🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2010-0749

Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0748

Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0747

drbd8 allows local users to bypass intended restrictions for certain actions via netlink packets, similar to CVE-2009-3725.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0737

A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-0398

The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.

📖 Read

via "National Vulnerability Database".
🔏 Digital Guardian Announces Special Offer for Symantec DLP Customers 🔏

Post-acquisition, Symantec DLP customers looking to reduce vendor uncertainty should take advantage of this exclusive offer.

📖 Read

via "Subscriber Blog RSS Feed ".
WhatsApp sues spyware maker for allegedly hacking phones worldwide

WhatsApp has publicly attributed the attack on its users in May 2019 to the Israeli spyware makers, NSO Group.

📖 Read

via "Naked Security".
Researchers find hole in EU-wide identity system

The EU has fixed a flaw in the powerful yet complex eIDAS digital identification system that let people authenticate as someone else.

📖 Read

via "Naked Security".
Judge lambasts porn company for spewing copyright lawsuits

A US court shielded ISP account holders from a request for expedited discovery to see whose IP addresses were used to share pirated videos.

📖 Read

via "Naked Security".
Valve Source Engine, Fortnite Servers Crippled By Gafgyt Variant

Servers hosting Valve Source Engine and popular games like Fortnite are targeted by a new variant of the Gafgyt botnet.

📖 Read

via "Threatpost".
Fake Voicemail/Office 365 Attack Targets Enterprise Execs

Executives at high-profile companies are being targeted by a fake voicemail campaign hunting for Office 365 credentials.

📖 Read

via "Threatpost".
Linux maintainer: Patching side-channel flaws is killing performance

Mirror, mirror on the wall, which is the worst side-channel vulnerability of them all?

📖 Read

via "Naked Security".
ICS Attackers Set Inflict More Damage with Evolving Tactics

While it remains difficult to attack critical infrastructure successfully, adversaries aim to use past experience to launch more destructive future attacks, according to analysis.

📖 Read

via "Threatpost".
🕴 9 Ways Data Vampires Are Bleeding Your Sensitive Information 🕴

Pull a Van Helsing on those sucking the lifeblood from your data and intellectual property.

📖 Read

via "Dark Reading: ".
🔐 Why organizations feel vulnerable to insider attacks 🔐

More than half of cybersecurity professionals believe detecting insider attacks has become harder since the migration to the cloud.

📖 Read

via "Security on TechRepublic".
🔐 How schools can better protect themselves against cyberattacks 🔐

Reported cyberattacks against K-12 schools in the US have hit 301 so far in 2019 compared to 124 in 2018 and 218 in 2017, according to a new report from security provider Barracuda Networks.

📖 Read

via "Security on TechRepublic".
🛠 Falco 0.18.0 🛠

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🔐 How to locate and close an open port in Linux 🔐

Locating and blocking unwanted open ports in Linux should be a task every network admin knows how to do.

📖 Read

via "Security on TechRepublic".
China-Linked Hackers Spy on Texts With MessageTap Malware

Chinese state-sponsored hackers are attacking telecom networks to sniff out SMS messages that contain keywords revolving around political dissidents.

📖 Read

via "Threatpost".
🔏 Ex-Pipeline Workers Charged with Stealing Data for Competing Firm 🔏

These ex-employees copied trade secrets onto private storage devices then bragged that their new business would soon be competing with it.

📖 Read

via "Subscriber Blog RSS Feed ".
🕴 New Office 365 Phishing Scam Leaves A Voicemail 🕴

A fake voice message lures victims to a fake Microsoft 365 login page that prompts them to enter credentials.

📖 Read

via "Dark Reading: ".