🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Why We Need to Pay Attention to Attacks on the Smart-Built Environment 🕴

Are attacks on IoT physical security devices real or just theoretical? Why professionals need to be aware of the real-life examples in an effort to guard against future attacks on their own businesses.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2018-17774

Ingenico Telium 2 POS terminals have an insecure NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17773

Ingenico Telium 2 POS terminals have a buffer overflow via SOCKET_TASK in the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17772

Ingenico Telium 2 POS terminals allow arbitrary code execution via the TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17771

Ingenico Telium 2 POS terminals have hardcoded FTP credentials. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17770

Ingenico Telium 2 POS terminals have a buffer overflow via the RemotePutFile command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17769

Ingenico Telium 2 POS terminals have a buffer overflow via the 0x26 command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17768

Ingenico Telium 2 POS terminals have an insecure TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17767

Ingenico Telium 2 POS terminals have hardcoded PPP credentials. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17766

Ingenico Telium 2 POS Telium2 OS allow bypass of file-reading restrictions via the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2018-17765

Ingenico Telium 2 POS terminals have undeclared TRACE protocol commands. This is fixed in Telium 2 SDK v9.32.03 patch N.

📖 Read

via "National Vulnerability Database".
Google Squashes Critical Android Media Framework Bug

The September Android security bulletin addressed critical- and high-severity flaws tied to 53 CVEs overall.

📖 Read

via "Threatpost".
Zeppelin Ransomware Returns with New Trojan on Board

The malware has popped up in a targeted campaign and a new infection routine.

📖 Read

via "Threatpost".
🕴 Inova Suffers Third-Party Data Breach 🕴

The breach occurred as part of a ransomware attack against service provider Blackbaud.

📖 Read

via "Dark Reading: ".
🕴 Chart: Does Lack of Diversity Impact the Skills Shortage? 🕴

Yes, according to 21% of security pros who participated in the 2020 Black Hat Attendee Survey.

📖 Read

via "Dark Reading: ".
🕴 Meet the Middlemen Who Connect Cybercriminals With Victims 🕴

An analysis of initial access brokers explains how they break into vulnerable organizations and sell their access for up to $10,000.

📖 Read

via "Dark Reading: ".
🕴 Legality of Security Research to be Decided in US Supreme Court Case 🕴

A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

📖 Read

via "Dark Reading: ".
🕴 Ransomware Attacks Disrupt School Reopenings 🕴

A flurry of recent attacks is complicating attempts to deliver classes online at some schools in different parts of the country.

📖 Read

via "Dark Reading: ".
CDRThief Malware Targets VoIP Gear in Carrier Networks

The Linux-targeted code can steal phone-call metadata, likely in spy campaigns or for use in VoIP fraud.

📖 Read

via "Threatpost".
🔐 Linux servers and workstations are hackers' next target, security researchers warn 🔐

Sophisticated hackers and crooks are developing more tools to target Linux-based systems used by government and big business.

📖 Read

via "Security on TechRepublic".
Product Overview: Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine

The Cynet 360 platform is built on three pillars; Extended Detection and Response (XDR), Response Automation, and Managed Detection and Response (MDR).

📖 Read

via "Threatpost".