πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk ❌

Federal prosecutors charged two men with crimes that carry up to 20 years in prison.

πŸ“– Read

via "Threat Post".
πŸ•΄ 'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness πŸ•΄

To protect your organization from all emerging file-borne threats, the security and leadership teams must align to develop a streamlined approach to file security.

πŸ“– Read

via "Dark Reading".
❌ Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs ❌

Cybercriminals set up three different CAPTCHAs that Office 365 targets must click through before the final phishing page.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-16844 β€Ό

In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to add clients to the Graylog system log manager 🦿

Graylog makes it easy to send syslog information from clients to the hosting server. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Imperva Agrees to Buy jSonar πŸ•΄

The deal is expected to close in mid-October.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros πŸ•΄

From WarGames, to Aaron Swartz, to bug bounties, to Van Buren, here's what cybersecurity researchers should know about the US's primary anti-hacking law before it gets its day in the Supreme Court.

πŸ“– Read

via "Dark Reading".
πŸ•΄ US Treasury Warns of Sanctions Violations for Paying Ransomware Attackers πŸ•΄

An alarming new advisory issued today by the federal government could upend ransomware response.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-15673 β€Ό

Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15533 β€Ό

In Zoho ManageEngine Application Manager 14.7 Build 14730 (before 14684, and between 14689 and 14750), the AlarmEscalation module is vulnerable to unauthenticated SQL Injection attack.

πŸ“– Read

via "National Vulnerability Database".
❌ QR Codes: A Sneaky Security Threat ❌

What to watch out for, and how to protect yourself from malicious versions of these mobile shortcuts.

πŸ“– Read

via "Threat Post".
πŸ•΄ New HP Bug Bounty Program Targets Vulns in Printer Cartridges πŸ•΄

White-hat hackers will receive $10,000 for each security bug they discover plus a base fee, under this invitation-only initiative.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Singapore Asks Big Cybersecurity Questions to Improve National Defense πŸ•΄

An executive from Singapore's Cyber Security Agency examines the role of security in a nation increasingly dependent on technology.

πŸ“– Read

via "Dark Reading".
🦿 Cybersecurity best practices: An open letter to end users 🦿

In an effort to make IT pros' jobs easier, Jack Wallen offers cybersecurity tips to end users--in particular, what not to do to keep company networks, equipment, and data secure.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-5787 β€Ό

Relative Path Traversal in Teltonika firmware TRB2_R_00.02.04.3 allows a remote, authenticated attacker to delete arbitrary files on disk via the admin/services/packages/remove action.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5786 β€Ό

Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9486 β€Ό

In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26524 β€Ό

CodeLathe FileCloud before 20.2.0.11915 allows username enumeration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26538 β€Ό

An issue was discovered in Foxit Reader and PhantomPDF before 10.1. It allows attackers to execute arbitrary code via a Trojan horse taskkill.exe in the current working directory.

πŸ“– Read

via "National Vulnerability Database".
⚠ Serious Security: Phishing without links – when phishers bring along their own web pages ⚠

How do you "check the URL before you click" if the web page you're visiting is already on your own computer?

πŸ“– Read

via "Naked Security".