πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2014-5436

A directory traversal vulnerability exists in the confd.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, which could lead to possible information disclosure. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-5435

An arbitrary memory write vulnerability exists in the dual_onsrv.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, that could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Products Under EU Investigation About Data Collection πŸ•΄

A new inquiry aims to determine whether contracts between Microsoft and EU organizations violate GDPR.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 8 Steps to More Effective Small Business Security πŸ•΄

Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.

πŸ“– Read

via "Dark Reading: ".
❌ New Mirai Samples Grow the Number of Processors Targets ❌

Researchers said that they discovered new Mirai samples in February 2019, capable of infecting devices powered by a broadened range of processors.

πŸ“– Read

via "Threatpost".
❌ TP-Link Routers Vulnerable to Zero-Day Buffer Overflow Attack ❌

Consumer router models allowed authenticated users to take unrestricted remote control over TL-WR940N and TL-WR941ND routers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Credential-Stuffing Attacks Behind 30 Billion Login Attempts in 2018 πŸ•΄

Using e-mail addresses and passwords from compromised sites, attackers most often targeted retail sites, video-streaming services, and entertainment companies, according to Akamai.

πŸ“– Read

via "Dark Reading: ".
πŸ” Introducing the New Digital Guardian Support Community πŸ”

Digital Guardian upgraded its Support Community over the weekend to provide an improved user experience, better workflows and ticketing process.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 'Exodus' iOS Surveillance Software Masqueraded as Legit Apps πŸ•΄

Italian firm appears to have developed spyware for lawful intercept purposes, Lookout says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 20 Million Dollar Investment Round Shows Growth of Risk Assessment Market πŸ•΄

The Series B investment supports a company bringing risk assessment to businesses in business terms.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 20 Million Dollar Investment Round Shows Growth of Risk Assessment Market πŸ•΄

The Series B investment supports a company bringing risk assessment to businesses in business terms.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Guilty Plea in Senate Data Theft πŸ•΄

A former senate staff member stole personal information about three senators and published it on Wikipedia.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Digital Doppelganger' Underground Takes Payment Card Theft to the Next Level πŸ•΄

Massive criminal marketplace discovered packaging and selling stolen credentials along with victims' online behavior footprints.

πŸ“– Read

via "Dark Reading: ".
❌ SAS 2019: Genesis Marketplace Peddles 60K Stolen Digital Identities ❌

An underground marketplace is selling tens of thousands of compromised digital identities, paving the way for cybercriminals to commit online fraud.

πŸ“– Read

via "Threatpost".
⚠ Fired sysadmin pleads guilty to doxxing five senators on Wikipedia ⚠

Cosko, 27, pleaded guilty to five counts including making public restricted personal information, computer fraud, witness tampering and obstruction of justice,

πŸ“– Read

via "Naked Security".
⚠ Hacker unlocks Samsung S10 with 3D-printed fingerprint ⚠

According to a video posted on the Imgur site Friday, it’s possible to bypass the biometrics on the new Galaxy S10 range using a 3D-printed fingerprint in minutes.

πŸ“– Read

via "Naked Security".
⚠ Airbnb says sorry after man detects hidden camera with network scan ⚠

His family of 7 was one network scan away from potentially being livestreamed by their host.

πŸ“– Read

via "Naked Security".
⚠ Chrome, Safari and Opera criticised for removing privacy setting ⚠

Forthcoming versions of the Chrome, Apple Safari and Opera are in the process of removing the ability to disable a long-ignored tracking feature called hyperlink auditing pings.

πŸ“– Read

via "Naked Security".
πŸ” 5 ways for CISOs to show executives real results πŸ”

CISOs need to gain a seat at the table to discuss strategy and building cybersecurity into product development. Here's how.

πŸ“– Read

via "Security on TechRepublic".
❌ SAS 2019: 4 Stuxnet-Related APTs Form Gossip Girl, an β€˜Apex Threat Actor’ ❌

Flowershop, Equation, Flame and Duqu appear to have a hand in the different phases of Stuxnet development, all working as part of an operation active as early as 2006.

πŸ“– Read

via "Threatpost".
⚠ Knock and don’t run: the tale of the relentless hackerbots ⚠

If you have an IoT device in your home, you could be receiving an average of 13 login attempts to these devices per minute. That's according to Matt Boddy's latest research.

πŸ“– Read

via "Naked Security".