🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 As Phishing Kits Evolve, Their Lifespans Shorten 🕴

Most phishing kits last less than 20 days, a sign defenders are keeping up in the race against cybercrime.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2013-1391

Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0207

In xpdf, the xref table contains an infinite loop which allows remote attackers to cause a denial of service (application crash) in xpdf-based PDF viewers.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0206

xpdf allows remote attackers to cause a denial of service (NULL pointer dereference and crash) in the way it processes JBIG2 PDF stream objects.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-1673

A cross-site scripting (XSS) vulnerability in ikiwiki before 3.20101112 allows remote attackers to inject arbitrary web script or HTML via a comment.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0749

Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0748

Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0747

drbd8 allows local users to bypass intended restrictions for certain actions via netlink packets, similar to CVE-2009-3725.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0737

A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0398

The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.

📖 Read

via "National Vulnerability Database".
🔏 Digital Guardian Announces Special Offer for Symantec DLP Customers 🔏

Post-acquisition, Symantec DLP customers looking to reduce vendor uncertainty should take advantage of this exclusive offer.

📖 Read

via "Subscriber Blog RSS Feed ".
WhatsApp sues spyware maker for allegedly hacking phones worldwide

WhatsApp has publicly attributed the attack on its users in May 2019 to the Israeli spyware makers, NSO Group.

📖 Read

via "Naked Security".
Researchers find hole in EU-wide identity system

The EU has fixed a flaw in the powerful yet complex eIDAS digital identification system that let people authenticate as someone else.

📖 Read

via "Naked Security".
Judge lambasts porn company for spewing copyright lawsuits

A US court shielded ISP account holders from a request for expedited discovery to see whose IP addresses were used to share pirated videos.

📖 Read

via "Naked Security".
Valve Source Engine, Fortnite Servers Crippled By Gafgyt Variant

Servers hosting Valve Source Engine and popular games like Fortnite are targeted by a new variant of the Gafgyt botnet.

📖 Read

via "Threatpost".
Fake Voicemail/Office 365 Attack Targets Enterprise Execs

Executives at high-profile companies are being targeted by a fake voicemail campaign hunting for Office 365 credentials.

📖 Read

via "Threatpost".
Linux maintainer: Patching side-channel flaws is killing performance

Mirror, mirror on the wall, which is the worst side-channel vulnerability of them all?

📖 Read

via "Naked Security".
ICS Attackers Set Inflict More Damage with Evolving Tactics

While it remains difficult to attack critical infrastructure successfully, adversaries aim to use past experience to launch more destructive future attacks, according to analysis.

📖 Read

via "Threatpost".
🕴 9 Ways Data Vampires Are Bleeding Your Sensitive Information 🕴

Pull a Van Helsing on those sucking the lifeblood from your data and intellectual property.

📖 Read

via "Dark Reading: ".
🔐 Why organizations feel vulnerable to insider attacks 🔐

More than half of cybersecurity professionals believe detecting insider attacks has become harder since the migration to the cloud.

📖 Read

via "Security on TechRepublic".
🔐 How schools can better protect themselves against cyberattacks 🔐

Reported cyberattacks against K-12 schools in the US have hit 301 so far in 2019 compared to 124 in 2018 and 218 in 2017, according to a new report from security provider Barracuda Networks.

📖 Read

via "Security on TechRepublic".