πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Years-Long Phishing Campaign Targets Saudi Gov Agencies ❌

The campaign, codenamed β€œBad Tidings,” has sought out victims’ credentials with clever fake landing pages pretending to be the Saudi Arabian Ministry of Interior’s e-Service portal.

πŸ“– Read

via "Threatpost".
❌ Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats ❌

Experts from Gartner, Lookout and Google talk enterprise mobile security in this webinar replay.

πŸ“– Read

via "Threatpost".
❌ Mac-Focused Malvertising Campaign Abuses Google Firebase DBs ❌

Researchers said 1 million user sessions could have been exposed to the campaign, which downloads the Shlayer trojan.

πŸ“– Read

via "Threatpost".
πŸ•΄ Researchers Seek Out Ways to Search IPv6 Space πŸ•΄

Security researchers regularly search IPv4 address space looking for servers with ports exposing vulnerable software. With the massive number of IPv6 addresses, however, they have lost that ability. Can tricks and workarounds save the day?

πŸ“– Read

via "Dark Reading: ".
⚠ FBI crackdown on DDoS-for-hire sites led to 85% slash in attack sizes ⚠

According to a new report, average and maximum DDoS attack sizes decreased by 85.36% and 23.91%.

πŸ“– Read

via "Naked Security".
⚠ Opera brings back free VPN service to its Android browser ⚠

Opera lost its Android browser's VPN after it was sold to a Chinese consortium, but now it's back.

πŸ“– Read

via "Naked Security".
⚠ Flaw in popular PDF creation library enabled remote code execution ⚠

A researcher has discovered a high-severity bug in a popular PHP library used for creating PDFs.

πŸ“– Read

via "Naked Security".
⚠ Researcher finds new way to sniff Windows BitLocker encryption keys ⚠

A researcher has published a new and relatively simple way that Windows BitLocker encryption keys can be sniffed in less secure configurations as they travel from Trusted Platform Modules (TPMs) during boot.

πŸ“– Read

via "Naked Security".
❌ Cisco Patches High-Severity Flaws in IP Phones ❌

The most serious vulnerabilities in Cisco's 8800 Series IP Phones could allow unauthenticated, remote attackers to conduct a cross-site request forgery attack or write arbitrary files to the filesystem.

πŸ“– Read

via "Threatpost".
πŸ” Why digital transformation could open you up to a DDoS attack πŸ”

One hour of downtime from a DDoS attack costs an average of $221,837 globally, according to Netscout.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Vulnerability in Android Instant Apps can be used to steal history, authentication tokens πŸ”

Google's Instant Apps feature allows you to try apps before installing them, though a vulnerability allows attackers to abuse the feature to steal data.

πŸ“– Read

via "Security on TechRepublic".
❌ MyPillow and Amerisleep Targeted in Magecart Group Attacks ❌

In both breaches of MyPillow and Amerisleep, the customers whose payment information was potentially stolen were not informed.

πŸ“– Read

via "Threatpost".
πŸ” How to encrypt files with FinalCrypt πŸ”

If you're looking for an encryption tool that offers a unique approach and a well-designed GUI, FinalCrypt might be just the tool.

πŸ“– Read

via "Security on TechRepublic".
❌ Facebook Stored Passwords in Plain Text For Years ❌

The social media giant said that it is notifying users whose passwords it stored in plain text, which made them accessible for Facebook employees to view.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-10093

AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-10091

AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow XSS.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-2659

It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-1713

IBM InfoSphere Streams 4.2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 134632.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-16232

** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-16231

** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used.

πŸ“– Read

via "National Vulnerability Database".