πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Microsoft Tackles 123 Fixes for July Patch Tuesday ❌

Eighteen critical bugs, impacting Windows Server, Office and Outlook, were fixed as part of the patch roundup.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Patches Wormable RCE Flaw in Windows DNS Servers πŸ•΄

Patch Tuesday security updates address a critical vulnerability in Windows DNS Servers, which researchers believe is likely to be exploited.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DevSecOps Requires a Different Approach to Security πŸ•΄

Breaking applications into microservices means more difficulty in gaining good visibility into runtime security and performance issues, says startup Traceable.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-12784

An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the login form can accept submissions from external websites. In conjunction with CVE-2019-12783, this can be used by attackers to "crowdsource" bruteforce login attempts on the target site, allowing them to guess and potentially compromise valid credentials without ever sending any traffic from their own machine to the target site.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12783

An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the rd parameter can accept a URL, to which users will be redirected after a successful login. In conjunction with CVE-2019-12784, this can be used by attackers to "crowdsource" bruteforce login attempts on the target site, allowing them to guess and potentially compromise valid credentials without ever sending any traffic from their own machine to the target site.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12773

An issue was discovered in Verint Impact 360 15.1. At wfo/help/help_popup.jsp, the helpURL parameter can be changed to embed arbitrary content inside of an iFrame. Attackers may use this in conjunction with social engineering to embed malicious scripts or phishing pages on a site where this product is installed, given the attacker can convince a victim to visit a crafted link.

πŸ“– Read

via "National Vulnerability Database".
❌ The TLS 1.2 Deadline is Looming, Do You Have Your Act Together? ❌

Sectors such as Education (47%), Energy (40%), and Public Administration (37%) have struggled to implement TLS 1.2 protocols

πŸ“– Read

via "Threatpost".
πŸ•΄ Stay on the Cutting Edge of Mobile Security πŸ•΄

Here are some of the mobile-focused Briefings, Trainings, and Arsenal tools that will be explored at Black Hat USA.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Top 5 Questions (and Answers) About GRC Technology πŸ•΄

For the first time in a long time, we must shift from managing localized risks against a landscape of economic growth to managing those issues under much less certain circumstances.

πŸ“– Read

via "Dark Reading: ".
❌ Brazil’s Banking Trojans Go Global ❌

Four sophisticated malware families are ramping up their techniques and actively spreading to new countries, including the U.S.

πŸ“– Read

via "Threatpost".
⚠ Patch now! SIGRED – the wormable hole in your Windows servers ⚠

The bug can definitely crash your Windows DNS servers, and it could end up being used for much worse than that. Please patch now!

πŸ“– Read

via "Naked Security".
πŸ” Microsoft patches critical 17-year-old DNS bug in Windows Server πŸ”

The bug has been deemed "wormable," which means a single exploit could spread from one unpatched server to another.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Nanotechnology Will Disrupt Cybersecurity πŸ•΄

Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is CSPM (Cloud Security Posture Management)? πŸ”

Modern businesses are moving their data to the cloud, and for good reason. But as cloud platform services see an increase in use, there has been an explosion in the number of unmanaged risks in the mission-critical digital industry. This is where Cloud Security Posture Management (CSPM) comes into play.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Vulns in Open Source EHR Puts Patient Health Data at Risk πŸ•΄

Five high-risk flaws in health IT software from LibreHealth, a researcher at Bishop Fox finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Patch ASAP': Cisco Issues Updates for Routers, VPN Firewall πŸ•΄

Cisco issues five critical security patches among a batch of some 31 updates.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Puzzles and Riddles Help InfoSec Pros Solve Real-World Problems πŸ•΄

A researcher shares the unexpected lessons learned in years of creating puzzles and riddles for his cybersecurity colleagues.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Attack Technique Uses Misconfigured Docker API πŸ•΄

A new technique builds and deploys an attack on the victim's own system

πŸ“– Read

via "Dark Reading: ".
πŸ” Ransomware accounts for a third of all cyberattacks against organizations πŸ”

Government agencies were most heavily hit by ransomware during the first quarter, says Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cryptocurrency Scam Spreads Across High-Profile Twitter Accounts πŸ•΄

Twitter accounts belonging to former president Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, and Bill Gates are among those hijacked in a massive cryptocurrency scam.

πŸ“– Read

via "Dark Reading: ".
πŸ” Twitter accounts of Elon Musk, Bill Gates and others hijacked to promote crypto scam πŸ”

The verified accounts for Gates, Musk and Apple issued tweets promoting a cryptocurrency scam, asking followers to send money to a blockchain address.

πŸ“– Read

via "Security on TechRepublic".