πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-15818

In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while loading a user application in qseecom, an integer overflow could potentially occur if the application partition size is rounded up to page_size.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Security Costs of Cloud-Native Applications πŸ•΄

More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack πŸ•΄

Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-6913

Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.3-rev28 allows remote attackers to inject arbitrary web script or HTML via the event attribute in a time tag.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-3912

Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.

πŸ“– Read

via "National Vulnerability Database".
⚠ How Facebook wants to protect political campaigners from hacking ⚠

The social network is trying to protect candidates, elected officials and their staff from "hackers and foreign adversaries".

πŸ“– Read

via "Naked Security".
πŸ” The 5 biggest blockchain myths, debunked πŸ”

Blockchain stands to revolutionize many industries, but many people are still unsure of how the distributed ledger technology underpinning Bitcoin works.

πŸ“– Read

via "Security on TechRepublic".
⚠ Years on, third party apps still exposing Grindr users’ locations ⚠

A third party app can use Grindr’s distance data to pinpoint a users location down to a room within a house.

πŸ“– Read

via "Naked Security".
⚠ Here we Mongo again! Millions of records exposed by insecure database ⚠

Another day, another poorly configured MongoDB database.

πŸ“– Read

via "Naked Security".
⚠ iOS 12 is here: these are the security features you need to know about ⚠

One year to the day after iOS 11 appeared, Apple yesterday released its replacement, iOS 12.

πŸ“– Read

via "Naked Security".
❌ XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins ❌

A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ A Hybrid Solution to Taming SOC Alert Overload ❌

Technology can free analysts from the burden of manual and tedious tasks so they can operate at the highest level of their abilities.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ 8 Keys to a Successful Penetration Test πŸ•΄

Pen tests are expensive, but there are key factors that can make them worth the investment.

πŸ“– Read

via "Dark Reading: ".
⚠ URL spoofing – what it is and what to do about it [VIDEO] ⚠

What happens if your browser doesn't tell you the truth about the identity of the website you're looking at?

πŸ“– Read

via "Naked Security".
πŸ•΄ 5 Steps to Success for New CISOs πŸ•΄

You've been hired to make an impact. These tips can help set you up for continued success.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI: Phishing Attacks Aim to Swap Payroll Information πŸ•΄

Social engineering scams target employees' payroll credentials so attackers can access and change their bank account data.

πŸ“– Read

via "Dark Reading: ".
πŸ” How credential stuffing contributed to 8.3B malicious botnet logins in early 2018 πŸ”

Malicious login attempts from bots increased by by almost 2 billion from April to May 2018. Here's who is at risk.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-1794

IBM Tivoli Monitoring 6.2.3 through 6.2.3.5 and 6.3.0 through 6.3.0.7 are vulnerable to both TEPS user privilege escalation and possible denial of service due to unconstrained memory growth. IBM X-Force ID: 137039.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Risk Management Struggle πŸ•΄

The majority of organizations are struggling to implement a risk-based approach to security - even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!

πŸ“– Read

via "Dark Reading: ".
❌ Critical Out-of-Band Patch Issued for Adobe Acrobat Reader ❌

Overall seven flaws were patched - including one critical vulnerability that could lead to arbitrary code execution.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Mirai Masterminds Helping FBI Snuff Out Cybercrime ❌

The three hackers behind the infamous Mirai botnet have been helping law enforcement take down cybercriminals across the globe.

πŸ“– Read

via "The first stop for security news | Threatpost ".