🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🔐 How to create a secure website: 4 tips 🔐

A major gap exists between the perception and reality of online security safety, according to Google Registry and The Harris Poll.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2016-7151

Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86_insn_reg_intel in arch/X86/X86Mapping.c.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2016-10719

TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2014-9919

An issue was discovered in Bilboplanet 2.0. Stored XSS exists in the fullname parameter to signup.php.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2014-9918

An issue was discovered in Bilboplanet 2.0. Stored XSS exists in the user_id parameter to signup.php.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2014-9917

An issue was discovered in Bilboplanet 2.0. There is a stored XSS vulnerability when adding a tag via the user/?page=tribes tags parameter.

📖 Read

via "National Vulnerability Database".
Intel ZombieLoad Side-Channel Attack: 10 Takeaways

Here are 10 top takeaways from Intel's most recent class of Spectre-like speculative execution vulnerabilities, disclosed this week.

📖 Read

via "Threatpost".
🕴 Two Ransomware Recovery Firms Typically Pay Hackers 🕴

Companies promising the safe return of data sans ransom payment secretly pass Bitcoin to attackers and charge clients added fees.

📖 Read

via "Dark Reading: ".
🔐 Tech news roundup: Microsoft Office 365, Facebook scandal, and AI adoption 🔐

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the highest paying internships for 2019.

📖 Read

via "Security on TechRepublic".
🔐 Tech news roundup: Microsoft Office 365, Facebook scandal, and AI adoption 🔐

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the highest paying internships for 2019.

📖 Read

via "Security on TechRepublic".
🔐 Why MDS vulnerabilities present a threat as serious as Spectre and Meltdown 🔐

Microarchitectural Data Sampling are CPU side-channel vulnerabilities that allow attackers to view in-flight data from CPU-internal buffers. Learn more about MDS attacks in this comprehensive guide.

📖 Read

via "Security on TechRepublic".
🔐 Spectre and Meltdown explained: A comprehensive guide for professionals 🔐

Staying up to date on Spectre and Meltdown can be challenging. This guide includes in-depth explanations about these uniquely dangerous security vulnerabilities and the best mitigation solutions.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2016-7043

It has been reported that KIE server and Busitess Central before version 7.21.0.Final contain username and password as plaintext Java properties. Any app deployed on the same server would have access to these properties, thus granting access to ther services.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2013-7285

Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.

📖 Read

via "National Vulnerability Database".
🔏 New Senate Bill Would Crackdown on IP Theft 🔏

A new bill introduced in the Senate this week would restrict U.S. tech exports to China and crack down on intellectual property theft.

📖 Read

via "Subscriber Blog RSS Feed ".
🕴 Introducing the Digital Transformation Architect 🕴

Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.

📖 Read

via "Dark Reading: ".
Google Titan Security Key Recalled After Bluetooth Pairing Bug

Google is offering free replacements for its Titan Security Key after discovering a misconfiguration in its pairing protocols.

📖 Read

via "Threatpost".
🕴 Attackers Are Messing with Encryption Traffic to Evade Detection 🕴

Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.

📖 Read

via "Dark Reading: ".
🕴 New Intel Vulnerabilities Bring Fresh CPU Attack Dangers 🕴

Four newly discovered vulns from the speculative-execution family bring Meltdown-like threats to Intel's processors.

📖 Read

via "Dark Reading: ".
🕴 GDPR Drives Changes, but Privacy by Design Proves Elusive 🕴

One year later, the EU mandate's biggest impact has been to focus more attention on data protection and privacy, security analysts say.

📖 Read

via "Dark Reading: ".