πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Why digital transformation puts you at greater risk for cyberattacks πŸ”

Companies that do not keep up with their digital transformation initiatives may see a $1 million or more loss due to cyberattacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 ways to maximize customers' data security πŸ”

Customers are starting to get the message that their data is valuable. Tom Merritt offers five suggestions to ensure your customers' data isn't vulnerable to attack.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Former Equifax Manager Sentenced for Insider Trading πŸ•΄

Sudhakar Bonthu bought and sold Equifax stock options prior to the public disclosure of its 2017 data breach.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 ways to maximize customer data security πŸ”

Customers are starting to get the message that their data is valuable. Tom Merritt offers five suggestions to ensure your customers' data isn't vulnerable to attack.

πŸ“– Read

via "Security on TechRepublic".
❌ New APT Could Signal Reemergence of Notorious Comment Crew ❌

A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crew's proprietary code.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ New Security Woes for Popular IoT Protocols πŸ•΄

Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How to Get Consumers to Forgive You for a Breach πŸ•΄

It starts with already-established trust, a new survey shows.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-4633

Multiple SQL injection vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow (1) remote attackers to execute arbitrary SQL commands via the number parameter to opac-tags_subject.pl in the OPAC interface or (2) remote authenticated users to execute arbitrary SQL commands via the Filter or (3) Criteria parameter to reports/borrowers_out.pl in the Staff interface.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-4632

Multiple directory traversal vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-4631

Multiple cross-site scripting (XSS) vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to inject arbitrary web script or HTML via the (1) tag parameter to opac-search.pl; the (2) value parameter to authorities/authorities-home.pl; the (3) delay parameter to acqui/lateorders.pl; the (4) authtypecode or (5) tagfield to admin/auth_subfields_structure.pl; the (6) tagfield parameter to admin/marc_subfields_structure.pl; the (7) limit parameter to catalogue/search.pl; the (8) bookseller_filter, (9) callnumber_filter, (10) EAN_filter, (11) ISSN_filter, (12) publisher_filter, or (13) title_filter parameter to serials/serials-search.pl; or the (14) author, (15) collectiontitle, (16) copyrightdate, (17) isbn, (18) manageddate_from, (19) manageddate_to, (20) publishercode, (21) suggesteddate_from, or (22) suggesteddate_to parameter to suggestion/suggestion.pl; or the (23) direction, (24) display or (25) addshelf parameter to opac-shelves.pl.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-4630

Multiple cross-site request forgery (CSRF) vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to (1) hijack the authentication of administrators for requests that create a user via a request to members/memberentry.pl or (2) give a user superlibrarian permission via a request to members/member-flags.pl or (3) hijack the authentication of arbitrary users for requests that conduct cross-site scripting (XSS) attacks via the addshelf parameter to opac-shelves.pl.

πŸ“– Read

via "National Vulnerability Database".
⚠ Apple privacy portal lets you see everything it knows about you ⚠

The Apple website's privacy and data area lets you download and correct your data.

πŸ“– Read

via "Naked Security".
⚠ Serious D-Link router security flaws may never be patched ⚠

Six routers with serious security flaws are considered end of life (EOL) and may never be updated.

πŸ“– Read

via "Naked Security".
⚠ β€œWe know you watch porn” (and here’s fake proof…) [PODCAST] ⚠

Here's Episode 6 of the Naked Security podcast... enjoy!

πŸ“– Read

via "Naked Security".
πŸ” AI, cybersecurity shape the CIO agenda for 2019 as IT budgets rise πŸ”

Companies are scaling digital transformation projects, but privacy remains a top concern, according to a Gartner report.

πŸ“– Read

via "Security on TechRepublic".
❌ Trivial Post-Intrusion Attack Exploits Windows RID ❌

Simple technique enables attackers to leverage Windows OS component to maintain stealth and persistence post system compromise.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Risky Business: Dark Reading Caption Contest Winners πŸ•΄

Phishing, anti-shoulder surfing, Russia and other hysterical identity management puns and comments. And the winners are ...

πŸ“– Read

via "Dark Reading: ".
πŸ” Why we need more cybersecurity workers right now πŸ”

At the 2018 Grace Hopper Celebration, Katie Jenkins of Liberty Mutual explained how to attract more diverse candidates to cybersecurity roles.

πŸ“– Read

via "Security on TechRepublic".
❌ AWS FreeRTOS Bugs Allow Compromise of IoT Devices ❌

The bugs let hackers crash IoT devices, leak their information, and completely take them over.

πŸ“– Read

via "The first stop for security news | Threatpost ".