🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2010-4241

Tiki Wiki CMS Groupware 5.2 has CSRF

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-4240

Tiki Wiki CMS Groupware 5.2 has XSS

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-4239

Tiki Wiki CMS Groupware 5.2 has Local File Inclusion

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-3293

mailscanner can allow local users to prevent virus signatures from being updated

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2009-4900

pixelpost 1.7.1-5 has XSS

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2009-4899

pixelpost 1.7.1-5 has SQL injection

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2005-2349

Zoo 2.10-27 has Directory traversal

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2002-2444

Snoopy 2.0.0-1 has a security hole in exec cURL

📖 Read

via "National Vulnerability Database".
🕴 Database Error Exposes 7.5 Million Adobe Customer Records 🕴

The database was open for approximately one week before the problem was discovered.

📖 Read

via "Dark Reading: ".
🔏 Ex-SEC Employee Took Data to Land New Job 🔏

The DOJ says a former SEC examiner stole information from the government agency to help him land a chief compliance officer gig at a firm the SEC was investigating.

📖 Read

via "Subscriber Blog RSS Feed ".
🕴 US Lawmakers Fear Chinese-Owned TikTok Poses Security Risk 🕴

The popular video app has more than 110 million downloads in the United States and could give China access to users' personal data, they say.

📖 Read

via "Dark Reading: ".
Pwn2Own Expands Into Industrial Control Systems Hacking

White-hat hackers will now have the chance to win $20,000 for sniffing out remote code-execution flaws in industrial control systems.

📖 Read

via "Threatpost".
🔐 2020 predictions for technology, consumer packaged goods and retail 🔐

Nielsen released predictions for the next decade at the Gartner IT Symposium/Xpo 2019 and CPG and retail supply chains will need automation, blockchain and enhanced analytics to improve security.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2012-5577

Python keyring lib before 0.10 created keyring files with world-readable permissions.

📖 Read

via "National Vulnerability Database".
Adobe database exposes 7.5 million Creative Cloud users

Adobe has become the latest company to be caught leaving an Elasticsearch database full of customer data exposed on the internet.

📖 Read

via "Naked Security".
UniCredit Suffers Third Breach Despite Investing Billions in Cybersecurity

UniCredit was also hit with hacking incidents in September-October 2016 and June-July 2017.

📖 Read

via "Threatpost".
🔐 Hackers finding ways to exploit automotive software to overtake cars 🔐

A new report from IntSights details the many ways cybercriminals break into a new generation of highly digitized cars.

📖 Read

via "Security on TechRepublic".
🕴 Is Voting by Mobile App a Better Security Option or Just 'A Bad Idea'? 🕴

Security experts say voting by app adds another level of risk, as mobile-voting pilots expand for overseas military and voters with disabilities.

📖 Read

via "Dark Reading: ".
🕴 Pwn2Own Adds Industrial Control Systems to Hacking Contest 🕴

The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January.

📖 Read

via "Dark Reading: ".
🛠 Stegano 0.9.7 🛠

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🔐 Top 5 things to know about alternative data 🔐

Alternative data allows businesses to discover trends and financial opportunities without compromising consumer privacy. Tom Merritt explains the five things you need to know about alternative data.

📖 Read

via "Security on TechRepublic".