πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Update WhatsApp now: MP4 video bug exposes your messages ⚠

A now-patched-hole could have allowed remote code execution that could have exposed files and messages. Update your WhatsApp now.

πŸ“– Read

via "Naked Security".
❌ Hackers Dump 2.2M Gaming, Cryptocurrency Passwords Online ❌

A data breach left personal information--including email and IP addresses and first and last namesβ€”exposed in public databases, according to Troy Hunt.

πŸ“– Read

via "Threatpost".
πŸ” Macy's holiday breach highlights retailer need for encryption and scrutiny of third party systems πŸ”

Attackers were collecting user credit card information for an entire week from the Macy's website before they were alerted. Here's how retailers can protect themselves.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Vulnerability Could Give Criminals Camera Control on Millions of Android Smartphones πŸ•΄

Vulnerability could allow an attacker to control the camera and storage without user knowledge or permission.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Multifactor Authentication Is Now a Hacker Target πŸ•΄

SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2010-4657 (debian_linux, enterprise_linux, php)

PHP5 before 5.4.4 allows passing invalid utf-8 strings via the xmlTextWriterWriteAttribute, which are then misparsed by libxml2. This results in memory leak into the resulting output.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Want to attain and retain customers? Adopt data privacy policies πŸ”

Customers won't buy services or products from companies if they don't trust how their data will be used, Cisco found.

πŸ“– Read

via "Security on TechRepublic".
❌ ThreatList: Admin Rights for Third Parties is the Norm ❌

The majority give outside partners, contractors and suppliers administrative access -- without strong security policies in place.

πŸ“– Read

via "Threatpost".
❌ High-Severity Windows UAC Flaw Enables Privilege Escalation ❌

Further details of the flaw, which has recently been patched by Microsoft, were disclosed Tuesday by researchers.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2011-1028

The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-0529

Weborf before 0.12.5 is affected by a Denial of Service (DOS) due to malformed fields in HTTP.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-4660

Unspecified vulnerability in statusnet through 2010 due to the way addslashes are used in SQL string escapes..

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Black Hat Europe Q&A: Exposing the Weaknesses in Contactless Payments πŸ•΄

Researchers Leigh-Anne Galloway and Tim Yunusov chat about their work testing Visa's contactless payments security system vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Former White House CIO Shares Enduring Security Strategies πŸ•΄

Theresa Payton explains the strategies organizations should consider as they integrate layers of new technology.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Employee Privacy in a Mobile Workplace πŸ•΄

Why businesses need guidelines for managing their employees' personal information -- without compromising on security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-1490 (debian_linux, opensuse, rsyslog)

A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-1489 (debian_linux, opensuse, rsyslog)

A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-4659

Cross-site scripting (XSS) vulnerability in statusnet through 2010 in error message contents.

πŸ“– Read

via "National Vulnerability Database".
❌ Apache Solr Bug Gets Bumped Up to High Severity ❌

Linux users running the enterprise-search platform Solr are potentially vulnerable to remote code execution attack.

πŸ“– Read

via "Threatpost".
πŸ” NSA Reiterates Risks of Transport Layer Security Inspection πŸ”

In an advisory published this week, the NSA outlined the risks of Transport Layer Security Inspection (TLSI) and provided security mitigations for organizations.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Mozilla Bug Bounty Program Doubles Payouts, Adds Firefox Monitor ❌

In scope RCE Mozilla bug bounty payouts have also tripled to reach $15,000.

πŸ“– Read

via "Threatpost".