πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Demand for video surveillance cameras expected to skyrocket πŸ”

Video cameras can be used in a variety of situations beyond simple surveillance, says research firm IDC.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Google Cloud Unveils 'Confidential VMs' to Protect Data in Use πŸ•΄

Confidential Virtual Machines, now in beta, will let Google Cloud customers keep data encrypted while it's in use.

πŸ“– Read

via "Dark Reading: ".
❌ Adobe Discloses Critical Code-Execution Bugs in July Update ❌

The software giant released patches for four critical vulnerabilities and five different platforms.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'Make Your Bed' and Other Life Lessons for Security πŸ•΄

Follow this advice from a famous military commanders' commencement speech and watch your infosec team soar.

πŸ“– Read

via "Dark Reading: ".
πŸ” The Ultimate Guide to BYOD Security: Overcoming Challenges, Creating Effective Policies, and Mitigating Risks to Maximize Benefits πŸ”

Bring Your Own Device (BYOD) remains both a major opportunity and challenge for enterprises. By following the right approach to identifying BYOD risk and developing effective BYOD policy it is possible to capitalize on the benefits of BYOD without adding significant risk.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Critical DNS Bug Opens Windows Servers to Infrastructure Takeover ❌

Microsoft gives the β€˜wormable’ flaw a security rating of 10 – the most severe warning possible.

πŸ“– Read

via "Threatpost".
πŸ” Data breaches decline 33% in the first half of 2020 πŸ”

The Identity Theft Resource Center projects 2020 is on pace to see the lowest number of breaches and exposures since 2015.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-15886

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15885

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15884

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15883

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15882

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15881

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to use NGINX as a reverse proxy πŸ”

A reverse proxy can do wonders for your network and its security. Learn how to configure NGINX to serve this very purpose.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Tackles 123 Fixes for July Patch Tuesday ❌

Eighteen critical bugs, impacting Windows Server, Office and Outlook, were fixed as part of the patch roundup.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Patches Wormable RCE Flaw in Windows DNS Servers πŸ•΄

Patch Tuesday security updates address a critical vulnerability in Windows DNS Servers, which researchers believe is likely to be exploited.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DevSecOps Requires a Different Approach to Security πŸ•΄

Breaking applications into microservices means more difficulty in gaining good visibility into runtime security and performance issues, says startup Traceable.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-12784

An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the login form can accept submissions from external websites. In conjunction with CVE-2019-12783, this can be used by attackers to "crowdsource" bruteforce login attempts on the target site, allowing them to guess and potentially compromise valid credentials without ever sending any traffic from their own machine to the target site.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12783

An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the rd parameter can accept a URL, to which users will be redirected after a successful login. In conjunction with CVE-2019-12784, this can be used by attackers to "crowdsource" bruteforce login attempts on the target site, allowing them to guess and potentially compromise valid credentials without ever sending any traffic from their own machine to the target site.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12773

An issue was discovered in Verint Impact 360 15.1. At wfo/help/help_popup.jsp, the helpURL parameter can be changed to embed arbitrary content inside of an iFrame. Attackers may use this in conjunction with social engineering to embed malicious scripts or phishing pages on a site where this product is installed, given the attacker can convince a victim to visit a crafted link.

πŸ“– Read

via "National Vulnerability Database".
❌ The TLS 1.2 Deadline is Looming, Do You Have Your Act Together? ❌

Sectors such as Education (47%), Energy (40%), and Public Administration (37%) have struggled to implement TLS 1.2 protocols

πŸ“– Read

via "Threatpost".