πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-14916

LOYTEC LGATE-902 6.3.2 devices allow Arbitrary file deletion.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14887

Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14886

The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14885

Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14868

Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14867

Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10761

Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing encryption, aka MouseJack.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 21 stories of the week ⚠

From the controversial DeepNude app to the Molotov-cocktail-throwing hacker who dropped his USB stick - and everything in between.

πŸ“– Read

via "Naked Security".
⚠ Crave that Instagram verified badge? Don’t fall for this login-stealing scam ⚠

It's yet another way to trick Instagram users out of their login credentials. Don't fall for it, lest your account be hijacked!

πŸ“– Read

via "Naked Security".
⚠ Cloud computing giant PCM hacked ⚠

The attackers allegedly stole admin credentials for Office 365 accounts, and planned to use stolen data to conduct gift card fraud.

πŸ“– Read

via "Naked Security".
πŸ•΄ Too Many Tools? Tidy Up in 'KonMari' Style πŸ•΄

You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Planning a Bug Bounty Program? Follow In Shopify's Footsteps πŸ•΄

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Pay or Not To Pay? That Is the (Ransomware) Question πŸ•΄

From Albany, New York, to Atlanta, Georgia, to Del Rio, Texas, cities across the US have been hit with ransomware attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Back to Basics with Log Management, SIEMs & MSSPs πŸ•΄

Still not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Staying Ahead of the Bot Landscape πŸ•΄

Thinking of the bot landscape as homogeneous paints an overly simplistic picture.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How to Defend Credentials From Automated Attack Tools πŸ•΄

The following recommendations can help both end users and Web defenders mitigate credential abuse attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 3 Security Imperatives And The Evolving Digital Topology πŸ•΄

No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DHS's Bob Kolasky Goes All in on Risk Management πŸ•΄

As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Capture the Flag: Training Made Fun πŸ•΄

CTFs require participants to be creative while using their critical-thinking and problem-solving skills to ultimately arrive at a functional solution.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Considerations in a BYOD Culture πŸ•΄

The 'bring your own device' movement has put security pros on high alert for a new breed of predator on the hunt to find ways to exploit the ever-expanding attack surface.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The 10 Essential Basics of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".