πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-17773

Ingenico Telium 2 POS terminals have a buffer overflow via SOCKET_TASK in the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17772

Ingenico Telium 2 POS terminals allow arbitrary code execution via the TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17771

Ingenico Telium 2 POS terminals have hardcoded FTP credentials. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17770

Ingenico Telium 2 POS terminals have a buffer overflow via the RemotePutFile command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17769

Ingenico Telium 2 POS terminals have a buffer overflow via the 0x26 command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17768

Ingenico Telium 2 POS terminals have an insecure TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17767

Ingenico Telium 2 POS terminals have hardcoded PPP credentials. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17766

Ingenico Telium 2 POS Telium2 OS allow bypass of file-reading restrictions via the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17765

Ingenico Telium 2 POS terminals have undeclared TRACE protocol commands. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
❌ Google Squashes Critical Android Media Framework Bug ❌

The September Android security bulletin addressed critical- and high-severity flaws tied to 53 CVEs overall.

πŸ“– Read

via "Threatpost".
❌ Zeppelin Ransomware Returns with New Trojan on Board ❌

The malware has popped up in a targeted campaign and a new infection routine.

πŸ“– Read

via "Threatpost".
πŸ•΄ Inova Suffers Third-Party Data Breach πŸ•΄

The breach occurred as part of a ransomware attack against service provider Blackbaud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Chart: Does Lack of Diversity Impact the Skills Shortage? πŸ•΄

Yes, according to 21% of security pros who participated in the 2020 Black Hat Attendee Survey.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Meet the Middlemen Who Connect Cybercriminals With Victims πŸ•΄

An analysis of initial access brokers explains how they break into vulnerable organizations and sell their access for up to $10,000.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Legality of Security Research to be Decided in US Supreme Court Case πŸ•΄

A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Attacks Disrupt School Reopenings πŸ•΄

A flurry of recent attacks is complicating attempts to deliver classes online at some schools in different parts of the country.

πŸ“– Read

via "Dark Reading: ".
❌ CDRThief Malware Targets VoIP Gear in Carrier Networks ❌

The Linux-targeted code can steal phone-call metadata, likely in spy campaigns or for use in VoIP fraud.

πŸ“– Read

via "Threatpost".
πŸ” Linux servers and workstations are hackers' next target, security researchers warn πŸ”

Sophisticated hackers and crooks are developing more tools to target Linux-based systems used by government and big business.

πŸ“– Read

via "Security on TechRepublic".
❌ Product Overview: Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine ❌

The Cynet 360 platform is built on three pillars; Extended Detection and Response (XDR), Response Automation, and Managed Detection and Response (MDR).

πŸ“– Read

via "Threatpost".
❌ Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles ❌

New opt-in COVID-19 Exposure Notifications Express systems baked into Apple’s iOS and available on Android need privacy guardrails, say privacy advocates.

πŸ“– Read

via "Threatpost".
πŸ•΄ Ripple20 Malware Highlights Industrial Security Challenges πŸ•΄

Poor security practices allowed software vulnerabilities to propagate throughout industrial and IoT products for more than 20 years.

πŸ“– Read

via "Dark Reading: ".