πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-12806

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12805

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12804 (imageworsener)

The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12790

Metinfo 5.3.18 is affected by: Cross Site Request Forgery (CSRF). The impact is: Information Disclosure (remote). The component is: admin/index.php. The attack vector is: The administrator clicks on the malicious link in the login state.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12778

The UI Lock feature in qBittorrent version 3.3.15 is vulnerable to Authentication Bypass, which allows Attack to gain unauthorized access to qBittorrent functions by tampering the affected flag value of the config file at the C:\Users\<username>\Roaming\qBittorrent pathname. The attacker must change the value of the "locked" attribute to "false" within the "Locking" stanza.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How to Close the Critical Cybersecurity Talent Gap πŸ•΄

If we don't change our ways, the gap will keep getting worse. Outside-the-box thinking and new techniques are required, and here are a few ways to get started.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How the Skills Gap Strains - and Constrains - Security Pros πŸ•΄

New ISSA/ESG survey underscores increasing pressures and security fallout of a strapped security team.

πŸ“– Read

via "Dark Reading: ".
πŸ” News Roundup: Microsoft Build, Google I/O, and Sapphire πŸ”

Karen Roby gives us a snapshot of the news covered this week on TechRepublic and ZDNet. The stories include 3 major conferences, a telecommunications data breach and a look at the amount of CIO's implementing AI.

πŸ“– Read

via "Security on TechRepublic".
πŸ” News Roundup: Microsoft Build, Google I/O, Sapphire πŸ”

Karen Roby gives us a snapshot of the news covered this week on TechRepublic and ZDNet. The stories include 3 major conferences, a telecommunications data breach and a look at the amount of CIO's implementing AI.

πŸ“– Read

via "Security on TechRepublic".
❌ Hackers Take Over IoT Devices to β€˜Click’ on Ads ❌

A video interview and Q&A with IoT specialist Dan Demeter of Kaspersky Lab.

πŸ“– Read

via "Threatpost".
πŸ” Cybersecurity burnout: 10 most stressful parts of the job πŸ”

The cybersecurity skills shortage has gotten worse for the third consecutive year, according to the Information Systems Security Association.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Initiative Aims to Fast-Track Women into Cybersecurity Careers πŸ•΄

'100 Women in 100 Days' is a career development program made possible by a $160,000 gift from Craig Newmark Philanthropies.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-12761

http://codecanyon.net/user/Endober WebFile Explorer 1.0 is affected by: SQL Injection. The impact is: Arbitrary File Download (remote). The component is: $file = $_GET['id'] in download.php. The attack vector is: http://speicher.example.com/envato/codecanyon/demo/web-file-explorer/download.php?id=WebExplorer/../config.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12760

Ynet Interactive - http://demo.ynetinteractive.com/mobiketa/ Mobiketa 4.0 is affected by: SQL Injection. The impact is: Code execution (remote).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12759

Ynet Interactive - http://demo.ynetinteractive.com/soa/ SOA School Management 3.0 is affected by: SQL Injection. The impact is: Code execution (remote).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12758 (component_appointment)

https://www.joomlaextensions.co.in/ Joomla! Component Appointment 1.1 is affected by: SQL Injection. The impact is: Code execution (remote). The component is: com_appointment component.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-12757

Certain Ambit Technologies Pvt. Ltd products are affected by: SQL Injection. This affects iTech B2B Script 4.42i and Tech Business Networking Script 8.26i and Tech Caregiver Script 2.71i and Tech Classifieds Script 7.41i and Tech Dating Script 3.40i and Tech Freelancer Script 5.27i and Tech Image Sharing Script 4.13i and Tech Job Script 9.27i and Tech Movie Script 7.51i and Tech Multi Vendor Script 6.63i and Tech Social Networking Script 3.08i and Tech Travel Script 9.49. The impact is: Code execution (remote).

πŸ“– Read

via "National Vulnerability Database".
❌ Chinese Hackers Behind 2015 Anthem Data Breach Indicted ❌

Two have been indicted in the 2015 massive data breach of health insurer Anthem, which compromised the data of at least 78 million customers.

πŸ“– Read

via "Threatpost".
❌ β€˜Unhackable’ Biometric USB Offers Up Passwords in Plain Text ❌

A simple Wireshark analysis was enough to subvert the gadget, which uses iris identification to protect the drive.

πŸ“– Read

via "Threatpost".
πŸ•΄ Nation-State Breaches Surged in 2018: Verizon DBIR πŸ•΄

The source of breaches has fluctuated significantly over the past nine years, but organized crime has almost always topped nation-state actors each year. The gap narrowed significantly in 2018, according to the annual report.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US DoJ Indicts Chinese Man for Anthem Breach πŸ•΄

Fujie Wang allegedly worked as part of a hacking team out of China that stole information on nearly 80 million Americans in the massive healthcare breach.

πŸ“– Read

via "Dark Reading: ".