πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” What is HIPAA Compliance? πŸ”

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Digital Guardian".
🦿 Cloud and remote work support strengthened US market performance 🦿

The IT outlook for 2021, top trends and guidance as the enterprise prepares for "the next normal," according to a new report from IDC.

πŸ“– Read

via "Tech Republic".
❌ RAINBOWMIX Apps in Google Play Serve Up Millions of Ad Fraud Victims ❌

Collectively, 240 fraudulent Android apps -- masquerading as retro game emulators -- account for 14 million installs.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-9048 β€Ό

A vulnerability in victor Web Client versions up to and including v5.4.1 could allow a remote unauthenticated attacker to delete arbitrary files on the system or render the system unusable by conducting a Denial of Service attack.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce πŸ•΄

Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-15241 β€Ό

TYPO3 Fluid Engine (package `typo3fluid/fluid`) before versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like `{showFullName ? fullName : defaultValue}`. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) versions as well: TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.4) and TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15242 β€Ό

Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4.

πŸ“– Read

via "National Vulnerability Database".
🦿 COVID-19 budgets, data security, and automation are concerns of IT leaders and staff 🦿

Dueling surveys from Kaseya showed that IT department leaders share their underlings' worries about security and productivity.

πŸ“– Read

via "Tech Republic".
🦿 Password managers: A cheat sheet for professionals 🦿

The sheer number of passwords the average person has can lead to confusion and tons of password retrieval emails. Simplify and secure your digital life by learning about password managers.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-15243 β€Ό

Affected versions of Smartstore have a missing WebApi Authentication attribute. This vulnerability affects Smartstore shops in version 4.0.0 & 4.0.1 which have installed and activated the Web API plugin. Users of Smartstore 4.0.0 and 4.0.1 must merge their repository with 4.0.x or overwrite the file SmartStore.Web.Framework in the */bin* directory of the deployed shop with this file. As a workaround without updating uninstall the Web API plugin to close this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26162 β€Ό

Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26921 β€Ό

Certain NETGEAR devices are affected by authentication bypass. This affects GS110EMX before 1.0.1.7, GS810EMX before 1.7.1.3, XS512EM before 1.0.1.3, and XS724EM before 1.0.1.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective πŸ•΄

In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

πŸ“– Read

via "Dark Reading".
❌ Wormable Apple iCloud Bug Allows Automatic Photo Theft ❌

Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep1: Ransomware – is it really OK to pay? – Naked Security Podcast ⚠

The Naked Security Podcast is back for Series 3 - here's Episode 1!

πŸ“– Read

via "Naked Security".
πŸ•΄ Why MSPs Are Hacker Targets, and What To Do About It πŸ•΄

Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-9105 β€Ό

Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13955 β€Ό

HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.

πŸ“– Read

via "National Vulnerability Database".
❌ Facebook Debuts Bug-Bounty β€˜Loyalty Program’ ❌

Facebook bounty hunters will be placed into tiers by analyzing their score, signal and number of submitted bug reports -- which will dictate new bonus percentages.

πŸ“– Read

via "Threat Post".
🦿 The new Ring Always Home Camera is a security disaster in the making 🦿

Jack Wallen offers his take on the upcoming release of the Ring Always Home Cam.

πŸ“– Read

via "Tech Republic".
🦿 Could Microsoft be en route to dumping Windows in favor of Linux? 🦿

Microsoft Linux is the next evolution of the Microsoft desktop operating system, argues Jack Wallen. He explains why this would be a win-win for Microsoft, IT pros, users, and the Linux community.

πŸ“– Read

via "Tech Republic".