π΄ US Prosecutors Investigate Facebook's Data-Sharing Deals π΄
π Read
via "Dark Reading: ".
The news follows a long, tumultuous period of scandal around Facebook and its privacy practices.π Read
via "Dark Reading: ".
Dark Reading
US Prosecutors Investigate Facebook's Data-Sharing Deals
The news follows a long, tumultuous period of scandal around Facebook and its privacy practices.
π FTC Considering Making Changes to GLB Actβs Safeguards, Privacy Rule π
π Read
via "Subscriber Blog RSS Feed ".
New amendments to the rules, proposed last week and largely based on the New York State Department of Financial Servicesβ Cybersecurity Regulation, would better protect customer information held by financial institutions.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
FTC Considering Making Changes to GLB Actβs Safeguards, Privacy Rule
New amendments to the rules, proposed last week and largely based on the New York State Department of Financial Servicesβ Cybersecurity Regulation, would better protect customer information held by financial institutions.
ATENTIONβΌ New - CVE-2018-20801 (highcharts)
π Read
via "National Vulnerability Database".
In js/parts/SvgRenderer.js in Highcharts JS before 6.1.0, the use of backtracking regular expressions permitted an attacker to conduct a denial of service attack against the SVGRenderer component, aka ReDoS.π Read
via "National Vulnerability Database".
π΄ Anomaly Detection Techniques: Defining Normal π΄
π Read
via "Dark Reading: ".
The challenge is identifying suspicious events in training sets where no anomalies are encountered. Part two of a two-part series.π Read
via "Dark Reading: ".
Darkreading
Anomaly Detection Techniques: Defining Normal
The challenge is identifying suspicious events in training sets where no anomalies are encountered. Part two of a two-part series.
π βSecuring the mobile enterprise means thinking outside the VPN box π
π Read
via "Security on TechRepublic".
As employees access clouds and apps untethered to corporate networks, managers must create new security architectures.π Read
via "Security on TechRepublic".
TechRepublic
βSecuring the mobile enterprise means thinking outside the VPN box
As employees access clouds and apps untethered to corporate networks, managers must create new security architectures.
β Zero-Days in Counter-Strike Client Used to Build Major Botnet β
π Read
via "Threatpost".
A full 39 percent of Counter-Strike 1.6 game servers on Steam were found to be malicious.π Read
via "Threatpost".
Threat Post
Zero-Days in Counter-Strike Client Used to Build Major Botnet
A full 39 percent of Counter-Strike 1.6 game servers on Steam were found to be malicious.
β IMAP-Based Attacks Compromising Accounts at βUnprecedented Scaleβ β
π Read
via "Threatpost".
Attackers are increasingly using insecure legacy protocols, like IMAP, to bypass multi-factor authentication in password spraying campaigns.π Read
via "Threatpost".
Threat Post
Threatlist: IMAP-Based Attacks Compromising Accounts at βUnprecedented Scaleβ
Attackers are increasingly targeting insecure legacy protocols, like IMAP, to avoid running into multi-factor authentication in password-spraying campaigns.
ATENTIONβΌ New - CVE-2018-12215
π Read
via "National Vulnerability Database".
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12214
π Read
via "National Vulnerability Database".
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12213
π Read
via "National Vulnerability Database".
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12212
π Read
via "National Vulnerability Database".
Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12211
π Read
via "National Vulnerability Database".
Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12210
π Read
via "National Vulnerability Database".
Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12209
π Read
via "National Vulnerability Database".
Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read device configuration information via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12208
π Read
via "National Vulnerability Database".
Buffer overflow in HECI subsystem in Intel(R) CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel(R) TXE version before 3.1.60 or 4.0.10, or Intel(R) Server Platform Services before version 5.00.04.012 may allow an unauthenticated user to potentially execute arbitrary code via physical access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12205
π Read
via "National Vulnerability Database".
Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow unauthenticated user to potentially execute arbitrary code via physical access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12204
π Read
via "National Vulnerability Database".
Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially execute arbitrary code via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12203
π Read
via "National Vulnerability Database".
Denial of service vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel Core Processor, 7th Generation Intel Core Processor may allow privileged user to potentially execute arbitrary code via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12202
π Read
via "National Vulnerability Database".
Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12201
π Read
via "National Vulnerability Database".
Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12200
π Read
via "National Vulnerability Database".
Insufficient access control in Intel(R) Capability Licensing Service before version 1.50.638.1 may allow an unprivileged user to potentially escalate privileges via local access.π Read
via "National Vulnerability Database".