πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Humans may have been listening to you via your Xbox ⚠

Microsoft has given audio clips to contractors for years, but it says it recently stopped. ... For the most part.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2014-10394

The rich-counter plugin before 1.2.0 for WordPress has JavaScript injection via a User-Agent header.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10392

The cforms2 plugin before 10.2 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10391

The wp-support-plus-responsive-ticket-system plugin before 4.1 for WordPress has JavaScript injection.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10390

The wp-support-plus-responsive-ticket-system plugin before 4.2 for WordPress has directory traversal.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10389

The wp-support-plus-responsive-ticket-system plugin before 4.2 for WordPress has incorrect authentication.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10388

The wp-support-plus-responsive-ticket-system plugin before 4.2 for WordPress has full path disclosure.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10387

The wp-support-plus-responsive-ticket-system plugin before 4.2 for WordPress has SQL injection.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Tops Phishers' Favorite Brands as Facebook Spikes πŸ•΄

Microsoft remains the favorite brand to spoof in phishing campaigns, but more attackers are impersonating Facebook.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Time to Get Smarter About Threat Intel πŸ•΄

Bad actors move faster than threat intelligence feeds and the infosec pros who monitor them, notes Joakim Kennedy, Threat Intel Manager for Anomali Research. Organizations need to establish a dedicated team to manage threat intel, and an adequate budget. Kennedy also encourages intelligence sharing as part of a stepped-up protection strategy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Aviation Faces Increasing Cybersecurity Scrutiny πŸ•΄

Some aviation experts and security researchers are trying to foster closer alliances for securing airplane networks.

πŸ“– Read

via "Dark Reading: ".
⚠ Quick thinking by Portland Public Schools stops $2.9m BEC scam ⚠

Employees at Portland Public Schools were breathing easier this week after thwarting a business email compromise (BEC) scam that could have cost them almost $3m.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2014-10386

The wp-live-chat-support plugin before 4.1.0 for WordPress has JavaScript injections.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10382

The feature-comments plugin before 1.2.5 for WordPress has CSRF for featuring or burying a comment.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7483

The slidedeck2 plugin before 2.3.5 for WordPress has file inclusion.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Haas Formula 1 CIO Builds Security at 230 Miles per Hour πŸ•΄

As the CIO for both Formula 1 and NASCAR racing teams, Gary Foote is tackling the same security issues as other manufacturing CIOs -- with a huge dash of motorized mayhem thrown in.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Malware Variant Targets Old Adobe, Office Vulnerabilities πŸ•΄

Criminals appear to have developed it knowing some users have not patched or updated to newer versions, Trend Micro says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Analytics and Security Prove Effective Security Hybrid πŸ•΄

Against the backdrop of consolidation in the SIEM and SOAR sectors, infosec professionals are deploying some combination of analytics and security, according to Haiyan Song, Senior Vice President & General Manager of Security Markets for Splunk. Analytics helps organizations make better decisions and detect anomalies faster, she adds.

πŸ“– Read

via "Dark Reading: ".
πŸ” 100+ IT policies at your fingertips, ready for download πŸ”

From BYOD and social media to ergonomics and encryption, TechRepublic has dozens of ready-made, downloadable IT policy templates.

πŸ“– Read

via "Security on TechRepublic".