πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-15519

Various Lexmark devices have a Buffer Overflow (issue 1 of 2).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14919

LOYTEC LGATE-902 6.3.2 devices allow XSS.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to set up multi-factor authentication for an IAM user in AWS πŸ”

MFA protocols are a simple best practice for increasing the overall access security of AWS cloud services and could prevent costly security breaches in your enterprise.

πŸ“– Read

via "Security on TechRepublic".
❌ MongoDB Leak Exposed Millions of Medical Insurance Records ❌

Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com.

πŸ“– Read

via "Threatpost".
❌ New Dridex Variant Slips By Anti-Virus Detection ❌

A never-before-seen Dridex variant has been spotted in phishing emails using anti-virus detection evasion tactics.

πŸ“– Read

via "Threatpost".
πŸ•΄ MageCart Launches Customizable Campaign πŸ•΄

A tool new to MageCart bolsters the group's ability to evade detection and steal data.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-14918

LOYTEC LGATE-902 6.3.2 devices allow Directory Traversal.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14916

LOYTEC LGATE-902 6.3.2 devices allow Arbitrary file deletion.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14887

Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14886

The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14885

Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14868

Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14867

Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10761

Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing encryption, aka MouseJack.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 21 stories of the week ⚠

From the controversial DeepNude app to the Molotov-cocktail-throwing hacker who dropped his USB stick - and everything in between.

πŸ“– Read

via "Naked Security".
⚠ Crave that Instagram verified badge? Don’t fall for this login-stealing scam ⚠

It's yet another way to trick Instagram users out of their login credentials. Don't fall for it, lest your account be hijacked!

πŸ“– Read

via "Naked Security".
⚠ Cloud computing giant PCM hacked ⚠

The attackers allegedly stole admin credentials for Office 365 accounts, and planned to use stolen data to conduct gift card fraud.

πŸ“– Read

via "Naked Security".
πŸ•΄ Too Many Tools? Tidy Up in 'KonMari' Style πŸ•΄

You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Planning a Bug Bounty Program? Follow In Shopify's Footsteps πŸ•΄

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Pay or Not To Pay? That Is the (Ransomware) Question πŸ•΄

From Albany, New York, to Atlanta, Georgia, to Del Rio, Texas, cities across the US have been hit with ransomware attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Back to Basics with Log Management, SIEMs & MSSPs πŸ•΄

Still not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.

πŸ“– Read

via "Dark Reading: ".