πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-12190

Insufficient input validation in Intel CSME subsystem before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before 3.1.60 or 4.0.10 may allow privileged user to potentially execute arbitrary code via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12189

Unhandled exception in Content Protection subsystem in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before 3.1.60 or 4.0.10 may allow privileged user to potentially modify data via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12189

Unhandled exception in Content Protection subsystem in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before 3.1.60 or 4.0.10 may allow privileged user to potentially modify data via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12188

Insufficient input validation in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before version 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially modify data via physical access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12187

Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12185

Insufficient input validation in Intel(R) AMT in Intel(R) CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially execute arbitrary code via physical access.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ransomware's New Normal πŸ•΄

GandCrab's evolution underscores a shift in ransomware attack methods.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Criminals Use One Line of Code to Steal Card Data from E-Commerce Sites πŸ•΄

New JavaScript Sniffer is similar to malware used in the Magecart campaign last year that affected over 800 sites.

πŸ“– Read

via "Dark Reading: ".
⚠ Will the next version of Android get location privacy right? ⚠

Google has confirmed that improved control over location tracking is one of several new privacy features in the next version of its mobile OS, Android Q.

πŸ“– Read

via "Naked Security".
⚠ How to make DuckDuckGo your default Chrome search engine ⚠

Good news for the privacy-conscious. Chrome 73, released Tuesday, now includes the DuckDuckGo search engine as an option.

πŸ“– Read

via "Naked Security".
⚠ Facebook outage coincides with (or causes?) 3m new Telegram users ⚠

A worldwide, nearly day-long outage at Facebook led to Telegram having a busy, busy day.

πŸ“– Read

via "Naked Security".
⚠ Ep. 023 – Facebook promises and Google Chrome patches [PODCAST] ⚠

Here's the latest Naked Security podcast - listen now, and tell your friends and colleagues about us, too!

πŸ“– Read

via "Naked Security".
πŸ” How to view passwords in Android Chrome πŸ”

If you can't remember a password for a website you know Chrome saved, you can view it with these tips.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ On Norman Castles and the Internet πŸ•΄

When the Normans conquered England, they built castles to maintain security. But where are the castles of the Internet?

πŸ“– Read

via "Dark Reading: ".
⚠ You left WHAT on that USB drive?! ⚠

Nudies, taxes, and memos - oh, my! Research shows that even if we think we've deleted content on the sticks, we're leaving all that and more.

πŸ“– Read

via "Naked Security".
❌ Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection ❌

An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.

πŸ“– Read

via "Threatpost".
πŸ•΄ Proof-of-Concept Tracking System Finds RATs Worldwide πŸ•΄

Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.

πŸ“– Read

via "Dark Reading: ".
πŸ” How an unsecured Elasticsearch server exposed customer order information and passwords πŸ”

Chinese e-commerce giant Globalegrow left personally identifiable information and account credentials exposed, leading security researchers to call them "delusional."

πŸ“– Read

via "Security on TechRepublic".
⚠ Sextortion – what’s new, and what to do [VIDEO] ⚠

Share this video with your less tech-savvy friends and family to set their minds at rest about sextortion.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five: 3/15 Edition πŸ”

Building a better voting machine, a government tool to secure critical infrastructure, and the Facebook outage heard around the world - catch up on the week's news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Could Beto O'Rourke Become the First Hacker President? πŸ•΄

New report details the Democratic candidate's time as a member of Cult of the Dead Cow.

πŸ“– Read

via "Dark Reading: ".