πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Debunking 5 Myths About Zero Trust Security πŸ•΄

cc

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deep Instinct Touts Predictive Aspects of Deep Learning πŸ•΄

Deep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company's security posture, says Deep Instinct's Guy Caspi. Deep learning's predictive capabilities also change the security management equation reactive to proactive, an important breakthrough in forecasting and risk management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deep Instinct Touts Predictive Aspects of Deep Learning πŸ•΄

Deep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company's security posture, says Deep Instinct's Guy Caspi. Deep learning's predictive capabilities also change the security management equation reactive to proactive, an important breakthrough in forecasting and risk management.

πŸ“– Read

via "Dark Reading: ".
πŸ” 5G cybersecurity concerns and physical challenges: What you need to know πŸ”

Dan Patterson discusses how 5G will enable IoT, AR, VR, 3D renderings, and more. He also talks about the numerous cybersecurity concerns with 5G.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 5G cybersecurity concerns and physical challenges: What you need to know πŸ”

Dan Patterson discusses how 5G will enable IoT, AR, VR, 3D renderings, and more. He also talks about the numerous cybersecurity concerns with 5G.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ IoT Anomaly Detection 101: Data Science to Predict the Unexpected πŸ•΄

Yes! You can predict the chance of a mechanical failure or security breach before it happens . Here's how.

πŸ“– Read

via "Dark Reading: ".
❌ RSA Conference 2019: Ultrasound Hacked in Two Clicks ❌

In a proof-of-concept hack, researchers penetrated an ultrasound and were able to download and manipulate patient files, then execute ransomware.

πŸ“– Read

via "Threatpost".
❌ RSA Conference 2019: Firms Continue to Fail at IoT Security ❌

IoT is growing more popular in the home - and so to are the attacks that target these devices featuring valuable data, researchers said at RSA 2019.

πŸ“– Read

via "Threatpost".
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How digital transformation affects the people of New York City πŸ”

Dan Patterson spoke with the deputy CTO for the NYC mayor's office about taking a community-centered approach to digital transformation and cybersecurity, as well as its Moonshot Challenge.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How China & Russia Use Social Media to Sway the West πŸ•΄

Researchers break down the differences in how China and Russia use social media to manipulate American audiences.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Twitter, Facebook, NSA Discuss Fight Against Misinformation πŸ•΄

RSA panelists address the delicate technical challenges of combating information warfare online without causing First Amendment freedoms to take collateral damage.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-0192

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-18816

The repository component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, TIBCO Jaspersoft Reporting and Analytics for AWS contains a persistent cross site scripting vulnerability. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi- Tenancy versions up to and including 7.1.0, and TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-18815

The REST API component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability that theoretically allows unauthenticated users to bypass authorization checks for portions of the HTTP interface to the JasperReports Server. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, and TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-18809

The default server implementation of TIBCO Software Inc.'s TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a directory-traversal vulnerability that may theoretically allow web server users to access contents of the host system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Library: versions up to and including 6.3.4; 6.4.1; 6.4.2; 6.4.21; 7.1.0; 7.2.0, TIBCO JasperReports Library Community Edition: versions up to and including 6.7.0, TIBCO JasperReports Library for ActiveMatrix BPM: versions up to and including 6.4.21, TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.3; 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-18808

The domain management component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a race-condition vulnerability that may allow any users with domain save privileges to gain superuser privileges. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, and TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Phishing Attacks Evolve as Detection & Response Capabilities Improve πŸ•΄

Social engineering scam continued to be preferred attack vector last year, but attackers were forced to adapt and change.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Companies Having Trouble Translating Security to Mobile Devices πŸ•΄

As more enterprise work takes place on mobile devices, more companies are feeling insecure about the security of their mobile fleet, according to a new Verizon report.

πŸ“– Read

via "Dark Reading: ".
πŸ” How digital transformation affects the people of New York City πŸ”

Dan Patterson spoke with the deputy CTO for the NYC mayor's office about taking a community-centered approach to digital transformation and cybersecurity, as well as its Moonshot Challenge.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why the NYCx Cybersecurity Moonshot Challenge is relatable to small businesses and entrepreneurs πŸ”

The deputy CTO for the New York City mayor's office explains why a people-centered approach is key to smart cities, STEM programs, and any technology, and ultimately to a better society.

πŸ“– Read

via "Security on TechRepublic".