πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2013-7477

The events-manager plugin before 5.5.2 for WordPress has XSS in the booking form.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6716

The events-manager plugin before 5.1.7 for WordPress has XSS via JSON call links.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-5158

The google-analyticator plugin before 5.2.1 for WordPress has insufficient HTML sanitization for Google Analytics API text.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Secureworks Pushes Human Intelligence, Machine Learning to Work Together πŸ•΄

Eschewing the either-or approach with machine learning, security operations centers must learn to identify and exploit the best of both approaches according to Secureworks' Tim Vidas and Nash Borges. Taken together, human and machine intelligence can be a force multiplier against human cyber adversaries, they say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SafeGuard Cyber Adds Security, Compliance Capabilities for WeChat πŸ•΄

A lack of visibility into the app could expose business users to compliance risks and security threats, the company says.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-10385

The memphis-documents-library plugin before 3.0 for WordPress has XSS via $_REQUEST.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10384

The memphis-documents-library plugin before 3.0 for WordPress has Local File Inclusion.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10383

The memphis-documents-library plugin before 3.0 for WordPress has Remote File Inclusion.

πŸ“– Read

via "National Vulnerability Database".
❌ Building a Mobile Defense: 5 Key Questions to Ask ❌

Willie Sutton and mobile attackers have much in common -- but defenses have evolved since the famous bank robber had his heyday.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2013-7482

The reflex-gallery plugin before 1.4.3 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-7321

The tubepress plugin before 1.6.5 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Texas Towns Recover, But Local Governments Have Little Hope For Respite from Ransomware πŸ•΄

Their struggles underscore the difficulties for small towns in dealing with cyberattacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ LinkedIn Details Features of Fight Against Fakes πŸ•΄

A recent blog post explains how the social network is fighting to protect its users from interactions with fake accounts.

πŸ“– Read

via "Dark Reading: ".
πŸ” Android Security Bulletin August 2019: What you need to know πŸ”

Another month is here, and Android finds itself with a mixture of critical and high vulnerabilities.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Endgame Boosts Apple Security to Be Commensurate with Windows Security πŸ•΄

Gone are the days when users could take refuge from Windows threats with Apple devices, as malware writers are exploiting OSX and iOS with real vigor, says Mark Dufresne, VP of R&D at Endgame. And though it's taken a while, Mac security has achieved parity with Windows so that Apple users need no longer settle for "protected enough."

πŸ“– Read

via "Dark Reading: ".
πŸ” How Organizations Can Stay Ahead of Changing Privacy Laws πŸ”

GDPR, CCPA, PIPEDA. Privacy legislation is constantly changing these days. We asked 26 business leaders, security pros, and attorneys how to best stay ahead of changing privacy laws.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Threat Intelligence Gateways: A Useful Adjunct to Overworked Perimeter Security πŸ•΄

Comparative research shows the relative strengths and weaknesses of five TIG vendors and which kinds of security organization will reap the most benefit.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Make DNS a Cornerstone of Your Cyber Security Arsenal πŸ•΄

Better known for their essential role in networking, Domain Name Servers should be tapped as a means to identify - and shut down - suspicious or destructive activity, according to Anthony James, VP of Marketing for Infoblox. He also explains how to combine DNS with DHCP and IP address management to improve an organization's security.

πŸ“– Read

via "Dark Reading: ".
❌ Google Launches Open-Source Browser Extension for Ad Transparency ❌

Google introduced a new initiative that it hopes will fight shady online advertising practices such as digital fingerprinting.

πŸ“– Read

via "Threatpost".
⚠ Humans may have been listening to you via your Xbox ⚠

Microsoft has given audio clips to contractors for years, but it says it recently stopped. ... For the most part.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2014-10394

The rich-counter plugin before 1.2.0 for WordPress has JavaScript injection via a User-Agent header.

πŸ“– Read

via "National Vulnerability Database".