πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Stop ignoring hybrid cloud security risks πŸ”

Karen Roby talks with Ping Identity security expert about safeguarding the enterprise in a hybrid IT world.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Voting Machine Vendor Shifts Gears & Pushes for Backup Paper Ballots πŸ•΄

Election Systems & Software will 'no longer sell paperless voting machines,' CEO said.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cognitive Bias Can Help Shape Security Decisions πŸ•΄

A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Huawei Represents Massive Supply Chain Risk: Report πŸ•΄

The Chinese technology giant's enormous product and service footprint gives it access to more data than almost any other single organization, Recorded Future says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Federal Photos Filched in Contractor Breach πŸ•΄

Data should never have been on subcontractor's servers, says Customs and Border Protection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cognitive Bias Can Hamper Security Decisions πŸ•΄

A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-13718

The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. Also, since the device's server sets the Access-Control-Allow-Origin header to "*", an attacker can easily interact with the JSON payload returned by the device and steal sensitive information about the device.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-13717

Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily.

πŸ“– Read

via "National Vulnerability Database".
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
⚠ It’s a SCAM: Send Bitcoin or your company’s reputation is TOAST! ⚠

"I will insult people. And everyone will not care that it's not you." But it's social-disaster baloney!

πŸ“– Read

via "Naked Security".
⚠ iOS 13 will map the apps that are tracking you ⚠

A map will display the snail-slime trails that we all leave behind in our daily travels and through which background tracking apps follow us.

πŸ“– Read

via "Naked Security".
⚠ Critical flaws found in Amcrest security cameras ⚠

The Amcrest 721 family of security cameras features six security flaws discovered back in 2017 by a researcher at security outfit Synopsys.

πŸ“– Read

via "Naked Security".
❌ Data Breach Exposes 100K U.S. Traveler Photos, License Plates ❌

A recent breach of U.S. Customs and Border Protection traveler photo and license plate data has led experts to condemn the collection and storage of facial recognition data.

πŸ“– Read

via "Threatpost".
πŸ” More than 3B fake emails sent daily as phishing attacks persist πŸ”

Some 140,000 more domains are using DMARC records since the start of 2019, though DMARC-based enforcement remains complex to implement.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Getting Up to Speed on Magecart πŸ•΄

Greater awareness of how Magecart works will give your company a leg up on the growing threat from this online credit card skimmer. Here are four places to start.

πŸ“– Read

via "Dark Reading: ".
❌ Troy Hunt Looks to Sell Have I Been Pwned ❌

"Project Svalbard" has commenced, as Hunt looks for the right company to take over the password-focused service.

πŸ“– Read

via "Threatpost".
❌ Critical Adobe Flash, ColdFusion Vulnerabilities Patched ❌

Adobe issued patches for 11 vulnerabilities overall across its Flash, ColdFusion and Campaign products.

πŸ“– Read

via "Threatpost".
❌ Linux Command-Line Editors Vulnerable to High-Severity Bug ❌

A bug impacting editors Vim and Neovim could allow a trojan code to escape sandbox mitigations.

πŸ“– Read

via "Threatpost".
❌ Near-Ubiquitous Critical Microsoft RCE Bugs Affect All Versions of Windows ❌

The two CVEs allow bypasses to get around NTLM relay attack mitigations.

πŸ“– Read

via "Threatpost".