πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2020-11624

An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. They do not require users to change the default password for the admin account. They only show a pop-up window suggesting a change but there's no enforcement. An administrator can click Cancel and proceed to use the device without changing the password. Additionally, they disclose the default username within the login.js script. Since many attacks for IoT devices, including malware and exploits, are based on the usage of default credentials, it makes these cameras an easy target for malicious actors.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11623

An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. An attacker with physical access to the UART interface could access additional diagnostic and configuration functionalities as well as the camera's bootloader. Successful exploitation could compromise confidentiality, integrity, and availability of the affected system. It could even render the device inoperable.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18834

Persistent XSS in the WooCommerce Subscriptions plugin before 2.6.3 for WordPress allows remote attackers to execute arbitrary JavaScript because Billing Details are mishandled in WCS_Admin_Post_Types in class-wcs-admin-post-types.php.

πŸ“– Read

via "National Vulnerability Database".
❌ Malicious β€˜Blur’ Photo App Campaign Discovered on Google Play ❌

Twenty-nine bad mobile apps with a combined 3.5 million downloads bombard users with out-of-context ads.

πŸ“– Read

via "Threatpost".
πŸ•΄ Banning TikTok Won't Solve Our Privacy Problems πŸ•΄

Preventing the use of an apps based solely on its country of origin (no matter how hostile) is merely a Band-Aid that won't fully address all privacy and security concerns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Email Security Features Fail to Prevent Phishable 'From' Addresses πŸ•΄

The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 7/24 Edition πŸ”

A new phishing campaign abuses enterprise cloud services, BadPower attack could set your device on fire, and the UK sports industry under near constant cyber attack - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ›  Sifter 8.6 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ ASUS routers could be reflashed with malware – patch now! ⚠

Responsible disclosure means the bugs are already fixed - but don't forget to check that you applied the patch.

πŸ“– Read

via "Naked Security".
πŸ” Companies turning to isolation technology to protect against the internet's biggest threats πŸ”

Isolation technology allows companies to keep employee browsers siloed in the cloud.

πŸ“– Read

via "Security on TechRepublic".
❌ News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags ❌

Threatpost editors talk about the biggest security news stories for the week ended Jul. 24.

πŸ“– Read

via "Threatpost".
❌ NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug ❌

Power plants, factories, oil and gas refineries and more are all in the sights of foreign adversaries, the U.S. warns.

πŸ“– Read

via "Threatpost".
πŸ•΄ Rise of the Robots: How You Should Secure RPA πŸ•΄

Robotic Process Automation (RPA) is the next big thing in innovation and digital strategy. But what security details are overlooked in the rush to implement bots?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Access to Internal Twitter Admin Tools Is Widespread πŸ•΄

More than 1,000 individuals have access to tools that could have aided the attackers in the recent Twitter attack on high-profile accounts.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Remote Work Could Help Cybersecurity's Diversity Problem - But Will It? πŸ•΄

Job market data from the second quarter suggests there are increasing opportunities for women and minorities in the world of remote work, but long-standing biases may provide resistance.

πŸ“– Read

via "Dark Reading: ".
❌ DJI Drone App Riddled With Privacy Issues, Researchers Allege ❌

The DJI GO 4 application open users’ sensitive data up for the taking, researchers allege.

πŸ“– Read

via "Threatpost".
πŸ•΄ Garmin Takes App & Services Offline After Suspected Ransomware Attack πŸ•΄

Wearables company Garmin shut down its website, app, call centers, and other services in the aftermath of a security incident.

πŸ“– Read

via "Dark Reading: ".
πŸ” DevSecOps tutorial: What is it, and how can it improve application security? πŸ”

Dr. David Brumley, a professor at Carnegie Mellon University and CEO of ForAllSecure, explains what DevSecOps is and how companies can use it to improve security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Social engineering: A cheat sheet for business professionals πŸ”

People, like computers, can be hacked using a process called social engineering, and there's a good chance a cybersecurity attack on your organization could start with this technique.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Organizations Continue to Struggle With App Vulns πŸ•΄

A high percentage of discovered bugs remain unremediated for a long time, a new study shows.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-10610

In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification.

πŸ“– Read

via "National Vulnerability Database".