πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2019-12784

An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the login form can accept submissions from external websites. In conjunction with CVE-2019-12783, this can be used by attackers to "crowdsource" bruteforce login attempts on the target site, allowing them to guess and potentially compromise valid credentials without ever sending any traffic from their own machine to the target site.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12783

An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the rd parameter can accept a URL, to which users will be redirected after a successful login. In conjunction with CVE-2019-12784, this can be used by attackers to "crowdsource" bruteforce login attempts on the target site, allowing them to guess and potentially compromise valid credentials without ever sending any traffic from their own machine to the target site.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12773

An issue was discovered in Verint Impact 360 15.1. At wfo/help/help_popup.jsp, the helpURL parameter can be changed to embed arbitrary content inside of an iFrame. Attackers may use this in conjunction with social engineering to embed malicious scripts or phishing pages on a site where this product is installed, given the attacker can convince a victim to visit a crafted link.

πŸ“– Read

via "National Vulnerability Database".
❌ The TLS 1.2 Deadline is Looming, Do You Have Your Act Together? ❌

Sectors such as Education (47%), Energy (40%), and Public Administration (37%) have struggled to implement TLS 1.2 protocols

πŸ“– Read

via "Threatpost".
πŸ•΄ Stay on the Cutting Edge of Mobile Security πŸ•΄

Here are some of the mobile-focused Briefings, Trainings, and Arsenal tools that will be explored at Black Hat USA.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Top 5 Questions (and Answers) About GRC Technology πŸ•΄

For the first time in a long time, we must shift from managing localized risks against a landscape of economic growth to managing those issues under much less certain circumstances.

πŸ“– Read

via "Dark Reading: ".
❌ Brazil’s Banking Trojans Go Global ❌

Four sophisticated malware families are ramping up their techniques and actively spreading to new countries, including the U.S.

πŸ“– Read

via "Threatpost".
⚠ Patch now! SIGRED – the wormable hole in your Windows servers ⚠

The bug can definitely crash your Windows DNS servers, and it could end up being used for much worse than that. Please patch now!

πŸ“– Read

via "Naked Security".
πŸ” Microsoft patches critical 17-year-old DNS bug in Windows Server πŸ”

The bug has been deemed "wormable," which means a single exploit could spread from one unpatched server to another.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Nanotechnology Will Disrupt Cybersecurity πŸ•΄

Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is CSPM (Cloud Security Posture Management)? πŸ”

Modern businesses are moving their data to the cloud, and for good reason. But as cloud platform services see an increase in use, there has been an explosion in the number of unmanaged risks in the mission-critical digital industry. This is where Cloud Security Posture Management (CSPM) comes into play.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Vulns in Open Source EHR Puts Patient Health Data at Risk πŸ•΄

Five high-risk flaws in health IT software from LibreHealth, a researcher at Bishop Fox finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Patch ASAP': Cisco Issues Updates for Routers, VPN Firewall πŸ•΄

Cisco issues five critical security patches among a batch of some 31 updates.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Puzzles and Riddles Help InfoSec Pros Solve Real-World Problems πŸ•΄

A researcher shares the unexpected lessons learned in years of creating puzzles and riddles for his cybersecurity colleagues.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Attack Technique Uses Misconfigured Docker API πŸ•΄

A new technique builds and deploys an attack on the victim's own system

πŸ“– Read

via "Dark Reading: ".
πŸ” Ransomware accounts for a third of all cyberattacks against organizations πŸ”

Government agencies were most heavily hit by ransomware during the first quarter, says Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cryptocurrency Scam Spreads Across High-Profile Twitter Accounts πŸ•΄

Twitter accounts belonging to former president Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, and Bill Gates are among those hijacked in a massive cryptocurrency scam.

πŸ“– Read

via "Dark Reading: ".
πŸ” Twitter accounts of Elon Musk, Bill Gates and others hijacked to promote crypto scam πŸ”

The verified accounts for Gates, Musk and Apple issued tweets promoting a cryptocurrency scam, asking followers to send money to a blockchain address.

πŸ“– Read

via "Security on TechRepublic".
❌ Twitter Elite Accounts Are Hijacked in Unprecedented Cryptocurrency Scam ❌

The Twitter accounts of Gates, Musk, Biden, Apple and Uber have each been hijacked at the same time to push a cryptocurrency scam in an unprecedented breach of Twitter accounts.

πŸ“– Read

via "Threatpost".
⚠ Twitter limits tweeting as prominent accounts spam out cryptocoin scams ⚠

Twitter is investigating a rash of fraudulent tweets from prominent accounts - don't fall for these scams!

πŸ“– Read

via "Naked Security".
❌ LokiBot Redux Attacks Massive List of Common Android Apps ❌

BlackRock, based on the Xerxes source code, can steal info not only from financial apps but also TikTok, Tinder, Instagram, Uber and many others.

πŸ“– Read

via "Threatpost".