πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Military, Government Users Just as Bad About Password Hygiene as Civilians πŸ•΄

New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ EternalBlue Infections Persist πŸ•΄

Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.

πŸ“– Read

via "Dark Reading: ".
❌ E.U.: Tech Giants Face Big Fines, 1 Hour Limit to Remove Extremist Content ❌

The rules would apply to all hosting service providers offering services in the E.U., regardless of size, even if they’re not based there.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ How Secure are our Voting Systems for November 2018? πŸ•΄

Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the country's highly decentralized voting systems to safeguard the integrity of upcoming elections.

πŸ“– Read

via "Dark Reading: ".
❌ Researchers Heat Up Cold-Boot Attack That Works on All Laptops ❌

The attack bypasses BIOS mitigations for cold-boot compromise on models from Apple, Dell, Lenovo and all others made in the last 10 years.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” 5 ways to block spam calls πŸ”

Annoying spam calls are on the rise, and here's how to block 'em, explains TechRepublic's Tom Merritt

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 25 stories of the week ⚠

From the hidden camera found in an AirBnb room and the smart TVs now admitting to viewers they spied on them to Google Chrome creating passwords for you, and more!

πŸ“– Read

via "Naked Security".
⚠ Facebook’s robot coders step into the future of programming ⚠

Like a good junior programmer, Facebook's AI is cutting its teeth with a bit of bug fixing.

πŸ“– Read

via "Naked Security".
⚠ On the hook! Phishing trip nets β€œBarbara” 5 years and whopping fine ⚠

The romance and business email compromise scammer pled guilty to fraud amounting to $25m.

πŸ“– Read

via "Naked Security".
⚠ Deepfake pics and videos set off Facebook’s fake news detector ⚠

The social network is expanding its effort to stamp out fake news.

πŸ“– Read

via "Naked Security".
πŸ” Top 5 ways to block spam calls πŸ”

Those annoying spam calls are on the rise, but TechRepublic's Tom Merritt has 5 solutions

πŸ“– Read

via "Security on TechRepublic".
⚠ Vote now! Which web browser do you trust the most? ⚠

Your web browser goes with you everywhere on the web. But how much do you trust it?

πŸ“– Read

via "Naked Security".
πŸ•΄ The 7 Habits of Highly Effective Security Teams πŸ•΄

Security requires smart people, processes, and technology. Too often, the "people" portion of the PPT equation is neglected.

πŸ“– Read

via "Dark Reading: ".
❌ CSS-Based Attack Causes iOS, macOS Devices to Crash ❌

The attack stems from a glitch in WebKit, an HTML layout browser engine in Apple’s Safari browser.

πŸ“– Read

via "The first stop for security news | Threatpost ".
ATENTIONβ€Ό New - CVE-2017-15705

A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed tags in emails that cause markup to be handled incorrectly leading to scan timeouts. In Apache SpamAssassin, using HTML::Parser, we setup an object and hook into the begin and end tag event handlers In both cases, the "open" event is immediately followed by a "close" event - even if the tag *does not* close in the HTML being parsed. Because of this, we are missing the "text" event to deal with the object normally. This can cause carefully crafted emails that might take more scan time than expected leading to a Denial of Service. The issue is possibly a bug or design decision in HTML::Parser that specifically impacts the way Apache SpamAssassin uses the module with poorly formed html. The exploit has been seen in the wild but not believed to have been purposefully part of a Denial of Service attempt. We are concerned that there may be attempts to abuse the vulnerability in the future.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-9045

A code execution vulnerability exists in ProcessMaker Enterprise Core 3.0.1.7-community. A specially crafted web request can cause unsafe deserialization potentially resulting in PHP code being executed. An attacker can send a crafted web parameter to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ransomware Takes Down Airport's Flight Information Screens πŸ•΄

The attack left airport staff to post flight times and gates on whiteboards at Bristol Airport in Britain.

πŸ“– Read

via "Dark Reading: ".
❌ Old WordPress Plugin Being Exploited in RCE Attacks ❌

Old instances of the popular WordPress Duplicator Plugin are leaving sites open to remote code execution attacks.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Facebook Now Offers Bounties For Access Token Exposure ❌

The newly expanded Facebook bug bounty program sniffs out access token exposure flaws.

πŸ“– Read

via "The first stop for security news | Threatpost ".
ATENTIONβ€Ό New - CVE-2017-2777

An exploitable heap overflow vulnerability exists in the ipStringCreate function of Iceni Argus Version 6.6.05. A specially crafted pdf file can cause an integer overflow resulting in heap overflow. An attacker can send file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-14443

An exploitable information leak vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly checks the number of GET parameters supplied, leading to an arbitrarily controlled information leak on the whole device memory. An attacker can send an authenticated HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".