πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2011-5327

In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5332

In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5331

In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-6762

In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array.

πŸ“– Read

via "National Vulnerability Database".
⚠ Ransomware hits Louisiana schools; state of emergency declared ⚠

The Louisiana Governor declared a state of emergency after three public school districts were seized by ransomware.

πŸ“– Read

via "Naked Security".
⚠ Monday review – the hot 21 stories of the week ⚠

From iOS 13's password hole to logic bombs courtesy of the programmer from hell - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
πŸ•΄ A Security-First Approach to DevOps πŸ•΄

Aware of the risks inherent in software, businesses are recognizing the need for application security.

πŸ“– Read

via "Dark Reading: ".
πŸ” Is homomorphic encryption ready to deliver confidential cloud computing to enterprises? πŸ”

The ability to keep data encrypted while you use it for computations in the cloud could protect data from attackers and malicious insiders alike. There is still a performance hit, but you can start using open-source libraries to take advantage of that.

πŸ“– Read

via "Security on TechRepublic".
⚠ Three quarters of gamers suffer hate and harassment online ⚠

Trolling, stalking, sexual harassment, and humiliation have become so bad that one in ten respondents had depressive or suicidal thoughts.

πŸ“– Read

via "Naked Security".
πŸ•΄ 9 Things That Don't Worry You Today (But Should) πŸ•΄

There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.

πŸ“– Read

via "Dark Reading: ".
⚠ NAS vendors hit by brute force ransomware attacks ⚠

Cybercriminals are targeting numerous Network Attached Storage vendors with a new wave of ransomware.

πŸ“– Read

via "Naked Security".
⚠ Russia targeted all 50 states in 2016 election, Senate report says ⚠

The Senate Intelligence Committee doesn't know what Moscow's intentions are, but Robert Mueller says they're still at it.

πŸ“– Read

via "Naked Security".
❌ β€˜WannaCry Hero’ Avoids Jail Time in Kronos Malware Charges ❌

Marcus Hutchins, also known by his online alias MalwareTech, has been spared jail time in his sentencing for the creation of the Kronos malware.

πŸ“– Read

via "Threatpost".
πŸ” 100+ IT policies at your fingertips, ready for download πŸ”

From BYOD and social media to ergonomics and encryption, TechRepublic has dozens of ready-made, downloadable IT policy templates.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 4 Network Security Mistakes Bound to Bite You πŸ•΄

It's Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help.

πŸ“– Read

via "Dark Reading: ".
❌ Fearing WannaCry-Level Danger, Enterprises Wrestle with BlueKeep ❌

Fears of a WannaCry-level global attack grow as working exploit info starts to go public.

πŸ“– Read

via "Threatpost".
❌ β€˜URGENT/11’ Critical Infrastructure Bugs Threaten EternalBlue-Style Attacks ❌

Researchers have uncovered easy-to-exploit bugs that can impact physical safety, utilities, healthcare, critical infrastructure and more, setting the stage for widespread worm attacks.

πŸ“– Read

via "Threatpost".
πŸ” Vulnerability in VxWorks RTOS allows attackers to control internal networks πŸ”

Internet-connected devices powered by VxWorks 6.5 and newer are affected by a vulnerability that allows remote attackers full control over targeted devices.

πŸ“– Read

via "Security on TechRepublic".
❌ Cloud Security Concerns Loom for 93% of Businesses Adopting Apps and BYOD ❌

Threatpost talks to Jacob Serpa with Bitglass about how more enterprises are struggling with a cloud security conundrum when it comes to public cloud vs on prem.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2016-10766

edx-platform before 2016-06-06 allows CSRF.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10765

edx-platform before 2016-06-10 allows account activation with a spoofed e-mail address.

πŸ“– Read

via "National Vulnerability Database".