πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2010-5340

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/ with the parameter password is non-persistent in 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5339

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/basic/ with the parameter _dlg[captcha][uid] is non-persistent in 10.1.3 and 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5338

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/basic/ with the parameter _dlg[captcha][action] is non-persistent in 10.1.3 and 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5337

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/basic/ with the parameter _dlg[captcha][controller] is non-persistent in 10.1.3 and 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5336

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: admin/login.html with the parameter username is persistent in 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5335

IceWarp Webclient before 10.2.1 has a directory traversal vulnerability. This can result in loss of confidential data of IceWarp Mailserver and the operating system. Input passed via a certain parameter (script to basic/minimizer/index.php) is not properly sanitised and can therefore be exploited to browse the partition where IceWarp is installed (or the whole system) and read arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-5334

IceWarp Webclient before 10.2.1 has a directory traversal vulnerability. This can result in loss of confidential data of IceWarp Mailserver and the operating system. Input passed via a certain parameter (_c to basic/index.html) is not properly sanitised and can therefore be exploited to browse the partition where IceWarp is installed (or the whole system) and read arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
❌ Iran-Linked β€˜Charming Kitten’ Touts New Spearphishing Tactics ❌

A campaign first observed last year has ramped up its attack methods and appears to be linked to activity targeting President Trump’s 2020 re-election campaign.

πŸ“– Read

via "Threatpost".
πŸ•΄ Close the Gap Between Cyber-Risk and Business Risk πŸ•΄

Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Creative Wi-Fi Passwords πŸ•΄

Let's see a hacker figure out one of these.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep12: Dark Web, O.MG Cable spying and securing new laptops – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Build Your Cybersecurity Toolkit at Black Hat Europe in December πŸ•΄

Now's the time to start planning what to see and do at Black Hat Europe, which is jam-packed with relevant Briefings and Arsenal demos.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable SSH session recording in CentOS 8 πŸ”

Learn how to enable SSH session recording in CentOS 8.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable SSH session recording in CentOS 8 πŸ”

Learn how to enable SSH session recording in CentOS 8.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Friday Five: 10/11 Edition πŸ”

News on a new military cyber alert system, Twitter mishandles user data, and what to do with data if there's a no-deal Brexit. Catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Fin7 Cybergang Retools With New Malicious Code ❌

A new dropper and payload show that Fin7 isn't going anywhere despite a crackdown on the infamous group by law enforcement in 2018.

πŸ“– Read

via "Threatpost".
πŸ•΄ A Murderers' Row of Poisoning Attacks πŸ•΄

Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning and other attacks work can help you prepare the proper antidote.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Works of Art: Cybersecurity Inspires 6 Winning Ideas πŸ•΄

The Center for Long Term Cybersecurity recently awarded grants to six artists in a contest to come up with ideas for works with security themes and elements. Check 'em out.

πŸ“– Read

via "Dark Reading: ".
❌ Imperva: Data Breach Caused by Cloud Misconfiguration ❌

Hackers were able to steal an AWS administrative API key housed in a compute instance left exposed to the public internet.

πŸ“– Read

via "Threatpost".
πŸ•΄ FBI: Phishing Can Defeat Two-Factor Authentication πŸ•΄

A recent Privacy Industry Notification points to two new hacker tools that can turn a victim's browser into a credential-stealing zombie.

πŸ“– Read

via "Dark Reading: ".