πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Phishers' Latest Tricks for Reeling in New Victims πŸ•΄

Phishing works because people are, by nature, trusting -- but these evolving phishing techniques make it even tougher for security managers to stay on top.

πŸ“– Read

via "Dark Reading: ".
πŸ” Google hopes to protect users with open source differential privacy library πŸ”

Google's differential privacy library will give organizations a way to study their data while protecting people's information.

πŸ“– Read

via "Security on TechRepublic".
❌ Critical Exim Flaw Opens Millions of Servers to Takeover ❌

A critical vulnerability found in Exim servers could enable a remote, unauthenticated attacker to execute arbitrary code with root privileges.

πŸ“– Read

via "Threatpost".
πŸ•΄ From Spyware to Ninja Cable πŸ•΄

Attackers don't need sophisticated James Bondian hardware to break into your company. Sometimes a $99 device will do.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-10666

An issue was discovered in LibreNMS through 1.47. Several of the scripts perform dynamic script inclusion via the include() function on user supplied input without sanitizing the values by calling basename() or a similar function. An attacker can leverage this to execute PHP code from the included file. Exploitation of these scripts is made difficult by additional text being appended (typically .inc.php), which means an attacker would need to be able to control both a filename and its content on the server. However, exploitation can be achieved as demonstrated by the csv.php?report=../ substring.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-10665

An issue was discovered in LibreNMS through 1.47. The scripts that handle the graphing options (html/includes/graphs/common.inc.php and html/includes/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php script. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21014

The buddyboss-media plugin through 3.2.3 for WordPress has stored XSS.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21013

The Swape theme before 1.2.1 for WordPress has incorrect access control, as demonstrated by allowing new administrator accounts via vectors involving xmlPath to wp-admin/admin-ajax.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21012

The cf7-invisible-recaptcha plugin before 1.3.2 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21011

The charitable plugin before 1.5.14 for WordPress has unauthorized access to user and donation details.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Just A Few Questions Before That Bank Withdrawal ... πŸ•΄

And be ready to turn over your first born.

πŸ“– Read

via "Dark Reading: ".
πŸ” Millions of Exim Servers Vulnerable to Remote Code Execution Vulnerability πŸ”

A critical vulnerability in Exim, by far the world's most popular email server, was disclosed on Friday.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks ❌

Wikipedia and World of Warcraft Classic users reported global outages over the weekend in targeted - and connected - DDoS attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ Texas Refuses to Pay $2.5M in Massive Ransomware Attack πŸ•΄

The ransomware campaign affected 22 local governments, none of which have paid the attackers' $2.5 million ransom demand.

πŸ“– Read

via "Dark Reading: ".
❌ Telnet Backdoor Opens More Than 1M IoT Radios to Hijack ❌

Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.

πŸ“– Read

via "Threatpost".
πŸ•΄ Public Exposure Does Little to Slow China-Based Thrip APT πŸ•΄

Over the past year, the cyber-espionage group has attacked at least 12 other companies in the military, telecom, and satellite sectors, Symantec says.

πŸ“– Read

via "Dark Reading: ".
❌ Stealth Falcon Targets Middle East with Windows BITS Feature ❌

Cyberespionage attackers have ditched their PowerShell backdoor in favor of the Windows BITS β€˜notification’ feature.

πŸ“– Read

via "Threatpost".
❌ PsiXBot Adds PornModule, Google DNS Service to Its Arsenal ❌

Porn-recording feature will likely be used for extortion.

πŸ“– Read

via "Threatpost".
πŸ” More than 99% of attacks in the past year relied on human error to gain access πŸ”

Experiencing a data breach purely from being internet-connected is quite rare. Hackers rely on users to open or install a malicious payload, according to Proofpoint.

πŸ“– Read

via "Security on TechRepublic".