πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2019-15312

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is a Zolo Halo DNS rebinding attack. The device was found to be vulnerable to DNS rebinding. Combined with one of the many /httpapi.asp endpoint command-execution security issues, the DNS rebinding attack could allow an attacker to compromise the victim device from the Internet.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15311

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15310

An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign πŸ•΄

Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-20417

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate internal services via an Information Disclosure vulnerability. The vulnerability is only exploitable if WebSudo is disabled in Jira. The affected versions are before version 8.4.2.

πŸ“– Read

via "National Vulnerability Database".
⚠ 133m records for sale as fruits of data breach spree keep raining down ⚠

Databases can be had for as little as $100, on up to $1,100. Most, if not all, are being sold by the hacking group Shiny Hunters.

πŸ“– Read

via "Naked Security".
πŸ•΄ 7 IoT Tips for Home Users πŸ•΄

Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep every one secure.

πŸ“– Read

via "Dark Reading: ".
πŸ” Zoom: We've delivered on all of our security and privacy promises, apart from one πŸ”

CEO Eric Yuan said the company had been working to improve safety, privacy and security, but has pushed back the date for its transparency report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DHS Shares Data on Top Cyber Threats to Federal Agencies πŸ•΄

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.

πŸ“– Read

via "Dark Reading: ".
❌ FakeSpy Android Malware Spread Via β€˜Postal-Service’ Apps ❌

New β€˜smishing’ campaigns from the Roaming Mantis threat group infect Android users with the FakeSpy infostealer.

πŸ“– Read

via "Threatpost".
πŸ•΄ Lessons from COVID-19 Cyberattacks: Where Do We Go Next? πŸ•΄

We need to learn from the attacks and attempts that have occurred in order to prepare for the future.

πŸ“– Read

via "Dark Reading: ".
⚠ MongoDB ransom threats step up from blackmail to full-on wiping ⚠

Still thinking "the crooks probably won't find me if I make a security blunder"?

πŸ“– Read

via "Naked Security".
πŸ” EU Data Protection Authority Wants to Promote Digital Justice πŸ”

The European Data Protection Supervisor (EDPS) announced its plans for 2020-2024 this week and stressed that the EU needs digital solidarity and to make data work for all people across Europe’s borders.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ›  AIEngine 2.0.0 πŸ› 

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Wireshark Analyzer 3.2.5 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” US schools have lost 24.5 million records in breaches since 2005 πŸ”

A report from Comparitech found that since 2005 K–12 districts and colleges/universities have been attacked more than 1,300 times.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Trojans, backdoors, and trojan-droppers among most analyzed cyberthreats πŸ”

Almost three quarters of all requests for analysis to Kaspersky's Threat Intelligence Portal were for trojans, backdoors, and droppers.

πŸ“– Read

via "Security on TechRepublic".
❌ Facebook Privacy Glitch Gave 5K Developers Access to β€˜Expired’ Data ❌

Facebook has fixed a privacy issue that gave developers access to user data long after the 90-day "expiration" date.

πŸ“– Read

via "Threatpost".
❌ Apache Guacamole Opens Door for Total Control of Remote Footprint ❌

Several vulnerabilities can be chained together for a full exploit.

πŸ“– Read

via "Threatpost".
❌ Trojans, Backdoors and Droppers: The Most-Analyzed Malware ❌

Even so, backdoors and droppers are rare in the wild.

πŸ“– Read

via "Threatpost".
πŸ” Fed Offers Guidance on Curbing Synthetic Identity Fraud πŸ”

The Federal Reserve shared insights around mitigating synthetic identity fraud, one of the quickest growing financial threats, this week.

πŸ“– Read

via "Subscriber Blog RSS Feed ".