πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ S2 Ep5: Phishing, eavesdropping voice assistants and quick fire questions – Naked Security Podcast ⚠

Episode 5 of the Naked Security Podcast is now live - listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Which Security Metrics Should I Use? πŸ•΄

Figuring that out actually begins with a broader question.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Asset Management Becomes the New Security Model πŸ•΄

While security pros once rallied around end-device management as their organizing principle, that approach is being subsumed by asset management, according to Dean Sysman, CEO and Co-Founder of Axonius. Device management becomes a subset of asset management, as organizations create a hierarchy to protect what's most valuable to them, he adds.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why hackers still impersonate Microsoft more than any other company πŸ”

Microsoft, PayPal, and Facebook are the top brands hackers attempt to copy in phishing attacks, according to Vade Secure.

πŸ“– Read

via "Security on TechRepublic".
❌ Spyware App on Google Play Gets Boot, Returns Days Later ❌

The app purported to stream music - but actually siphoned victims' device contacts and files.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2013-7481

The contact-form-plugin plugin before 3.3.5 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7480

The events-manager plugin before 5.3.6.1 for WordPress has XSS via the booking form and admin areas.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 5 Identity Challenges Facing Today's IT Teams πŸ•΄

To take control over your company's security, identify and understand the biggest identity and access management challenges facing IT teams today and start addressing them.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-7479

The events-manager plugin before 5.3.9 for WordPress has XSS in the search form field.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7478

The events-manager plugin before 5.5 for WordPress has XSS via EM_Ticket::get_post.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7477

The events-manager plugin before 5.5.2 for WordPress has XSS in the booking form.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6716

The events-manager plugin before 5.1.7 for WordPress has XSS via JSON call links.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-5158

The google-analyticator plugin before 5.2.1 for WordPress has insufficient HTML sanitization for Google Analytics API text.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Secureworks Pushes Human Intelligence, Machine Learning to Work Together πŸ•΄

Eschewing the either-or approach with machine learning, security operations centers must learn to identify and exploit the best of both approaches according to Secureworks' Tim Vidas and Nash Borges. Taken together, human and machine intelligence can be a force multiplier against human cyber adversaries, they say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SafeGuard Cyber Adds Security, Compliance Capabilities for WeChat πŸ•΄

A lack of visibility into the app could expose business users to compliance risks and security threats, the company says.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-10385

The memphis-documents-library plugin before 3.0 for WordPress has XSS via $_REQUEST.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10384

The memphis-documents-library plugin before 3.0 for WordPress has Local File Inclusion.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10383

The memphis-documents-library plugin before 3.0 for WordPress has Remote File Inclusion.

πŸ“– Read

via "National Vulnerability Database".
❌ Building a Mobile Defense: 5 Key Questions to Ask ❌

Willie Sutton and mobile attackers have much in common -- but defenses have evolved since the famous bank robber had his heyday.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2013-7482

The reflex-gallery plugin before 1.4.3 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".