πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2007-2841

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-3947. Reason: This candidate is a reservation duplicate of CVE-2007-3947. Notes: All CVE users should reference CVE-2007-3947 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-0899

There is a possible heap overflow in libclamav/fsg.c before 0.100.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2006-4245

archivemail 0.6.2 uses temporary files insecurely leading to a possible race condition.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2006-4243

linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2006-3100

termpkg 3.3 suffers from buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2006-0062

xlockmore 5.13 allows potential xlock bypass when FVWM switches to the same virtual desktop as a new Gaim window.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2006-0061

xlockmore 5.13 and 5.22 segfaults when using libpam-opensc and returns the underlying xsession. This allows unauthorized users access to the X session.

πŸ“– Read

via "National Vulnerability Database".
⚠ Founders of β€˜worthless cryptocurrency’ ATM Coin fined over $4.25m scam ⚠

Invest in "binary options," they said, neglecting to mention the software set up to rig transactions so that customers lost the gamble.

πŸ“– Read

via "Naked Security".
⚠ Ransomware attacks in Spain leave radio station in β€œhysteria” ⚠

A ransomware attack has ransacked at least two Spanish companies, leaving their employees without computer access.

πŸ“– Read

via "Naked Security".
⚠ Mozilla says ISPs are lying to Congress about encrypted DNS ⚠

Mozilla on Friday posted a letter urging Congress to take the broadband industry's lobbying against encrypted DNS within Firefox and Chrome with a grain of salt.

πŸ“– Read

via "Naked Security".
⚠ Smartphone and speaker voice assistants can be hacked using lasers ⚠

Researchers have discovered that some voice assistants will accept β€œsignal injection” commands sent to them using pulses of laser light.

πŸ“– Read

via "Naked Security".
❌ Presentation Template: Build Your 2020 Security Plan ❌

The 2020 Security Plan PPT template helps security professionals engage their organization's decision-makers and gets their backing for critical security decisions.

πŸ“– Read

via "Threatpost".
❌ Google Analytics Emerges as a Phishing Tool ❌

Web analytics help phishers hone their attacks -- but website defenders can also use these tactics to better detect the scope of attacks and mitigate their effects.

πŸ“– Read

via "Threatpost".
πŸ” IBM develops financial services-ready public cloud πŸ”

A new platform is being unveiled that is aimed at banks and their suppliers. The goal is to help them adhere to strict industry regulatory compliance, security and resiliency requirements.

πŸ“– Read

via "Security on TechRepublic".
❌ Emotet Resurgence Continues With New Tactics, Techniques and Procedures ❌

Since Emotet came out of hibernation last month, researchers are seeing the banking trojan's authors take on a consistent trend of new evasion tactics and social engineering techniques.

πŸ“– Read

via "Threatpost".
πŸ•΄ A Warning From Weird Al πŸ•΄

Should you get an e-mail with the subject 'stinky cheese'...

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ A Warning From Weird Al πŸ•΄

Should you get an e-mail with the subject 'stinky cheese'...

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Uphill Battle of Triaging Alerts πŸ•΄

Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to locate and close an open port in Linux πŸ”

Locating and blocking unwanted open ports in Linux should be a task every network admin knows how to do.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Bluto 2.4.16 πŸ› 

Bluto is a dns reconnaissance, vulnerability checking, and enumeration tool.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".