πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2014-1428

A vulnerability in generate_filestorage_key of Ubuntu MAAS allows an attacker to brute-force filenames. This issue affects Ubuntu MAAS versions prior to 1.9.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-1427

A vulnerability in the REST API of Ubuntu MAAS allows an attacker to cause a logged-in user to execute commands via cross-site scripting. This issue affects MAAS versions prior to 1.9.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-1426

A vulnerability in maasserver.api.get_file_by_name of Ubuntu MAAS allows unauthenticated network clients to download any file. This issue affects: Ubuntu MAAS versions prior to 1.9.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3151

The Ubuntu SELinux initscript before version 1:0.10 used touch to create a lockfile in a world-writable directory. If the OS kernel does not have symlink protections then an attacker can cause a zero byte file to be allocated on any writable filesystem.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3147

Versions of nova before 2012.1 could expose hypervisor host files to a guest operating system when processing a maliciously constructed qcow filesystem.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3145

When mount.ecrpytfs_private before version 87-0ubuntu1.2 calls setreuid() it doesn't also set the effective group id. So when it creates the new version, mtab.tmp, it's created with the group id of the user running mount.ecryptfs_private.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-1830

Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Machine Learning Technology at Center of Real Estate Trade Theft Case πŸ”

In a complaint, filed Friday, one company is alleging a former employee took screen shots of trade secrets, including proprietary wireframes and a proposed regional launch timeline of its services, before leaving for another real estate technology competitor.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Who Gets Targeted Most in Cyberattack Campaigns πŸ•΄

Attackers are changing both their tactics and targets in an attempt to remain criminally successful, Proofpoint's study found.

πŸ“– Read

via "Dark Reading: ".
❌ Is Privacy Really iPhone? Researchers Weigh in on Apple’s Targeted Ad Tracking ❌

A unique identifier is enabled by default on every iPhone that's shipped, allowing advertisers to follow the phone's activity across the web.

πŸ“– Read

via "Threatpost".
❌ Wi-Fi Hotspot Finder Spills 2 Million Passwords ❌

China-based app maker ignored repeated warnings by researchers that its password database - stored in plain text - was accessible to anyone online.

πŸ“– Read

via "Threatpost".
πŸ•΄ WannaCry Hero Hutchins Pleads Guilty to Malware Charges πŸ•΄

Marcus Hutchins, the security researcher who helped halt the spread of the WannaCry attack, pleads guilty to two charges related to writing malware.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies πŸ•΄

Motive remains unclear though financial theft appears to be one possibility, Check Point Research says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI: $2.7 billion in Losses to Cyber-Enabled Crimes in 2018 πŸ•΄

Internet Crime Complaint Center (IC3) last year received an average of 900+ reports daily of Internet-enabled theft, fraud, and exploitation.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-7470

cipso_v4_validate in include/net/cipso_ipv4.h in the Linux kernel before 3.11.7, when CONFIG_NETLABEL is disabled, allows attackers to cause a denial of service (infinite loop and crash), as demonstrated by icmpsic, a different vulnerability than CVE-2013-0310.

πŸ“– Read

via "National Vulnerability Database".
⚠ Tuesday review – the hot 21 stories of the week ⚠

A day late! From the weakness in several VPNs to the Internet Explorer browser flaw, and much more - catch up on everything we wrote last week.

πŸ“– Read

via "Naked Security".
πŸ•΄ 1 in 4 Workers Are Aware Of Security Guidelines - but Ignore Them πŸ•΄

1 in 4 Workers Are Aware Of Company IT Security Guidelines but Don't Follow Them

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Ways to Get the Most from Your IDS/IPS πŸ•΄

Intrusion detection and prevention is at the foundation of successful security in-depth. Securing the perimeter requires a solid understanding of these two critical components.

πŸ“– Read

via "Dark Reading: ".
⚠ Once again, it’s 123456: the password that says β€˜I give up’ ⚠

A new survey says 46% of users find security confusing, which helps explain how that old clunker keeps popping to the top of breach lists.

πŸ“– Read

via "Naked Security".
⚠ Hotspot finder app blabs 2 million Wi-Fi network passwords ⚠

If you used WiFi Finder, your passwords to both public and private networks have been left online in an unprotected database.

πŸ“– Read

via "Naked Security".
πŸ” Weaponization of vulnerabilities in Adobe products more than doubled in 2018 πŸ”

Using free Adobe software like Flash Player and Adobe Reader can pose a security risk in your organization.

πŸ“– Read

via "Security on TechRepublic".