πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2009-3552

In RHEV-M VDC 2.2.0, it was found that the SSL certificate was not verified when using the client-side Red Hat Enterprise Virtualization Manager interface (a Windows Presentation Foundation (WPF) XAML browser application) to connect to the Red Hat Enterprise Virtualization Manager. An attacker on the local network could use this flaw to conduct a man-in-the-middle attack, tricking the user into thinking they are viewing the Red Hat Enterprise Virtualization Manager when the content is actually attacker-controlled, or modifying actions a user requested Red Hat Enterprise Virtualization Manager to perform.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-2802

MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-0035

alsa-utils 1.0.19 and later versions allows local users to overwrite arbitrary files via a symlink attack via the /usr/bin/alsa-info and /usr/bin/alsa-info.sh scripts.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 23 stories of the week ⚠

From hackable voice assistants to ISPs allegedly lying about encrypted DNS, and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Huge Airbnb scam leads to promise to vet every host, every listing ⚠

Shuffling people into - surprise! - cobwebby rat traps has been a snap. Actual vetting may help, plus a new guarantee of 100% refunds.

πŸ“– Read

via "Naked Security".
⚠ US military supplier in β€˜Made in America’ fraud case ⚠

Aventura allegedly imported cheap cameras and network-enabled security gear from China, then slapped US flag stickers on them.

πŸ“– Read

via "Naked Security".
⚠ AI wordsmith too dangerous to be released… has been released ⚠

The text-generating AI has only been released in neutered forms until now, for fear it would be used to mass-produce fake news and spam.

πŸ“– Read

via "Naked Security".
πŸ•΄ New: 2019 State of the Internet / Security: Media Under Assault πŸ•΄

It can't be overstated: Web attacks and credential stuffing are real, long-term threats. This white paper, sponsored by Akamai, focuses on how they are impacting the high-tech, video media, and entertainment sectors.

πŸ“– Read

via "Dark Reading: ".
⚠ Adobe fixes SDK weakness affecting mobile apps ⚠

Researchers noticed that the main app configuration file, ADBMobileConfig.json, contained settings that could lead to security problems.

πŸ“– Read

via "Naked Security".
❌ Encrypted Emails on macOS Found Stored in Unprotected Way ❌

Apple is investigating an issue raised by a Mac specialist discovered to be storing emails that are supposed to be S/MIME-encrypted as readable files.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Security Processes You Shouldn't Overlook During M&A πŸ•΄

Security needs to be a central element of due diligence if a merger or acquisition is to succeed

πŸ“– Read

via "Dark Reading: ".
πŸ” FBI: Engineer Stole, Emailed Tech Secrets to Iran πŸ”

This engineer purportedly stole sensitive aerospace technology from his employer and emailed it his brother in the Iranian military.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Ransomware Attack Downs Hosting Service SmarterASP.NET ❌

SmarterASP.NET said that it is in the middle of recovering accounts downed by the ransomware attack.

πŸ“– Read

via "Threatpost".
πŸ” How to navigate cybersecurity in a 5G world πŸ”

With 5G comes a larger attack surface and more devices accessing the network. Companies must ramp up security strategies to stay protected, AT&T report finds.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Open source is a heavily interdependent community, which is good and bad for security πŸ”

Commentary: Open source is a tangled web of interdependencies. How can we do better to secure this web?

πŸ“– Read

via "Security on TechRepublic".
⚠ Microsoft urges us to patch after partially effective BlueKeep attack ⚠

Microsoft has urged people to patch their Windows systems following the appearance of mass BlueKeep exploits just over a week ago.

πŸ“– Read

via "Naked Security".
❌ ThreatList: Data Breaches Batter Stock Prices at Public Companies, For Months ❌

When it comes to bouncing back, long-term impact to share prices from a data breach incident is significant on average for large companies.

πŸ“– Read

via "Threatpost".
πŸ•΄ Learn the Latest Exploit Techniques at Black Hat Europe πŸ•΄

Master new exploit techniques for Microsoft RDP, Java remote protocols at Black Hat Europe in London next month.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Joker's Stash Puts $130M Price Tag on Credit Card Database πŸ•΄

A new analysis advises security teams on what they should know about the underground payment card seller.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why we must strike a balance with AI to solve the cybersecurity skills gap πŸ”

How to solve the cybersecurity skills gap by striking a balance with artificial intelligence.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why we must strike a balance with AI to solve the cybersecurity skills gap πŸ”

How to solve the cybersecurity skills gap by striking a balance with artificial intelligence.

πŸ“– Read

via "Security on TechRepublic".