πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 How to defend your organization against social engineering attacks 🦿

A security awareness program backed by multi-factor authentication can help protect your critical assets, says NordVPN Teams.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Digital Transformation Means Security Must Also Transform πŸ•΄

Being successful in this moment requires the ability to evolve in terms of team management, visibility, and crisis management.

πŸ“– Read

via "Dark Reading".
🦿 How to enable end-to-end encryption for the Nextcloud app 🦿

Learn how you can enable the new Nextcloud end-to-end encryption.

πŸ“– Read

via "Tech Republic".
🦿 How to manage your personal information for your Google account 🦿

In the name of security, you should make sure the information displayed on your Google account is limited. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
🦿 How to manage personal information for your Google account 🦿

In the name of security, make sure the information displayed on your Google account is limited. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2018-1725 β€Ό

IBM QRadar SIEM 7.3 and 7.4 n a multi tenant configuration could be vulnerable to information disclosure. IBM X-Force ID: 147440.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26507 β€Ό

A CSV Injection (also known as Formula Injection) vulnerability in the Marmind web application with version 4.1.141.0 allows malicious users to gain remote control of other computers. By providing formula code in the Ò€œNotesҀ� functionality in the main screen, an attacker can inject a payload into the Ò€œDescriptionҀ� field under the Ò€œInsert To-DoҀ� option. Other users might download this data, for example a CSV file, and execute the malicious commands on their computer by opening the file using a software such as Microsoft Excel. The attacker could gain remote access to the userÒ€ℒs PC.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4097 β€Ό

In HCL Notes version 9 previous to release 9.0.1 FixPack 10 Interim Fix 8, version 10 previous to release 10.0.1 FixPack 6 and version 11 previous to 11.0.1 FixPack 1, a vulnerability in the input parameter handling of the Notes Client could potentially be exploited by an attacker resulting in a buffer overflow. This could enable an attacker to crash HCL Notes or execute attacker-controlled code on the client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14240 β€Ό

HCL Notes versions previous to releases 9.0.1 FP10 IF8, 10.0.1 FP6 and 11.0.1 FP1 is susceptible to a Stored Cross-site Scripting (XSS) vulnerability. An attacker could use this vulnerability to execute script in a victim's Web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Ransomware Payments, Threats to Exfiltrate Data Are Up πŸ”

Not only is the average ransom payment going up, so are cases in which the attackers threaten to release a company's stolen data.

πŸ“– Read

via "Digital Guardian".
❌ Zoom Snooping: How Body Language Can Spill Your Password ❌

Researchers figure out how to read what people are typing during a Zoom call using shoulder movements.

πŸ“– Read

via "Threat Post".
❌ Gaming Giant Capcom Hit By Ragnar Locker Ransomware: Report ❌

The Resident Evil creator reportedly been hit in a ransomware attack that stole 1TB of sensitive data.

πŸ“– Read

via "Threat Post".
πŸ•΄ Bug Bounty Hunters' Pro Tips on Chasing Vulns & Money πŸ•΄

From meditation to the right mindset, seasoned vulnerability researchers give their advice on how to maximize bug bounty profits and avoid burnout.

πŸ“– Read

via "Dark Reading".
πŸ•΄ NSS Labs' Abrupt Shutdown Leaves Many Unanswered Questions πŸ•΄

Former execs and employees share some insights into the testing firm's shutdown. What does it mean for the future of security product testing?

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2003-1602 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2009-5104 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24439 β€Ό

Acrobat Reader DC for macOS versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a security feature bypass. While the practical security impact is minimal, a defense-in-depth fix has been implemented to further harden the Adobe Reader update process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2009-5105 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2000-1249 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5941 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1 and 15.1.0-15.1.0.5, using the RESOLV::lookup command within an iRule may cause the Traffic Management Microkernel (TMM) to generate a core file and restart. This issue occurs when data exceeding the maximum limit of a hostname passes to the RESOLV::lookup command.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2009-5069 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".