πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2015-1320

The SeaMicro provisioning of Ubuntu MAAS logs credentials, including username and password, for the management interface. This issue affects Ubuntu MAAS versions prior to 1.9.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-1316

Juju Core's Joyent provider before version 1.25.5 uploads the user's private ssh key.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-1428

A vulnerability in generate_filestorage_key of Ubuntu MAAS allows an attacker to brute-force filenames. This issue affects Ubuntu MAAS versions prior to 1.9.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-1427

A vulnerability in the REST API of Ubuntu MAAS allows an attacker to cause a logged-in user to execute commands via cross-site scripting. This issue affects MAAS versions prior to 1.9.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-1426

A vulnerability in maasserver.api.get_file_by_name of Ubuntu MAAS allows unauthenticated network clients to download any file. This issue affects: Ubuntu MAAS versions prior to 1.9.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3151

The Ubuntu SELinux initscript before version 1:0.10 used touch to create a lockfile in a world-writable directory. If the OS kernel does not have symlink protections then an attacker can cause a zero byte file to be allocated on any writable filesystem.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3147

Versions of nova before 2012.1 could expose hypervisor host files to a guest operating system when processing a maliciously constructed qcow filesystem.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3145

When mount.ecrpytfs_private before version 87-0ubuntu1.2 calls setreuid() it doesn't also set the effective group id. So when it creates the new version, mtab.tmp, it's created with the group id of the user running mount.ecryptfs_private.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-1830

Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Machine Learning Technology at Center of Real Estate Trade Theft Case πŸ”

In a complaint, filed Friday, one company is alleging a former employee took screen shots of trade secrets, including proprietary wireframes and a proposed regional launch timeline of its services, before leaving for another real estate technology competitor.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Who Gets Targeted Most in Cyberattack Campaigns πŸ•΄

Attackers are changing both their tactics and targets in an attempt to remain criminally successful, Proofpoint's study found.

πŸ“– Read

via "Dark Reading: ".
❌ Is Privacy Really iPhone? Researchers Weigh in on Apple’s Targeted Ad Tracking ❌

A unique identifier is enabled by default on every iPhone that's shipped, allowing advertisers to follow the phone's activity across the web.

πŸ“– Read

via "Threatpost".
❌ Wi-Fi Hotspot Finder Spills 2 Million Passwords ❌

China-based app maker ignored repeated warnings by researchers that its password database - stored in plain text - was accessible to anyone online.

πŸ“– Read

via "Threatpost".
πŸ•΄ WannaCry Hero Hutchins Pleads Guilty to Malware Charges πŸ•΄

Marcus Hutchins, the security researcher who helped halt the spread of the WannaCry attack, pleads guilty to two charges related to writing malware.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies πŸ•΄

Motive remains unclear though financial theft appears to be one possibility, Check Point Research says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI: $2.7 billion in Losses to Cyber-Enabled Crimes in 2018 πŸ•΄

Internet Crime Complaint Center (IC3) last year received an average of 900+ reports daily of Internet-enabled theft, fraud, and exploitation.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-7470

cipso_v4_validate in include/net/cipso_ipv4.h in the Linux kernel before 3.11.7, when CONFIG_NETLABEL is disabled, allows attackers to cause a denial of service (infinite loop and crash), as demonstrated by icmpsic, a different vulnerability than CVE-2013-0310.

πŸ“– Read

via "National Vulnerability Database".
⚠ Tuesday review – the hot 21 stories of the week ⚠

A day late! From the weakness in several VPNs to the Internet Explorer browser flaw, and much more - catch up on everything we wrote last week.

πŸ“– Read

via "Naked Security".
πŸ•΄ 1 in 4 Workers Are Aware Of Security Guidelines - but Ignore Them πŸ•΄

1 in 4 Workers Are Aware Of Company IT Security Guidelines but Don't Follow Them

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Ways to Get the Most from Your IDS/IPS πŸ•΄

Intrusion detection and prevention is at the foundation of successful security in-depth. Securing the perimeter requires a solid understanding of these two critical components.

πŸ“– Read

via "Dark Reading: ".
⚠ Once again, it’s 123456: the password that says β€˜I give up’ ⚠

A new survey says 46% of users find security confusing, which helps explain how that old clunker keeps popping to the top of breach lists.

πŸ“– Read

via "Naked Security".