πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2010-1678

Mapserver 5.2, 5.4 and 5.6 before 5.6.5-2 improperly validates symbol index values during Mapfile parsing.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-2064

rpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-2061

rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.

πŸ“– Read

via "National Vulnerability Database".
⚠ Uber sues LA in bid to protect scooter riders’ geolocation data ⚠

The anonymized real-time location data the city's after can easily be associated with riders, thereby jeopardizing their privacy, Uber says.

πŸ“– Read

via "Naked Security".
⚠ Facebook launches $2m suit against alleged phishing, hacking sites ⚠

Facebook is using trademark law to target the operators of sites that imitate or target Facebook and Instagram sites.

πŸ“– Read

via "Naked Security".
⚠ Sextortion scammers are hijacking blogs – and victims are paying up ⚠

Sextortion scammers have started hijacking poorly managed or defunct blogs to expand an increasingly profitable business.

πŸ“– Read

via "Naked Security".
⚠ Got an early iPhone or iPad? Update now or turn it into a paperweight ⚠

Calling Apple iPhone 5, iPhone 4s or early iPad owners - your device may be about to turn into a vintage technology paperweight.

πŸ“– Read

via "Naked Security".
❌ City of Johannesburg, on Second Hit, Refuses to Pay Ransom ❌

A Shadow Kill Hackers attack that compromised the city’s network and shut down key services was the second ransom-related attack on the city in months.

πŸ“– Read

via "Threatpost".
❌ Android Malware Plaguing 45K Devices Remains A Mystery ❌

The source of infection behind an increasingly precarious mobile malware is causing researchers to scratch their heads.

πŸ“– Read

via "Threatpost".
❌ MSPs Can Now Provide Managed Detection and Response with Cynet 360 ❌

MDR providers can provide a first-of-its-kind solution: Protection across the endpoints, user accounts and the network itself, in one solution.

πŸ“– Read

via "Threatpost".
πŸ” 74% of employees say their company is a new tech laggard πŸ”

A Zensar survey of 1,000 workers also found that 45% said a successful company should adopt new tech faster than anyone else.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Python support added to Threat Stack's Application Security Monitoring tool πŸ”

The utility can identify insecure code in production from third-party packages as well as original code.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Hacking Phones: How Law Enforcement Is Saving Privacy πŸ•΄

It's no longer true that society must choose to either weaken everybody's privacy or let criminals run rampant.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 10 'Secure' Ways to Start a Conversation πŸ•΄

Should you find yourself at a loss for words ...

πŸ“– Read

via "Dark Reading: ".
πŸ” How to help make your Chromebook as secure as possible: 6 tips πŸ”

Find out how to better secure your chromebook with these easy tips.

πŸ“– Read

via "Security on TechRepublic".
❌ Murky Details Surround Bed, Bath and Beyond Breach ❌

The housewares giant disclosed a breach with few details-- but security researchers have some theories.

πŸ“– Read

via "Threatpost".
πŸ›  Ansvif 1.12 πŸ› 

Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ 8 Trends in Vulnerability and Patch Management πŸ•΄

Unpatched flaws continue to be a major security issue for many organizations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Email Threats Poised to Haunt Security Pros into Next Decade πŸ•΄

Decentralized threat intel sharing, more public-private collaboration, and greater use of automated incident response are what's needed to combat phishing

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Universities Get Failing Grades for DMARC Adoption ❌

Of the 200 schools in the report, the University of Pittsburgh and Georgetown University received top marks, with their DMARC policy set to "reject."

πŸ“– Read

via "Threatpost".
πŸ” How to protect your business against phishing attacks that exploit major tech brands πŸ”

Users of Microsoft, PayPal, DHL, and Dropbox are among the top targets of phishers, according to a new report from cloud service provider Akamai.

πŸ“– Read

via "Security on TechRepublic".