πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Google suspends Trends emails after revealing murder suspect’s name ⚠

People subscribed to Google Trends in New Zealand were emailed the murder suspect's name in violation of a New Zealand court's order.

πŸ“– Read

via "Naked Security".
❌ Rapid Incident Response Now Available through Cynet’s Free IR Service Providers Offering ❌

Cynet's 360 platform is ready out-of-the-box, for fast, easy deployment across all endpoints.

πŸ“– Read

via "Threatpost".
πŸ” How financial services companies can protect against mobile threats πŸ”

Financial services organizations face a variety of cyber threats. But mobile risks represent a major Achilles' heel for the industry, says a new report from Wandera.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity incidents cost businesses $45B last year πŸ”

Ransomware, cryptojacking, and business email compromise attacks all ramped up the financial losses due to cyber breaches, according to the Online Trust Alliance.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DevOps' Inevitable Disruption of Security Strategy πŸ•΄

Black Hat USA programming will dive into the ways DevOps-driven shifts in practices and tools are introducing both new vulnerabilities and new ways of securing enterprises.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Insider Threats: An M&A Dealmaker's Nightmare πŸ•΄

Because data has never been more portable, taking it has never been easier. And that's a huge problem during mergers and acquisitions.

πŸ“– Read

via "Dark Reading: ".
⚠ Backdoor discovered in Ruby strong_password library ⚠

An eagle-eyed developer has discovered a backdoor recently sneaked into a library (or β€˜gem’) used by Ruby on Rails (RoR) web apps to check password strength.

πŸ“– Read

via "Naked Security".
πŸ” How to secure your Zoom conference line from hackers πŸ”

A Zero Day vulnerability allows any website to open up a video-enabled call on a Mac with the Zoom app installed. Here's how to patch it.

πŸ“– Read

via "Security on TechRepublic".
❌ Zoom Zero-Day Bug Opens Mac Users to Webcam Hijacking ❌

The vulnerability can be exploited on a drive-by basis by a malicious website.

πŸ“– Read

via "Threatpost".
❌ Marriott Hit With $123M Fine For Massive 2018 Data Breach ❌

The data breach fine against Marriott by the Information Commissioner's Office comes a day after British Airways was also penalized.

πŸ“– Read

via "Threatpost".
πŸ•΄ Marriott Faces $124 Million GDPR Fine in UK πŸ•΄

The proposed penalty is for a data breach beginning in 2014 that affected more than 500 million customers worldwide.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybercriminals Target Budding Cannabis Retailers πŸ•΄

Companies in the young, rapidly growing industry are targeted for sensitive information they store and immature security practices.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-14866 (odoo)

Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-14833

Intuit Lacerte 2017 has Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-8407 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross-site request forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface to change the user's password.

πŸ“– Read

via "National Vulnerability Database".
⚠ Zoom flaw could force Mac users into meetings, expose video feed ⚠

Its local web server reportedly also automatically reinstalls Zoom if a user removes the app and joins a meeting.

πŸ“– Read

via "Naked Security".
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
❌ 1,300 Popular Android Apps Access Data Without Proper Permissions ❌

Study finds Android apps circumvented privacy opt-in rules and collected sensitive user information against user permission.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cloud Security and Risk Mitigation πŸ•΄

Just because your data isn't on-premises doesn't mean you're not responsible for security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-11307

An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-8414 (dcs-1100_firmware, dcs-1130_firmware)

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary orthrus in /sbin folder of the device handles all the UPnP connections received by the device. It seems that the binary performs a sprintf operation at address 0x0000A3E4 with the value in the command line parameter "-f" and stores it on the stack. Since there is no length check, this results in corrupting the registers for the function sub_A098 which results in memory corruption.

πŸ“– Read

via "National Vulnerability Database".