black Lives Matter backlash after a fatal police shooting on Friday.

πŸ“– Read

via "Naked Security".
πŸ•΄ IoT Security Trends & Challenges in the Wake of COVID-19 πŸ•΄

The demand for Internet of Things security practices that protect sensitive medical equipment and data will double within the next five years. Here's why.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization's domain from security threats πŸ”

Unlocked domains are susceptible to malicious tactics that can lead to unauthorized DNS changes and domain name hijacking, says CSC.

πŸ“– Read

via "Security on TechRepublic".