πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-19947

The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this information exposure vulnerability could disclose sensitive information. QNAP has already fixed the issue in Helpdesk 3.0.3 and later.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-19946

The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this improper certificate validation vulnerability could allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. QNAP has already fixed the issue in Helpdesk 3.0.3 and later.

πŸ“– Read

via "National Vulnerability Database".
❌ WordPress Plugin Flaw Allows Attackers to Forge Emails ❌

The high-severity flaw in the Email Subscribers & Newsletters plugin by Icegram affects more than 100,000 WordPress websites.

πŸ“– Read

via "Threatpost".
πŸ” Microsoft detects wave of cyberattacks two months before US presidential election πŸ”

Hacker groups are ramping up activity as the US heads into the peak of election season. The latest attacks at times bear hallmarks similar to those seen in 2016.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to limit file upload size on NGINX to mitigate DoS attacks πŸ”

If you have an NGINX site that must allow users to upload files, try this configuration to help prevent possible Denial-of-Service attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to patch CentOS against BootHole πŸ”

If you have CentOS servers in your data center, you'll want to make sure to patch them against BootHole. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to hide files from any file manager on the Linux desktop πŸ”

Want to hide files and folders from your Linux desktop file manager? Jack Wallen shows you one handy method.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 22 cybersecurity courses for aspiring and in-demand IT security pros πŸ”

If you want to land a high-paying cybersecurity job or ace an IT security certification exam, check out these online training courses, which cover GDPR, business continuity, ethical hacking, and more.

πŸ“– Read

via "Security on TechRepublic".
❌ It’s No β€˜Giggle’: Managing Expectations for Vulnerability Disclosure ❌

Vulnerability-disclosure policies (VDPs), if done right, can help provide clarity and clear guidelines to both bug-hunters and vendors when it comes to going public with security flaws.

πŸ“– Read

via "Threatpost".
πŸ•΄ Ransomware Hits US District Court in Louisiana πŸ•΄

The ransomware attack has exposed internal documents from the court and knocked its website offline.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ APT Groups Set Sights on Linux Targets: Inside the Trend πŸ•΄

Researchers see more advanced attack groups creating tools and platforms to target Linux-based devices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 3 Secure Moments: A Tranquil Trio of Security Haiku πŸ•΄

Placid poems to quiet the infosec pro's harried mind. (Or placid, by infosec standards.)

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-10401

An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7491

An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7490

An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.

πŸ“– Read

via "National Vulnerability Database".
❌ Office 365 Phishing Attack Leverages Real-Time Active Directory Validation ❌

Attackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.

πŸ“– Read

via "Threatpost".
❌ APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins ❌

The Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations.

πŸ“– Read

via "Threatpost".
⚠ Naked Security Live – β€œShould you worry about your wallpaper?” ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
πŸ•΄ More Printers Could Mean Security Problems for Home-Bound Workers πŸ•΄

Tricked-out home offices have led to an influx in printers, many of which have not been set up securely, leaving workers and their companies vulnerable.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Open Source Security's Top Threat and What To Do About It πŸ•΄

With open source developers regularly churning out new tools, the risk landscape has become too fragmented to properly monitor.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to restrict Nextcloud logins to IP addresses πŸ”

If you want to lock down your Nextcloud instance so only certain computers can log in, follow these steps.

πŸ“– Read

via "Security on TechRepublic".