πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Slow Retreat from Python 2 Threatens Code Security πŸ•΄

The end of life is near for Python 2, and there will be no rising from the grave this time. So why are some companies and developers risking a lack of security patches to stay with the old version of the programming language?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 32,000+ WiFi Routers Potentially Exposed to New Gafgyt Variant πŸ•΄

Researchers detect an updated Gafgyt variant that targets flaws in small office and home wireless routers from Zyxel, Huawei, and Realtek.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2010-2783

IcedTea6 before 1.7.4 allow unsigned apps to read and write arbitrary files, related to Extended JNLP Services.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-2548

IcedTea6 before 1.7.4 does not properly check property access, which allows unsigned apps to read and write arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
⚠ Hackers plead guilty to breach that Uber covered up ⚠

The two men pointed to Uber's $100K hush-money payment when they tried to extort Linkedin-owned Lynda... that instead called the cops.

πŸ“– Read

via "Naked Security".
⚠ Twitter bans political ads ⚠

Interesting timing: Right before Facebook's earnings call, two weeks after Facebook said it won't pull political ads that spout lies.

πŸ“– Read

via "Naked Security".
❌ Android Keyboard App Could Swindle 40M Users Out of Millions ❌

The Ai.type app was removed from Google Play in June 2019 – but still remains on millions of Android devices and is still available from other Android marketplaces, researchers warn.

πŸ“– Read

via "Threatpost".
⚠ Happy Birthday, CVE! ⚠

The Common Vulnerabilities and Exposures (CVE) system is 20 years old this week.

πŸ“– Read

via "Naked Security".
πŸ•΄ Raising Security Awareness: Why Tools Can't Replace People πŸ•΄

Training your people and building relationships outside of the security organization is the most significant investment a CISO can make.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2005-3056

TWiki allows arbitrary shell command execution via the Include function

πŸ“– Read

via "National Vulnerability Database".
⚠ Apple props up macOS Catalina with 10.15.1 update ⚠

A vocal minority of the committed Apple base has been quick to express dissatisfaction at the move to Catalina from macOS 10.14 Mojave.

πŸ“– Read

via "Naked Security".
πŸ” How to allow SSH connections from LAN and WAN on different ports πŸ”

Is it possible to configure SSH to listen for connections on both internal and external interfaces, using different ports? Jack Wallen says "yes."

πŸ“– Read

via "Security on TechRepublic".
❌ Google Discloses Chrome Flaw Exploited in the Wild ❌

Google warns exploits in the wild against a Use After Free vulnerability in Chrome's audio component.

πŸ“– Read

via "Threatpost".
πŸ•΄ 8 Holiday Security Tips for Retailers πŸ•΄

As retailers head into the holiday rush, here's how they can protect their businesses from attackers and scammers hoping to wreak havoc during the most wonderful time of the year.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep15: City under attack! VPN hacked, floppies nixed ⚠

A latest episode of the Naked Security podcast is out now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Google Patches Chrome Zero-Day Under Active Attack πŸ•΄

The fix addresses CVE-2019-13720, a high-severity, use-after-free vulnerability discovered by Kaspersky Lab researchers.

πŸ“– Read

via "Dark Reading: ".
❌ Stubborn Malware Targets QNAP NAS Hardware Specifically ❌

QNAP Systems says there is no known way to remove the Qsnatch malware infecting its NAS devices besides a full factory reset.

πŸ“– Read

via "Threatpost".
❌ Global Crime Ring Bilks U.S. Military Members, Vets Out of Millions ❌

An elaborate fraudster ring stole PII then used DoD and VA benefits portals to steal payments and funds from bank accounts.

πŸ“– Read

via "Threatpost".
πŸ” How to copy a file from one server to another from a third with SSH πŸ”

Find out how to work some SSH magic, by transferring a file from one machine to another from a third.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Samhain File Integrity Checker 4.4.0 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.11 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".