πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2015-9392

The users-ultra plugin before 1.5.63 for WordPress has XSS via the p_name parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Friday Five: 9/20 Edition πŸ”

A popular password manager fixes a bug, a 20 million person breach, and more - catch up on the week's infosec and privacy news with this week's Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Ransomware Strikes 49 School Districts & Colleges in 2019 πŸ•΄

The education sector has seen 10 new victims in the past nine days alone, underscoring a consistent trend throughout 2019.

πŸ“– Read

via "Dark Reading: ".
❌ Facebook Removed Tens of Thousands of Apps Post-Cambridge Analytica ❌

Facebook said it has suspended and banned tens of thousands of apps on its platform after its investigation, launched after Cambridge Analytica, into how they collect and use data.

πŸ“– Read

via "Threatpost".
πŸ” How to avoid the dreaded Video4Linux flaw in Android πŸ”

With Google dragging its feet on the fix for Video4Linux, you might consider revoking camera permissions for certain apps.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ HP Purchases Security Startup Bromium πŸ•΄

The purchase will bring new isolation and threat intelligence capabilities to the HP portfolio.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Web-Based Firewall Logging Tool 1.1.2 πŸ› 

Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Wireshark Analyzer 3.0.5 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2015-9406

Directory traversal vulnerability in the mTheme-Unus theme before 2.3 for WordPress allows an attacker to read arbitrary files via a .. (dot dot) in the files parameter to css/css.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10397

The Antioch theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to lib/scripts/download.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10396

The epic theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to includes/download.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 7 Ways VPNs Can Turn from Ally to Threat πŸ•΄

VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – the hot 22 stories of the week ⚠

From the Simjacker phone hack to IBM's cloud-based quantum computer - and everything in between. It's the weekly security roundup.

πŸ“– Read

via "Naked Security".
⚠ WannaCry – and why it never went away ⚠

WannaCry still hasn't died out, more than two years after the original attack. We went live to find out why...

πŸ“– Read

via "Naked Security".
⚠ Two charged with tech-support scamming the elderly for $10m ⚠

The tech-support scammers were allegedly part of a network of crooks in the US and India who conned about 7,500 victims.

πŸ“– Read

via "Naked Security".
⚠ Could EarEcho change the way we authenticate our phones? ⚠

Researchers have discovered a way to use wireless earbuds as a biometric authentication system.

πŸ“– Read

via "Naked Security".
⚠ Google pulls more fake adblockers from Chrome Web Store ⚠

Google has again been reprimanded for not spotting fake extensions impersonating popular brands in its Chrome Web Store.

πŸ“– Read

via "Naked Security".
πŸ•΄ 'Playing Around' Can Teach Serious Security Lessons πŸ•΄

A project intended to move a small robot around a hazardous board teaches some solid security lessons.

πŸ“– Read

via "Dark Reading: ".
⚠ Investors accuse FedEx of lying, stock dumping after NotPetya attack ⚠

This is the second such suit, with shareholders asking why execs sold $40m+ of their shares while downplaying the ransomware attack.

πŸ“– Read

via "Naked Security".
❌ 200K Sign Petition Against Equifax Data Breach Settlement ❌

A Change.org petition is demanding stronger accountability for Equifax in the 2017 leak that affected 150 million customers.

πŸ“– Read

via "Threatpost".
πŸ•΄ How Network Logging Mitigates Legal Risk πŸ•΄

Logging that is turned on, captured, and preserved immediately after a cyber event is proof positive that personal data didn't fall into the hands of a cybercriminal.

πŸ“– Read

via "Dark Reading: ".