πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Why Multifactor Authentication Is Now a Hacker Target πŸ•΄

SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2010-4657 (debian_linux, enterprise_linux, php)

PHP5 before 5.4.4 allows passing invalid utf-8 strings via the xmlTextWriterWriteAttribute, which are then misparsed by libxml2. This results in memory leak into the resulting output.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Want to attain and retain customers? Adopt data privacy policies πŸ”

Customers won't buy services or products from companies if they don't trust how their data will be used, Cisco found.

πŸ“– Read

via "Security on TechRepublic".
❌ ThreatList: Admin Rights for Third Parties is the Norm ❌

The majority give outside partners, contractors and suppliers administrative access -- without strong security policies in place.

πŸ“– Read

via "Threatpost".
❌ High-Severity Windows UAC Flaw Enables Privilege Escalation ❌

Further details of the flaw, which has recently been patched by Microsoft, were disclosed Tuesday by researchers.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2011-1028

The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-0529

Weborf before 0.12.5 is affected by a Denial of Service (DOS) due to malformed fields in HTTP.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-4660

Unspecified vulnerability in statusnet through 2010 due to the way addslashes are used in SQL string escapes..

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Black Hat Europe Q&A: Exposing the Weaknesses in Contactless Payments πŸ•΄

Researchers Leigh-Anne Galloway and Tim Yunusov chat about their work testing Visa's contactless payments security system vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Former White House CIO Shares Enduring Security Strategies πŸ•΄

Theresa Payton explains the strategies organizations should consider as they integrate layers of new technology.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Employee Privacy in a Mobile Workplace πŸ•΄

Why businesses need guidelines for managing their employees' personal information -- without compromising on security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-1490 (debian_linux, opensuse, rsyslog)

A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-1489 (debian_linux, opensuse, rsyslog)

A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-4659

Cross-site scripting (XSS) vulnerability in statusnet through 2010 in error message contents.

πŸ“– Read

via "National Vulnerability Database".
❌ Apache Solr Bug Gets Bumped Up to High Severity ❌

Linux users running the enterprise-search platform Solr are potentially vulnerable to remote code execution attack.

πŸ“– Read

via "Threatpost".
πŸ” NSA Reiterates Risks of Transport Layer Security Inspection πŸ”

In an advisory published this week, the NSA outlined the risks of Transport Layer Security Inspection (TLSI) and provided security mitigations for organizations.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Mozilla Bug Bounty Program Doubles Payouts, Adds Firefox Monitor ❌

In scope RCE Mozilla bug bounty payouts have also tripled to reach $15,000.

πŸ“– Read

via "Threatpost".
πŸ•΄ Google Cloud Update Gives Users Greater Data Control πŸ•΄

External Key Manager and Key Access Justification are intended to give organizations greater visibility into requests for data access.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Patch 'Easily Exploitable' Oracle EBS Flaws ASAP: Onapsis πŸ•΄

Organizations that have not yet applied a pair of months-old critical patches from Oracle for E-Business Suite are at risk of attacks on their financial systems, the application security firm says.

πŸ“– Read

via "Dark Reading: ".
❌ Security Firms, Nonprofits Team to Fight Stalkerware ❌

The Coalition Against Stalkerware launched this week, with the aim of offering a centralized location for helping victims of stalkerware, as well as defining what stalkerware is in the first place.

πŸ“– Read

via "Threatpost".
⚠ Tories change Twitter name to β€˜factcheckUK’ during live TV debate ⚠

Twitter wagged its finger at the UK's Conservative party for renaming its press account "factcheckUK" during a live TV debate.

πŸ“– Read

via "Naked Security".