πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ The Future's Biggest Cybercrime Threat May Already Be Here πŸ•΄

Current attacks will continue to be refined, and what may seem a weakness now could turn out to be a disaster.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your website's database from hackers πŸ”

A recent investigation by NordPass and a white hat hacker discovered more than 9,000 unsecured databases online with more than 10 billion individual entries.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How to Decipher InfoSec Job Titles' Mysteries πŸ•΄

Figuring out which cybersecurity job you want -- or are qualified for -- can be difficult when words have no consistent meaning in the industry.

πŸ“– Read

via "Dark Reading: ".
πŸ” How IT leaders were unprepared for the security challenges posed by COVID-19 πŸ”

The top three challenges cited in a Tanium survey were identifying new computing devices, overwhelmed IT capacity due to VPN requirements, and increased risks from video conferencing.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Most consumers do not trust big tech with their privacy πŸ”

Social media and online shopping sites top the list of services consumers feel do not adequately protect their personal information.

πŸ“– Read

via "Security on TechRepublic".
πŸ” It's not OK, Cupid: Security flaws could expose user data and more πŸ”

Researchers found a number of vulnerabilities that could give attackers access to a treasure trove of personally identifying information about members.

πŸ“– Read

via "Security on TechRepublic".
⚠ US tax service says, β€œ2FA is a must!” ⚠

We know it's an old drum, but we're not tired of beating it yet: 2FA is your friend.

πŸ“– Read

via "Naked Security".
❌ Critical Security Flaw in WordPress Plugin Allows RCE ❌

WordPress plugin Comments – wpDiscuz, which is installed on over 70,000 sites, has issued a patch.

πŸ“– Read

via "Threatpost".
❌ Critical Bugs in Utilities VPNs Could Cause Physical Damage ❌

Gear from Secomea, Moxa and HMS Networks are affected by remote code-execution flaws, researchers warn.

πŸ“– Read

via "Threatpost".
πŸ•΄ Technical Challenges of IoT Cybersecurity in a Post-COVID-19 World πŸ•΄

Effective management of vulnerabilities can be done only when information about supply chain dependencies is accurate and recent.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Sifter 9 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Hydra Network Logon Cracker 9.1 πŸ› 

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2020-11934

It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11933

cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Dark Reading Video News Desk Returns to Black Hat πŸ•΄

Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 70,000+ WordPress Sites Affected by Critical Plug-in Flaw πŸ•΄

A vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.

πŸ“– Read

via "Dark Reading: ".
πŸ” NYDFS Charges First Company for Violating Its Cybersecurity Regulation πŸ”

NYDFS made its first enforcement action around its Cybersecurity Regulation, 23 NYCRR 500, alleging errors and deficient controls led to a breach at an insurance company.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Billions of Devices Impacted by Secure Boot Bypass ❌

The "BootHole" bug could allow cyberattackers to load malware, steal information and move laterally into corporate, OT ,IoT and home networks.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2019-20033

On Aspire-derived NEC PBXes, including all versions of SV8100 devices, a set of documented, static login credentials may be used to access the DIM interface.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20032

An attacker with access to an InMail voicemail box equipped with the find me/follow me feature on Aspire-derived NEC PBXes, including all versions of SV8100, SV9100, SL1100 and SL2100 devices, may access the system's administration modem.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20031

NEC UM8000, UM4730 and prior non-InMail voicemail systems with all known software versions may permit an infinite number of login attempts in the telephone user interface (TUI), effectively allowing brute force attacks.

πŸ“– Read

via "National Vulnerability Database".