πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Fighting Back Against Tech-Savvy Fraudsters πŸ•΄

Staying a step ahead requires moving beyond the security techniques of the past.

πŸ“– Read

via "Dark Reading: ".
⚠ Metal keys beat smart locks in NYC legal battle ⚠

A group of tenants in New York City have prevailed in a lawsuit against their landlord's use of smart locks.

πŸ“– Read

via "Naked Security".
❌ Researchers in the Dark on Powerful LightNeuron Malware for Years ❌

LightNeuron is the first to target Microsoft Exchange transport agents -- and is used as a hub for major Turla APT espionage efforts.

πŸ“– Read

via "Threatpost".
πŸ•΄ Sectigo Buys Icon Labs to Expand IoT Security Platform πŸ•΄

End-to-end IoT security product aims to give manufacturers, systems integrators, and businesses a means to harden device security.

πŸ“– Read

via "Dark Reading: ".
πŸ” Companies moving to the cloud still ignore security concerns πŸ”

Nine in 10 cloud breaches occur due to employee mistakes, according to a Kaspersky Lab report.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-12788

Multiple cross-site scripting (XSS) vulnerabilities in admin/index.php in Metinfo 5.3.18 allows remote attackers to inject arbitrary web script or HTML via the (1) class1 parameter or the (2) anyid parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ Sextortion mail from yourself? It doesn’t mean you’ve been hacked… ⚠

Here's a 30-second video you can show your friends and family if they freak out after receiving a scam email apparently from themselves...

πŸ“– Read

via "Naked Security".
πŸ” On-device speech recognition may make smart assistants more appealing πŸ”

Google unveiled the next-generation Google Assistant at I/O 2019, featuring an on-device speech recognition model-bypassing the need to upload voice samples to cloud systems.

πŸ“– Read

via "Security on TechRepublic".
❌ Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked ❌

Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-12839

A heap-based buffer over-read in the getbits function in src/libmpg123/getbits.h in mpg123 through 1.25.5 allows remote attackers to cause a possible denial-of-service (out-of-bounds read) or possibly have unspecified other impact via a crafted mp3 file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12806

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12805

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12804 (imageworsener)

The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12790

Metinfo 5.3.18 is affected by: Cross Site Request Forgery (CSRF). The impact is: Information Disclosure (remote). The component is: admin/index.php. The attack vector is: The administrator clicks on the malicious link in the login state.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12778

The UI Lock feature in qBittorrent version 3.3.15 is vulnerable to Authentication Bypass, which allows Attack to gain unauthorized access to qBittorrent functions by tampering the affected flag value of the config file at the C:\Users\<username>\Roaming\qBittorrent pathname. The attacker must change the value of the "locked" attribute to "false" within the "Locking" stanza.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How to Close the Critical Cybersecurity Talent Gap πŸ•΄

If we don't change our ways, the gap will keep getting worse. Outside-the-box thinking and new techniques are required, and here are a few ways to get started.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How the Skills Gap Strains - and Constrains - Security Pros πŸ•΄

New ISSA/ESG survey underscores increasing pressures and security fallout of a strapped security team.

πŸ“– Read

via "Dark Reading: ".
πŸ” News Roundup: Microsoft Build, Google I/O, and Sapphire πŸ”

Karen Roby gives us a snapshot of the news covered this week on TechRepublic and ZDNet. The stories include 3 major conferences, a telecommunications data breach and a look at the amount of CIO's implementing AI.

πŸ“– Read

via "Security on TechRepublic".
πŸ” News Roundup: Microsoft Build, Google I/O, Sapphire πŸ”

Karen Roby gives us a snapshot of the news covered this week on TechRepublic and ZDNet. The stories include 3 major conferences, a telecommunications data breach and a look at the amount of CIO's implementing AI.

πŸ“– Read

via "Security on TechRepublic".
❌ Hackers Take Over IoT Devices to β€˜Click’ on Ads ❌

A video interview and Q&A with IoT specialist Dan Demeter of Kaspersky Lab.

πŸ“– Read

via "Threatpost".