πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2014-5431

Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 contains a hard-coded password, which provides access to basic biomedical information, limited device settings, and network configuration of the WBM, if connected. The hard-coded password may allow an attacker with physical access to the device to access management functions to make unauthorized configuration changes to biomedical settings such as turn on and off wireless connections and the phase-complete audible alarm that indicates the end of an infusion phase. Baxter has released a new version of the SIGMA Spectrum Infusion System, version 8, which incorporates hardware and software changes.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-5401

Hospira MedNet software version 5.8 and prior uses vulnerable versions of the JBoss Enterprise Application Platform software that may allow unauthenticated users to execute arbitrary code on the target system. Hospira has developed a new version of the MedNet software, MedNet 6.1. Existing versions of MedNet can be upgraded to MedNet 6.1.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-2807

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the ?Total Record Size? field. By sending a datagram to the service over Port 4444/UDP with the ?Record Data Size? field modified to a specifically oversized value, the service will calculate an undersized value for the ?Total Record Size? that will cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-2806

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the ?End of Current Record? field. By sending a datagram to the service over Port 4444/UDP with the ?Record Data Size? field modified to a specifically oversized value, the service will calculate an undersized value for the ?Total Record Size.? Then the service will calculate an incorrect value for the ?End of Current Record? field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 87% of Cloud Pros Say Visibility Masks Security πŸ•΄

The majority of cloud IT professionals find a direct link between network visibility and business value, new data shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 barriers to AI security adoption πŸ”

AI's immaturity and the lack of time and resources needed to implement the technology are the two top hurdles to adoption, according to a Cylance report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The Dark Web: Here's what criminals can find out about you πŸ”

Graham Kates, an investigative reporter, shares the types of data cybercriminals can look up about anyone on the Dark Web.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Data Privacy Manifestos: Competitive Advantage or the Start of Something Bigger? πŸ•΄

Facebook is the latest company to weigh in with a corporate manifesto focused on privacy. Though it's a welcome trend, only time will tell how many follow through.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-2805

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the ?Record Data Size? field. By sending a datagram to the service over Port 4444/UDP with the ?Record Data Size? field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5305

The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product?s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Insurers Collaborate on Cybersecurity Ratings πŸ•΄

A group of insurers will base rates and terms on whether customers purchase technology that has earned a stamp of approval.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Small Businesses Turn to Managed Service Providers for Security πŸ•΄

The average cost of a cyberattack at an SMB is $54,650, a new study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ ASUS 'ShadowHammer' Attack Underscores Trusted Third-Party Risks πŸ•΄

Taiwanese computer maker says it has fixed issue that allowed attackers to distribute malware via company's automatic software update mechanism.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Russia Regularly Spoofs Regional GPS πŸ•΄

The nation is a pioneer in spoofing and blocking satellite navigation signals, causing more than 9,800 incidents in the past three years, according to an analysis of navigational data.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-10744

In Select2 through 4.0.5, as used in Snipe-IT and other products, rich selectlists allow XSS. This affects use cases with Ajax remote data loading when HTML templates are used to display listbox data.

πŸ“– Read

via "National Vulnerability Database".
⚠ DragonEx exchange hacked, smoking ashes being raked over ⚠

β€œPart” of its assets have been retrieved, and they've got an address for a suddenly much plumper Bittrex wallet.

πŸ“– Read

via "Naked Security".
⚠ Preinstalled Android apps are harvesting and sharing your data ⚠

New research reveals that the bloatware preinstalled on many new Android phones could do far more than simply chew up your storage.

πŸ“– Read

via "Naked Security".
❌ Ransomware Behind Norsk Hydro Attack Takes On Wiper-Like Capabilities ❌

Researchers are still looking for answers when it comes to LockerGoga's initial infection method - and what the attackers behind the ransomware really want.

πŸ“– Read

via "Threatpost".
πŸ” 6 things keeping IoT pros up at night πŸ”

Implementation and security are the top concerns among professionals involved in the Internet of Things, according to a survey from the organizers of IoT World 2019.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 3 security threats businesses need to prepare for by 2021 πŸ”

IoT and digital transformation efforts will leave more businesses vulnerable to cyberattack, according to Information Security Forum.

πŸ“– Read

via "Security on TechRepublic".
⚠ Facebook’s Whitehat Settings lets bug-hunters dial back app security ⚠

The "Whitehat" settings will help researchers to analyze network traffic from its mobile apps by dialling back security settings.

πŸ“– Read

via "Naked Security".