πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-28487 β€Ό

This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4766 β€Ό

IBM MQ Internet Pass-Thru 2.1 and 9.2 could allow a remote user to cause a denial of service by sending malformed MQ data requests which would consume all available resources. IBM X-Force ID: 188093.

πŸ“– Read

via "National Vulnerability Database".
🦿 Expert: Manpower is a huge cybersecurity issue in 2021 🦿

Changing threats, volume of threats, and ransomware plague organizations. Having some autonomous AI tools to help pros do their jobs can help.

πŸ“– Read

via "Tech Republic".
🦿 Cybersecurity pros can't handle all the threat tasks alone, expert says 🦿

Having an AI tool to help can ease the burden on cybersecurity teams, which are struggling to keep up with constant and more serious threats.

πŸ“– Read

via "Tech Republic".
🦿 Cybersecurity: Blaming users is not the answer 🦿

A punitive approach toward employees reporting data breaches intensifies problems.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-12514 β€Ό

Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12513 β€Ό

Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12525 β€Ό

M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12511 β€Ό

Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12512 β€Ό

Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Cybersecurity Newbs Can Start Out on the Right Foot πŸ•΄

Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Speed of Digital Transformation May Lead to Greater App Vulnerabilities πŸ•΄

The fastest-moving industries are struggling to produce secure code, according to AppSec experts.

πŸ“– Read

via "Dark Reading".
❌ Amazon Kindle RCE Attack Starts with an Email ❌

The "KindleDrip" attack would have allowed attackers to siphon money from unsuspecting victims.

πŸ“– Read

via "Threat Post".
❌ Microsoft Edge, Google Chrome Roll Out Password Protection Tools ❌

The new tools on Chrome and Edge will make it easier for browser users to discover - and change - compromised passwords.

πŸ“– Read

via "Threat Post".
🦿 Microsoft President urges tech leaders to follow lessons from Apollo missions and "War Games" 🦿

President Brad Smith said that national security is threatened by the industry's inability to learn lessons from the past.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Intel Confirms Unauthorized Access of Earnings-Related Data πŸ•΄

News likely contributed to slide of over 9% in chipmaker's stock at one point Friday.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Comparing Different AI Approaches to Email Security πŸ•΄

Get to know the difference between "supervised" and "unsupervised" machine learning.

πŸ“– Read

via "Dark Reading".
πŸ›  AIDE 0.17 πŸ› 

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Logwatch 7.5.5 πŸ› 

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

πŸ“– Read

via "Packet Storm Security".
⚠ US administration adds β€œsubliminal” ad to White House website ⚠

Hiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!

πŸ“– Read

via "Naked Security".
πŸ•΄ How to Better Secure Your Microsoft 365 Environment πŸ•΄

Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments.

πŸ“– Read

via "Dark Reading".