πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Container Deployments Bring Security Woes at DevOps Speed πŸ•΄

Nearly half of all companies know that they're deploying containers with security flaws, according to a new survey.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Web Vulnerabilities Up, IoT Flaws Down πŸ•΄

The number of flaws found in WordPress and its associated plugins have tripled since 2017, while Internet of Things vulnerabilities dropped significantly, according to data collected by Imperva.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-0282

A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0181

A vulnerability in the Redis implementation used by the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software could allow an unauthenticated, remote attacker to modify key-value pairs for short-lived events stored by the Redis server. The vulnerability is due to improper authentication when accessing the Redis server. An unauthenticated attacker could exploit this vulnerability by modifying key-value pairs stored within the Redis server database. An exploit could allow the attacker to reduce the efficiency of the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10736

The "Social Pug - Easy Social Share Buttons" plugin before 1.2.6 for WordPress allows XSS via the wp-admin/admin.php?page=dpsp-toolkit dpsp_message_class parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ Supreme Court refuses to hear Fiat Chrysler appeal in Jeep hacking case ⚠

The court's action means that one of the first legal cases involving cyber security risks in cars will go to trial in October.

πŸ“– Read

via "Naked Security".
⚠ Update now! Microsoft and Adobe’s January 2019 Patch Tuesday is here ⚠

After a busy sequence of updates in October, November, and December, the new year’s first Patch Tuesday promises a lighter workload.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Best Practices for Managing an Online Educational Infrastructure πŸ•΄

Universities must keep pace with rapidly changing technology to help thwart malicious hacking attempts and protect student information.

πŸ“– Read

via "Dark Reading: ".
❌ Google Search Results Spoofed to Create Fake News ❌

The technique can be used to spread disinformation while leveraging the trust people have in Google's search results.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ β€˜Unprecedented’ DNS Hijacking Attacks Linked to Iran ❌

The attacks, targeting several countries to redirect traffic and harvest credentials, have been linked to Iran.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Google: G Suite Now Alerts Admins to Data Exfiltration πŸ•΄

New additions to the G Suite alert center are intended to notify admins of phishing and data exports.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Consumers Demand Security from Smart Device Makers πŸ•΄

Poll shows individuals want better security from IoT device manufacturers as connected products flood the market.

πŸ“– Read

via "Dark Reading: ".
πŸ” CES 2019: How Winston can protect consumers and smart offices from identity thieves πŸ”

Winston is an online privacy device that sits between a modem and router to protect the user's online browsing and identity.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Ryuk Ransomware Attribution May Be Premature πŸ•΄

The eagerness to tie recent Ryuk ransomware attacks to a specific group could be rushed, researchers say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Election Security Isn't as Bad as People Think πŸ•΄

Make no mistake, however: We'll always have to be on guard. And we can take some lessons from the world of industrial cybersecurity.

πŸ“– Read

via "Dark Reading: ".
⚠ Facebook violated tough new cybersecurity law, says Vietnam ⚠

The law brought sweeping new powers, allowing authorities to force technology companies to hand over user data and to censor posts.

πŸ“– Read

via "Naked Security".
⚠ You can’t delete Facebook from some Androids and people aren’t happy ⚠

The #DeleteFacebook movement may be growing, but many Samsung users are having a tough time scraping the social network’s preinstalled software from their phones.

πŸ“– Read

via "Naked Security".
πŸ•΄ Reddit Alerts Users to Possible Account Breaches πŸ•΄

User lockouts, combined with requirements for new passwords, indicate an attack on accounts at the popular social media platform.

πŸ“– Read

via "Dark Reading: ".
❌ At CES, Focus is On β€˜Cool Factor’ Not IoT Security ❌

When it comes to IoT, the priority at CES is the "wow factor" - but not so much a focus on security.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ DNS Hijacking Campaign Targets Organizations Globally πŸ•΄

A group believed to be operating out of Iran has manipulated DNS records belonging to dozens of firms in an apparent cyber espionage campaign, FireEye says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Software Side-Channel Attack Raises Risk for Captured Crypto πŸ•΄

The new attack hits operating systems, not chips, and may give criminals the keys to a company's cryptography.

πŸ“– Read

via "Dark Reading: ".