πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-18673

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Menu Link" parameter, aka the adm/menu_list_update.php me_link parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-18672

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board head contents" parameter, aka the adm/board_form_update.php bo_content_head parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-18671

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "mobile board head contents" parameter, aka the adm/board_form_update.php bo_mobile_content_head parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-18670

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Extra Contents" parameter, aka the adm/config_form_update.php cf_1~10 parameter.

πŸ“– Read

via "National Vulnerability Database".
❌ Malware-Loader β€˜Brushaloader’ Grows More Menacing ❌

Dropper malware become more popular as hackers turn to more quiet attack techniques to avoid detection.

πŸ“– Read

via "Threatpost".
πŸ•΄ Bug Bounties Continue to Rise as Google Boosts its Payouts πŸ•΄

Reward for vulnerability research climbed 83% in the past year.

πŸ“– Read

via "Dark Reading: ".
❌ WordPress Plugin Flaws Exploited in Ongoing Malvertising Campaign ❌

An ongoing malvertising campaign is exploiting WordPress plugin vulnerabilities to redirect website visitors to malicious pages.

πŸ“– Read

via "Threatpost".
❌ Citrix Confirms Password-Spraying Heist of Reams of Internal IP ❌

Security experts say the attack stemmed from weak cybersecurity controls.

πŸ“– Read

via "Threatpost".
πŸ•΄ Business Email Compromise: Thinking Beyond Wire Transfers πŸ•΄

As BEC continues to drive record-high losses, cybercriminals devise new tactics for swindling corporate targets out of millions.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Penetration Test Data Shows Risk to Domain Admin Credentials πŸ•΄

But gaining a foothold on the LAN via vulnerabilities on Internet-facing assets is becoming harder, Rapid7 found in its real-world pen tests.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New IPS Architecture Uses Network Flow Data for Analysis πŸ•΄

Can a stream of data intended for network performance monitoring be the basis of network security? One company says the answer is 'yes.'

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Malware-based Attacks Dropped 20% Worldwide πŸ•΄

Meanwhile, criminals waged more encrypted, ransomware, and IoT attacks.

πŸ“– Read

via "Dark Reading: ".
⚠ Facebook admits to Messenger Kids security hole ⚠

A hole in the supposed closed-loop messaging system allowed children to join group chats with people their parents hadn’t approved.

πŸ“– Read

via "Naked Security".
⚠ Apple’s July patchfest fixes bugs in multiple products ⚠

Apple released fixes for various products this week, including one for a bug that has been public with proof-of-concept code for two months.

πŸ“– Read

via "Naked Security".
πŸ•΄ VPNs' Future: Less Reliant on Users, More Transparent, And Smarter πŸ•΄

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Travel Security [from J4vv4D] πŸ•΄

Do you travel to dangerous places, like Information Security Conferences?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat USA Offers Inside Look at Boeing 787 Security Flaws πŸ•΄

The 787 Dreamliner, WhatsApp, and Windows 10 are all subjects of cutting-edge Reverse Engineering talks at this year's August event.

πŸ“– Read

via "Dark Reading: ".
πŸ” 83% have experienced a DDoS attack in the past two years, survey finds πŸ”

The ease with which DDoS attacks can be waged makes them particularly prevalent, with over half surveyed experiencing multiple attacks waged against their organization.

πŸ“– Read

via "Security on TechRepublic".
❌ Protecting Against Ransomware Attacks: A Checklist ❌

In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Commoditization of Multistage Malware Attacks πŸ•΄

Malware that used to be advanced is now available to everyone. These three actions could help you stay safer.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Stats That Show What it Takes to Run a Modern SOC πŸ•΄

An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).

πŸ“– Read

via "Dark Reading: ".