πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-10692

An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not have an HttpOnly flag. This allows an attacker who is able to execute a cross-site scripting attack to steal the cookie very easily.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-10691

An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can download /systemlog.log (the system log). However, the same functionality allows an attacker to download the file without any authentication or authorization.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-10690

An issue was discovered on Moxa AWK-3121 1.14 devices. The device by default allows HTTP traffic thus providing an insecure communication mechanism for a user connecting to the web server. This allows an attacker to sniff the traffic easily and allows an attacker to compromise sensitive data such as credentials.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Seriously, stop using qwerty as a password--enlist these password strategies instead πŸ”

Users understand that their passwords or security protocols are weak, but they may not understand the consequences until it's too late.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 21 stories of the week ⚠

From the vulnerable Windows RDS 'feature' to the privacy of US visa applicants - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Online shops fear 2FA at checkout will increase abandoned carts ⚠

A report says the EU will lose $64b per year once new 2FA rules go into effect, but we support Strong Customer Authentication (SCA) wholeheartedly.

πŸ“– Read

via "Naked Security".
⚠ Laptops used in 2016 NC poll to be examined by Feds – after 2.5 years ⚠

The e-voting vendor in North Carolina was spearphished days before the election but still went ahead and used remote access software.

πŸ“– Read

via "Naked Security".
⚠ Cryptocurrency attack thwarted by npm team ⚠

Cryptocurrency users narrowly escaped losing all their funds last week after an attacker poisoned a digital wallet with malicious code that stole their blockchain access details.

πŸ“– Read

via "Naked Security".
⚠ The GoldBrute botnet is trying to crack open 1.5 million RDP servers ⚠

Even its most optimistic users would have to concede that it’s been a bracing few weeks for anyone who relies on Microsoft’s Remote Desktop Protocol (RDP).

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat USA Offers Fresh Perspectives on Enterprise Cybersecurity πŸ•΄

Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Unmixed Messages: Bringing Security & Privacy Awareness Together πŸ•΄

Security and privacy share the same basic goals, so it just makes sense to combine efforts in those two areas. But that can be easier said than done.

πŸ“– Read

via "Dark Reading: ".
⚠ Microsoft warns of time-travelling equation exploit – are you safe? ⚠

An Office bug that was squashed back in 2017 is still in widespread use - make sure your computer hasn't slipped through the patch cracks!

πŸ“– Read

via "Naked Security".
❌ VLC Player Gets Patched for Two High-Severity Bugs ❌

Popular media player receives 33 security bug fixes, two of which are rated high severity.

πŸ“– Read

via "Threatpost".
πŸ•΄ Security Headline Test πŸ•΄

Security Headline Test

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Lone Wolf' Scammer Built a Multifaceted BEC Cybercrime Operation πŸ•΄

A one-man 419 scam evolved into a lucrative social-engineering syndicate over the past decade that conducts a combination of business email compromise, romance, and financial fraud.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to integrate Spamassassin with Postfix Mail Server πŸ”

The task of preventing the never-ending flow of spam gets a bit simpler with Spamassassin and Postfix.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Want less spam? Learn how to integrate Spamassassin with Postfix Mail Server πŸ”

The task of preventing the never-ending flow of spam gets a bit simpler with Spamassassin and Postfix.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Warns of Email Attacks Executing Code Using an Old Bug ❌

The flaw affected all versions of Microsoft Office, Microsoft Windows and architecture types dating back to 2000, and was patched in November 2017.

πŸ“– Read

via "Threatpost".
❌ How to Model Risk in an Apex Predator Cyber-World ❌

Large-scale existential threats exist everywhere and can annihilate us with only trivial effort. Should we all throw everything we can at them?

πŸ“– Read

via "Threatpost".
πŸ” Stop ignoring hybrid cloud security risks πŸ”

Karen Roby talks with a security expert about safeguarding the enterprise in a hybrid IT world.

πŸ“– Read

via "Security on TechRepublic".