πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2013-2806

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the ?End of Current Record? field. By sending a datagram to the service over Port 4444/UDP with the ?Record Data Size? field modified to a specifically oversized value, the service will calculate an undersized value for the ?Total Record Size.? Then the service will calculate an incorrect value for the ?End of Current Record? field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 87% of Cloud Pros Say Visibility Masks Security πŸ•΄

The majority of cloud IT professionals find a direct link between network visibility and business value, new data shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 barriers to AI security adoption πŸ”

AI's immaturity and the lack of time and resources needed to implement the technology are the two top hurdles to adoption, according to a Cylance report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The Dark Web: Here's what criminals can find out about you πŸ”

Graham Kates, an investigative reporter, shares the types of data cybercriminals can look up about anyone on the Dark Web.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Data Privacy Manifestos: Competitive Advantage or the Start of Something Bigger? πŸ•΄

Facebook is the latest company to weigh in with a corporate manifesto focused on privacy. Though it's a welcome trend, only time will tell how many follow through.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-2805

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the ?Record Data Size? field. By sending a datagram to the service over Port 4444/UDP with the ?Record Data Size? field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5305

The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product?s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Insurers Collaborate on Cybersecurity Ratings πŸ•΄

A group of insurers will base rates and terms on whether customers purchase technology that has earned a stamp of approval.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Small Businesses Turn to Managed Service Providers for Security πŸ•΄

The average cost of a cyberattack at an SMB is $54,650, a new study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ ASUS 'ShadowHammer' Attack Underscores Trusted Third-Party Risks πŸ•΄

Taiwanese computer maker says it has fixed issue that allowed attackers to distribute malware via company's automatic software update mechanism.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Russia Regularly Spoofs Regional GPS πŸ•΄

The nation is a pioneer in spoofing and blocking satellite navigation signals, causing more than 9,800 incidents in the past three years, according to an analysis of navigational data.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-10744

In Select2 through 4.0.5, as used in Snipe-IT and other products, rich selectlists allow XSS. This affects use cases with Ajax remote data loading when HTML templates are used to display listbox data.

πŸ“– Read

via "National Vulnerability Database".
⚠ DragonEx exchange hacked, smoking ashes being raked over ⚠

β€œPart” of its assets have been retrieved, and they've got an address for a suddenly much plumper Bittrex wallet.

πŸ“– Read

via "Naked Security".
⚠ Preinstalled Android apps are harvesting and sharing your data ⚠

New research reveals that the bloatware preinstalled on many new Android phones could do far more than simply chew up your storage.

πŸ“– Read

via "Naked Security".
❌ Ransomware Behind Norsk Hydro Attack Takes On Wiper-Like Capabilities ❌

Researchers are still looking for answers when it comes to LockerGoga's initial infection method - and what the attackers behind the ransomware really want.

πŸ“– Read

via "Threatpost".
πŸ” 6 things keeping IoT pros up at night πŸ”

Implementation and security are the top concerns among professionals involved in the Internet of Things, according to a survey from the organizers of IoT World 2019.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 3 security threats businesses need to prepare for by 2021 πŸ”

IoT and digital transformation efforts will leave more businesses vulnerable to cyberattack, according to Information Security Forum.

πŸ“– Read

via "Security on TechRepublic".
⚠ Facebook’s Whitehat Settings lets bug-hunters dial back app security ⚠

The "Whitehat" settings will help researchers to analyze network traffic from its mobile apps by dialling back security settings.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 'Twitterverse' Is Not the Security Community πŸ•΄

The drama on social media belies the incredible role models, job, training, and networking opportunities found in the real world of traditional cybersecurity.

πŸ“– Read

via "Dark Reading: ".
⚠ Ep. 025 – Business Email Compromise and IoT surprises [PODCAST] ⚠

Here's our latest podcast - listen now!

πŸ“– Read

via "Naked Security".
❌ Cybercriminals Have a Heyday with WinRAR Bug in Fresh Campaigns ❌

With new attacks on the Israeli military and social-work educators, exploitation of the 19-year-old flaw shows no signs of slowing down.

πŸ“– Read

via "Threatpost".