πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” The next cybersecurity headache: Employees know the rules but just don't care πŸ”

Employees are still ignoring cyber security best practice despite being more aware of the risks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” COVID-19 has spurred businesses to migrate security operations to the cloud πŸ”

Companies have increased their reliance on cloud-based security platforms to protect sensitive data as a result of the coronavirus pandemic, according to a new survey.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-20408

The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.7.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.

πŸ“– Read

via "National Vulnerability Database".
❌ Android Spyware Tools Emerge in Widespread Surveillance Campaign ❌

Four Android spyware tools have been used in a widespread APT campaign to spy on the Uyghur ethnic minority group - since 2013.

πŸ“– Read

via "Threatpost".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.7 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” How to use the Google Pixel Safety Check feature πŸ”

The Android-powered Google Pixel line of phones received a very important updated feature dedicated to user's personal safety. Learn how to use the Safety Check feature.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-4706

IBM Security Identity Manager Virtual Appliance 7.0.2 writes information to log files which can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. IBM X-Force ID: 172016.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4705

IBM Security Identity Manager Virtual Appliance 7.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 172015.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4704

IBM Security Identity Manager Virtual Appliance 7.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 172014.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4676

IBM Security Identity Manager Virtual Appliance 7.0.2 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 171512.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-1712

"A vulnerability in the TLS protocol implementation of the Domino server could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions."

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-1659

"HCL iNotes is susceptible to a Cross-Site Scripting (XSS) Vulnerability. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials."

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 4 Steps to a More Mature Identity Program πŸ•΄

Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.

πŸ“– Read

via "Dark Reading: ".
πŸ” Be prepared: Why you need an incident response policy πŸ”

Smart security teams have updated incident response plans in place before a security breach happens.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Business climate may be stabilizing for tech companies πŸ”

New CompTIA poll finds members are receiving inquiries around cybersecurity, migrating to the cloud, and managed services.

πŸ“– Read

via "Security on TechRepublic".
❌ EvilQuest: Inside A β€˜New Class’ of Mac Malware ❌

Mac expert Thomas Reed discusses how EvilQuest is ushering in a new class of Mac malware.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Issues Out-of-Band Patches for RCE Flaws πŸ•΄

Vulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New MacOS Ransomware Hides in Pirated Program πŸ•΄

A bogus installer for Little Snitch carries a ransomware hitchhiker.

πŸ“– Read

via "Dark Reading: ".
❌ Alina Point-of-Sale Malware Spotted in Ongoing Campaign ❌

The malware is using DNS tunneling to exfiltrate payment-card data.

πŸ“– Read

via "Threatpost".
❌ Cisco Warns of High-Severity Bug in Small Business Switch Lineup ❌

A high-severity flaw allows remote, unauthenticated attackers to potentially gain administrative privileges for Cisco small business switches.

πŸ“– Read

via "Threatpost".
πŸ•΄ DHS Shares Data on Top Cyberthreats to Federal Agencies πŸ•΄

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.

πŸ“– Read

via "Dark Reading: ".