πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2007-5743

viewvc 1.0.3 allows improper access control to files in a repository when using the "forbidden" configuration option.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-3915

Mondo 2.24 has insecure handling of temporary files.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-3732

In Linux 2.6 before 2.6.23, the TRACE_IRQS_ON function in iret_exc calls a C function without ensuring that the segments are set properly. The kernel's %fs needs to be restored before the call in TRACE_IRQS_ON and before enabling interrupts, so that "current" references work. Without this, "current" used in the window between iret_exc and the middle of error_code where %fs is reset, would crash.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Twitter & Trend Micro Fall Victim to Malicious Insiders πŸ•΄

The companies are the latest on a long and growing list of organizations that have fallen victim to users with legitimate access to enterprise systems and data.

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft wants to kill the password using FIDO2 security for better authentication πŸ”

Andrew Conway, general manager for Microsoft 365 Security, discusses how to prevent credential theft by relying on biometric security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Handling endpoint security without overwhelming professionals with information overload πŸ”

Chris Bell, director of product management at Secureworks, describes the difficult balance to strike for presenting actionable information to security professionals without exhausting them with information overload.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Barracuda leverages Microsoft Azure to deliver application security to customers πŸ”

Nitzan Miron, VP of application security services at Barracuda Networks, discusses the Azure-delivered WAF-as-a-Service product offering announced at Microsoft Ignite 2019

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2008-7291

gri before 2.12.18 generates temporary files in an insecure way.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-7272

FireGPG before 0.6 handle userΓ―ΒΏΒ½s passphrase and decrypted cleartext insecurely by writing pre-encrypted cleartext and the user's passphrase to disk which may result in the compromise of secure communication or a usersΓ―ΒΏΒ½s private key.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-5083

In JON 2.1.x before 2.1.2 SP1, users can obtain unauthorized security information about private resources managed by JBoss ON.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-3278

frysk packages through 2008-08-05 as shipped in Red Hat Enterprise Linux 5 are built with an insecure RPATH set in the ELF header of multiple binaries in /usr/bin/f* (e.g. fcore, fcatch, fstack, fstep, ...) shipped in the package. A local attacker can exploit this vulnerability by running arbitrary code as another user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-6745

clamav 0.91.2 suffers from a floating point exception when using ScanOLE2.

πŸ“– Read

via "National Vulnerability Database".
⚠ Another Facebook hoax: Robbers still throwing eggs at car windows? ⚠

Bandits? Egg hurling?! Up to 92.5% visibility obscured??!! Don't share this turkey, but do let us know if you decide to test your wipers!

πŸ“– Read

via "Naked Security".
⚠ Leak of 4,000 Facebook documents heaps more trouble on internet giant ⚠

This week’s bold rebrand of Facebook to FACEBOOK can’t hide the growing sense that nobody is happy with the company right now.

πŸ“– Read

via "Naked Security".
⚠ IT services pro hacked former client’s email ⚠

An IT project manager has pleaded guilty to accessing the email account of a former client's CEO, said reports this week.

πŸ“– Read

via "Naked Security".
❌ Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials ❌

Attackers could access Wi-Fi credentials due to a problem in initial configuration of the smart doorbell device.

πŸ“– Read

via "Threatpost".
❌ News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails ❌

From voice assistant hacks to insider threats, Threatpost editors break down this week's biggest news.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Small-Business Password Managers πŸ•΄

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 9 Principles to Simplify Security πŸ•΄

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ring Flaw Underscores Impact of IoT Vulnerabilities πŸ•΄

A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

πŸ“– Read

via "Dark Reading: ".
❌ Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers ❌

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories.

πŸ“– Read

via "Threatpost".