πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2016-10943

The zx-csv-upload plugin 1 for WordPress has SQL injection via the id parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10942

The podlove-podcasting-plugin-for-wordpress plugin before 2.3.16 for WordPress has SQL injection via the insert_id parameter exploitable via CSRF.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10941

The podlove-podcasting-plugin-for-wordpress plugin before 2.3.16 for WordPress has XSS exploitable via CSRF.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10940

The zm-gallery plugin 1.0 for WordPress has SQL injection via the order parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10939

The xtremelocator plugin 1.5 for WordPress has SQL injection via the id parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10938

The copy-me plugin 1.0.0 for WordPress has CSRF for copying non-public posts to a public location.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Cybercrimninals set sights on bot attacks and mobile apps πŸ”

The past six months have seen a 13% increase in human-initiated cyberattacks. Here's what cybercriminals are targeting.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Friday Five: 9/13 Edition πŸ”

Hackers hit a U.S. power utility, a new audit on whether schools are monitoring employee access to student data, and more - catch up on the week's news with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks ❌

At every turn, the info-stealer uses legitimate services to get around normal email, endpoint and network defenses.

πŸ“– Read

via "Threatpost".
πŸ•΄ No Quick Fix for Security-Worker Shortfall πŸ•΄

Security professionals see acquiring skills as the way forward, but only half of companies are training their workers, with more continuing to search for highly skilled employees.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Questions to Ask Once You've Learned of a Breach πŸ•΄

With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.

πŸ“– Read

via "Dark Reading: ".
πŸ” What's powering the unlikely rise of the millionaire hacker? πŸ”

Six hackers made over $1 million this year for squashing security bugs, yet just five years ago this possibility seemed remote at best.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2010-5333

The web server in Integard Pro and Home before 2.0.0.9037 and 2.2.x before 2.2.0.9037 has a buffer overflow via a long password in an administration login POST request, leading to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ US Sanctions 3 Cyber Attack Groups Tied to DPRK πŸ•΄

Lazarus Group, Bluenoroff, and Andariel were named and sanctioned by the US Treasury for ongoing attacks on financial systems.

πŸ“– Read

via "Dark Reading: ".
❌ iPhone iOS 13 Lockscreen Bypass Flaw Exposes Contacts ❌

Apple will not fix the glitch until the release of iOS 13.1 later in September.

πŸ“– Read

via "Threatpost".
πŸ” Cybercriminals shop for admin access to healthcare portals πŸ”

Administrator access to backend systems is becoming the holy grail for attackers.

πŸ“– Read

via "Security on TechRepublic".
πŸ” New Principles for Maintaining Health Information Privacy Outlined πŸ”

There's a fresh new slate of industry privacy guidelines for companies that handle health and wellness data to follow.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Malware Linked to Ryuk Targets Financial & Military Data πŸ•΄

A newly discovered campaign, packing traces of Ryuk ransomware, aims to steal confidential information.

πŸ“– Read

via "Dark Reading: ".
❌ WordPress XSS Bug Allows Drive-By Code Execution ❌

Sites that use the Gutenberg (found in WordPress 5.0 to 5.2.2) are open to complete takeover.

πŸ“– Read

via "Threatpost".
⚠ Monday review – the hot 23 stories of the week ⚠

From Intel's SSH-stealing NetCAT bug to Mozilla's VPN - and everything in between. It's the weekly roundup.

πŸ“– Read

via "Naked Security".