πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2008-7272

FireGPG before 0.6 handle userΓ―ΒΏΒ½s passphrase and decrypted cleartext insecurely by writing pre-encrypted cleartext and the user's passphrase to disk which may result in the compromise of secure communication or a usersΓ―ΒΏΒ½s private key.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-5083

In JON 2.1.x before 2.1.2 SP1, users can obtain unauthorized security information about private resources managed by JBoss ON.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-3278

frysk packages through 2008-08-05 as shipped in Red Hat Enterprise Linux 5 are built with an insecure RPATH set in the ELF header of multiple binaries in /usr/bin/f* (e.g. fcore, fcatch, fstack, fstep, ...) shipped in the package. A local attacker can exploit this vulnerability by running arbitrary code as another user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-6745

clamav 0.91.2 suffers from a floating point exception when using ScanOLE2.

πŸ“– Read

via "National Vulnerability Database".
⚠ Another Facebook hoax: Robbers still throwing eggs at car windows? ⚠

Bandits? Egg hurling?! Up to 92.5% visibility obscured??!! Don't share this turkey, but do let us know if you decide to test your wipers!

πŸ“– Read

via "Naked Security".
⚠ Leak of 4,000 Facebook documents heaps more trouble on internet giant ⚠

This week’s bold rebrand of Facebook to FACEBOOK can’t hide the growing sense that nobody is happy with the company right now.

πŸ“– Read

via "Naked Security".
⚠ IT services pro hacked former client’s email ⚠

An IT project manager has pleaded guilty to accessing the email account of a former client's CEO, said reports this week.

πŸ“– Read

via "Naked Security".
❌ Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials ❌

Attackers could access Wi-Fi credentials due to a problem in initial configuration of the smart doorbell device.

πŸ“– Read

via "Threatpost".
❌ News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails ❌

From voice assistant hacks to insider threats, Threatpost editors break down this week's biggest news.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Small-Business Password Managers πŸ•΄

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 9 Principles to Simplify Security πŸ•΄

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ring Flaw Underscores Impact of IoT Vulnerabilities πŸ•΄

A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

πŸ“– Read

via "Dark Reading: ".
❌ Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers ❌

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories.

πŸ“– Read

via "Threatpost".
πŸ•΄ Hospital Cyberattacks Linked to Increase in Heart Attack Mortality πŸ•΄

Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.

πŸ“– Read

via "Dark Reading: ".
❌ Art Imitates Life: Lessons from the Final Season of Mr. Robot ❌

Unlike Elliot, real-world adversaries don’t have lofty ideals nor do they suffer crises of conscience.

πŸ“– Read

via "Threatpost".
πŸ•΄ Bugcrowd Pays Out Over $500K in Bounties in One Week πŸ•΄

In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 4 Ways to Soothe a Stressed-Out Incident Response Team πŸ•΄

IR teams are under tremendous pressure, often working long hours and putting their needs aside amid a security crisis. Their care is just as important as policy and procedure.

πŸ“– Read

via "Dark Reading: ".
❌ Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone ❌

Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies.

πŸ“– Read

via "Threatpost".
πŸ” VMware rolls out new Carbon Black security suite and Dell partnership πŸ”

The company announced at VMworld 2019 Europe in Barcelona how it will integrate Carbon Black into its suite of tools.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to obscure open ports with knockd πŸ”

Learn how to obfuscate SSH login with port knocking.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to obscure open ports with knockd πŸ”

Learn how to obfuscate SSH login with port knocking.

πŸ“– Read

via "Security on TechRepublic".