πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 6 Small-Business Password Managers πŸ•΄

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 9 Principles to Simplify Security πŸ•΄

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ring Flaw Underscores Impact of IoT Vulnerabilities πŸ•΄

A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

πŸ“– Read

via "Dark Reading: ".
❌ Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers ❌

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories.

πŸ“– Read

via "Threatpost".
πŸ•΄ Hospital Cyberattacks Linked to Increase in Heart Attack Mortality πŸ•΄

Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.

πŸ“– Read

via "Dark Reading: ".
❌ Art Imitates Life: Lessons from the Final Season of Mr. Robot ❌

Unlike Elliot, real-world adversaries don’t have lofty ideals nor do they suffer crises of conscience.

πŸ“– Read

via "Threatpost".
πŸ•΄ Bugcrowd Pays Out Over $500K in Bounties in One Week πŸ•΄

In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 4 Ways to Soothe a Stressed-Out Incident Response Team πŸ•΄

IR teams are under tremendous pressure, often working long hours and putting their needs aside amid a security crisis. Their care is just as important as policy and procedure.

πŸ“– Read

via "Dark Reading: ".
❌ Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone ❌

Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies.

πŸ“– Read

via "Threatpost".
πŸ” VMware rolls out new Carbon Black security suite and Dell partnership πŸ”

The company announced at VMworld 2019 Europe in Barcelona how it will integrate Carbon Black into its suite of tools.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to obscure open ports with knockd πŸ”

Learn how to obfuscate SSH login with port knocking.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to obscure open ports with knockd πŸ”

Learn how to obfuscate SSH login with port knocking.

πŸ“– Read

via "Security on TechRepublic".
❌ Platinum APT Shines Up New Titanium Backdoor ❌

The trojan was observed as the final payload in a sophisticated and complex malware installation code set.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2009-5004

qpid-cpp 1.0 crashes when a large message is sent and the Digest-MD5 mechanism with a security layer is in use .

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-4011

dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS console.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-3614

liboping 1.3.2 allows users reading arbitrary files upon the local system.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-3552

In RHEV-M VDC 2.2.0, it was found that the SSL certificate was not verified when using the client-side Red Hat Enterprise Virtualization Manager interface (a Windows Presentation Foundation (WPF) XAML browser application) to connect to the Red Hat Enterprise Virtualization Manager. An attacker on the local network could use this flaw to conduct a man-in-the-middle attack, tricking the user into thinking they are viewing the Red Hat Enterprise Virtualization Manager when the content is actually attacker-controlled, or modifying actions a user requested Red Hat Enterprise Virtualization Manager to perform.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-2802

MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-0035

alsa-utils 1.0.19 and later versions allows local users to overwrite arbitrary files via a symlink attack via the /usr/bin/alsa-info and /usr/bin/alsa-info.sh scripts.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 23 stories of the week ⚠

From hackable voice assistants to ISPs allegedly lying about encrypted DNS, and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Huge Airbnb scam leads to promise to vet every host, every listing ⚠

Shuffling people into - surprise! - cobwebby rat traps has been a snap. Actual vetting may help, plus a new guarantee of 100% refunds.

πŸ“– Read

via "Naked Security".