πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Only 9% of companies warn employees about IoT risks πŸ”

Data breaches caused by unsecured Internet of Things devices increased to 26% this year, according to a Ponemon Institute report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 5 quick SSH hardening tips πŸ”

If you make use of Secure Shell, you'll want to run down this checklist of five quick tips to make that Linux server a bit more secure.

πŸ“– Read

via "Security on TechRepublic".
⚠ Chrome plans to save you from sites that mess with your back button ⚠

Has your back button ever mysteriously stopped working?

πŸ“– Read

via "Naked Security".
⚠ DeepDotWeb seized, suspected admins arrested ⚠

The suspected admins of the DeepDotWeb site are alleged to have sent buyers to illegal markets in exchange for millions in kickbacks.

πŸ“– Read

via "Naked Security".
πŸ” Security Alphabet Soup πŸ”

There is no shortage of unique terms and acronyms within the cybersecurity industry. In many ways, security has a language of its own. This guide lists more than 40 of the most common cybersecurity acronyms, serving as a resource for beginners and a reference guide for those with more experience. Terms are listed in alphabetical order for ease-of-use.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ CSS tracking trick can monitor your mouse without JavaScript ⚠

A security researcher has demonstrated a new way to track mouse movements even if users block JavaScript.

πŸ“– Read

via "Naked Security".
πŸ•΄ Fighting Back Against Tech-Savvy Fraudsters πŸ•΄

Staying a step ahead requires moving beyond the security techniques of the past.

πŸ“– Read

via "Dark Reading: ".
⚠ Metal keys beat smart locks in NYC legal battle ⚠

A group of tenants in New York City have prevailed in a lawsuit against their landlord's use of smart locks.

πŸ“– Read

via "Naked Security".
❌ Researchers in the Dark on Powerful LightNeuron Malware for Years ❌

LightNeuron is the first to target Microsoft Exchange transport agents -- and is used as a hub for major Turla APT espionage efforts.

πŸ“– Read

via "Threatpost".
πŸ•΄ Sectigo Buys Icon Labs to Expand IoT Security Platform πŸ•΄

End-to-end IoT security product aims to give manufacturers, systems integrators, and businesses a means to harden device security.

πŸ“– Read

via "Dark Reading: ".
πŸ” Companies moving to the cloud still ignore security concerns πŸ”

Nine in 10 cloud breaches occur due to employee mistakes, according to a Kaspersky Lab report.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-12788

Multiple cross-site scripting (XSS) vulnerabilities in admin/index.php in Metinfo 5.3.18 allows remote attackers to inject arbitrary web script or HTML via the (1) class1 parameter or the (2) anyid parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ Sextortion mail from yourself? It doesn’t mean you’ve been hacked… ⚠

Here's a 30-second video you can show your friends and family if they freak out after receiving a scam email apparently from themselves...

πŸ“– Read

via "Naked Security".
πŸ” On-device speech recognition may make smart assistants more appealing πŸ”

Google unveiled the next-generation Google Assistant at I/O 2019, featuring an on-device speech recognition model-bypassing the need to upload voice samples to cloud systems.

πŸ“– Read

via "Security on TechRepublic".
❌ Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked ❌

Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-12839

A heap-based buffer over-read in the getbits function in src/libmpg123/getbits.h in mpg123 through 1.25.5 allows remote attackers to cause a possible denial-of-service (out-of-bounds read) or possibly have unspecified other impact via a crafted mp3 file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12806

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12805

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12804 (imageworsener)

The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12790

Metinfo 5.3.18 is affected by: Cross Site Request Forgery (CSRF). The impact is: Information Disclosure (remote). The component is: admin/index.php. The attack vector is: The administrator clicks on the malicious link in the login state.

πŸ“– Read

via "National Vulnerability Database".