πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2019-20914

An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_common_entity_handle_data in common_entity_handle_data.spec.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20913

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20912

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a stack overflow in bits.c, possibly related to bit_read_TF.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20911

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to denial of service in bit_calc_CRC in bits.c, related to a for loop.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20910

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in decode_R13_R2000 in decode.c, a different vulnerability than CVE-2019-20011.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20909

An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec.

πŸ“– Read

via "National Vulnerability Database".
❌ Enterprise Data Security: It’s Time to Flip the Established Approach ❌

Companies should forget about auditing where data resides and who has access to it.

πŸ“– Read

via "Threatpost".
πŸ•΄ Major Flaws Open the Edge to Attack πŸ•΄

Attackers are using critical exploits for flaws in VPN appliances, app-delivery services, and other network-edge hardware and software to punch through corporate perimeters. What can companies do?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 8 Signs of a Smartphone Hack πŸ•΄

A rapidly dwindling battery life or sudden spike in data usage could indicate your iOS or Android device has been compromised.

πŸ“– Read

via "Dark Reading: ".
πŸ” CISOs discuss cybersecurity in the COVID-19 environment πŸ”

A digital panel discussion sponsored by MIT's Sloan CIO Digital Learning Series covered a range of topics from protecting remote workers to phishing to how to manage risk.

πŸ“– Read

via "Security on TechRepublic".
⚠ Apple’s latest updates are out for iPhones and Macs – get them now! ⚠

None of Apple's bugs have nicknames like Microsoft's recent "SIGRed" - but there are nevertheless kernel-level code holes to be patched...

πŸ“– Read

via "Naked Security".
πŸ” How to install Malware Information Sharing Platform on Ubuntu Server 18.04 πŸ”

If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.

πŸ“– Read

via "Security on TechRepublic".
❌ CISA Emergency Directive Orders Immediate Fix of Windows DNS Server Bug ❌

An emergency directive orders some federal agencies to apply Microsoft’s patch for a critical DNS vulnerability by Friday, July 17 at 2 p.m. (ET).

πŸ“– Read

via "Threatpost".
πŸ” Phishing: Email fraudsters are impersonating colleagues, customers, and vendors, report says πŸ”

Nearly a third of professionals said they have to remediate email-based attacks every day, GreatHorn found.

πŸ“– Read

via "Security on TechRepublic".
❌ Twitter Hack Update: What We Know (and What We Don’t) ❌

With limited confirmed information, a raft of theories and circumstantial evidence has come to light as to who was behind the attack and how they carried it out.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybercriminals Targeted Streaming Services to Provide Pandemic Entertainment πŸ•΄

Prior to 2020, about 1 in 5 credential attacks targeted video services, but that's nothing compared to the first quarter of 2020, according to newly published data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Election Security: Recovering from 2016, Looking Toward 2020 πŸ•΄

Researchers publish the results of a four-year investigation and discuss whether the US is ready to secure its largest elections.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 7/17 Edition πŸ”

US Secret Service forms a cyber fraud task force, Twitter deals with the hacking of high-profile Twitter accounts, and more - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ›  Sifter 8.5 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SMB12 Information Gathering πŸ› 

SMB12 Information Gathering is a data gathering python script that inspects SMB1 and SMB2 endpoints. It will extract various attributes from the remote server such as OS version (only supported by SMB1 as per protocol definition), DNS computer name, DNS domain name, NetBIOS computer name and NetBIOS domain name (SMB1 and SMB2).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover ❌

Less than 500 machines have been patched since U.S. Cyber Command issued an alert to patch a critical bug that's under active exploit.

πŸ“– Read

via "Threatpost".