πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2013-7491

An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7490

An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.

πŸ“– Read

via "National Vulnerability Database".
❌ Office 365 Phishing Attack Leverages Real-Time Active Directory Validation ❌

Attackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.

πŸ“– Read

via "Threatpost".
❌ APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins ❌

The Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations.

πŸ“– Read

via "Threatpost".
⚠ Naked Security Live – β€œShould you worry about your wallpaper?” ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
πŸ•΄ More Printers Could Mean Security Problems for Home-Bound Workers πŸ•΄

Tricked-out home offices have led to an influx in printers, many of which have not been set up securely, leaving workers and their companies vulnerable.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Open Source Security's Top Threat and What To Do About It πŸ•΄

With open source developers regularly churning out new tools, the risk landscape has become too fragmented to properly monitor.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to restrict Nextcloud logins to IP addresses πŸ”

If you want to lock down your Nextcloud instance so only certain computers can log in, follow these steps.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to install Infection Monkey for breach and attack simulations on your network πŸ”

Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Clam AntiVirus Toolkit 0.103.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Magecart Attack Impacts More Than 10K Online Shoppers ❌

Close to 2,000 e-commerce sites were infected over the weekend with a payment-card skimmer, maybe the result of a zero-day exploit.

πŸ“– Read

via "Threatpost".
πŸ•΄ Virginia's Largest School System Hit With Ransomware πŸ•΄

Fairfax County Public Schools has launched an investigation following a ransomware attack on some of its technology systems.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-20432

D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.

πŸ“– Read

via "National Vulnerability Database".
❌ TikTok Fixes Flaws That Opened Android App to Compromise ❌

The flaws are disclosed as Oracle reportedly partners with TikTok as concerns in the U.S. over spying continue.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2019-0233

An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-0230

Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
❌ Cloud Leak Exposes 320M Dating-Site Records ❌

A misconfigured, Mailfire-owned Elasticsearch server impacted 70 dating and e-commerce sites, exposing PII and details such as romantic preferences.

πŸ“– Read

via "Threatpost".
πŸ” CISA Breaks Down Recent Chinese Nation State Cyber Activity πŸ”

A new advisory from CISA outlines recent tactics, techniques, and procedures (TTPs) used by Chinese nation state hackers to target US agencies; it also includes ATT&CK Framework TTPs.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2019-14756

An issue was discovered in KaiOS 1.0, 2.5, and 2.5.12.5. The pre-installed Email application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a specially crafted email to the victim that will inject HTML into the email application's UI as soon as the email is opened. At a bare minimum, this allows an attacker to take control over the Email application's UI (e.g., display a malicious prompt to the user asking them to re-enter their email credentials) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Through an Economics Lens: A Guide for CISOs πŸ•΄

An expert in economics and cybersecurity applies opportunity cost and other concepts of the "dismal science" to infosec roles.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ E-Commerce Sites Hit With New Attack on Magento πŸ•΄

The campaign targeted sites running Magento Version 1, a version of the e-commerce software that is past end-of-life.

πŸ“– Read

via "Dark Reading: ".