πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2011-1489 (debian_linux, opensuse, rsyslog)

A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-4659

Cross-site scripting (XSS) vulnerability in statusnet through 2010 in error message contents.

πŸ“– Read

via "National Vulnerability Database".
❌ Apache Solr Bug Gets Bumped Up to High Severity ❌

Linux users running the enterprise-search platform Solr are potentially vulnerable to remote code execution attack.

πŸ“– Read

via "Threatpost".
πŸ” NSA Reiterates Risks of Transport Layer Security Inspection πŸ”

In an advisory published this week, the NSA outlined the risks of Transport Layer Security Inspection (TLSI) and provided security mitigations for organizations.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Mozilla Bug Bounty Program Doubles Payouts, Adds Firefox Monitor ❌

In scope RCE Mozilla bug bounty payouts have also tripled to reach $15,000.

πŸ“– Read

via "Threatpost".
πŸ•΄ Google Cloud Update Gives Users Greater Data Control πŸ•΄

External Key Manager and Key Access Justification are intended to give organizations greater visibility into requests for data access.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Patch 'Easily Exploitable' Oracle EBS Flaws ASAP: Onapsis πŸ•΄

Organizations that have not yet applied a pair of months-old critical patches from Oracle for E-Business Suite are at risk of attacks on their financial systems, the application security firm says.

πŸ“– Read

via "Dark Reading: ".
❌ Security Firms, Nonprofits Team to Fight Stalkerware ❌

The Coalition Against Stalkerware launched this week, with the aim of offering a centralized location for helping victims of stalkerware, as well as defining what stalkerware is in the first place.

πŸ“– Read

via "Threatpost".
⚠ Tories change Twitter name to β€˜factcheckUK’ during live TV debate ⚠

Twitter wagged its finger at the UK's Conservative party for renaming its press account "factcheckUK" during a live TV debate.

πŸ“– Read

via "Naked Security".
πŸ•΄ What's in a WAF? πŸ•΄

Need a 101 lesson on Web application firewalls? Here's your crib sheet on what a WAF is, how it works, and what to look for when you're in the market for a new solution.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ As Retailers Prepare for the Holiday Season, So Do Cybercriminals πŸ•΄

Online shoppers need to be wary about domain spoofing, fraudulent giveaways, and other scams, ZeroFOX study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Clam AntiVirus Toolkit 0.102.1 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Popular Apps on Google Play Store Remain Unpatched ❌

Check Point researchers found that hundreds of marquee Android mobile apps still contain vulnerabilities that allow remote code executive even if users update.

πŸ“– Read

via "Threatpost".
⚠ Official Monero site delivers malicious cash-grabbing wallet ⚠

If you downloaded the Monero command line wallet recently, check it before using it.

πŸ“– Read

via "Naked Security".
πŸ•΄ Anatomy of a BEC Scam πŸ•΄

A look at the characteristics of real-world business email compromise attacks - and what makes them tick.

πŸ“– Read

via "Dark Reading: ".
❌ Download: 2019 Security Team Assessment Template ❌

The Ultimate 2019 Security Team Assessment Template is a unique tool that encapsulates all the major KPIs of the organizational security team’s main pillars.

πŸ“– Read

via "Threatpost".
⚠ Android camera bug could have turned phones against their users ⚠

Google has patched a bug in the Android camera app that allowed other applications to bypass the strict controls on camera and audio access.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 'Department of No': Why CISOs Need to Cultivate a Middle Way πŸ•΄

A chief information security officer's job inherently involves conflict, but a go-along-to-get-along approach carries its own vulnerabilities and risks.

πŸ“– Read

via "Dark Reading: ".
⚠ DNS-over-HTTPS is coming to Windows 10 ⚠

Microsoft will soon add the ability to use DNS-over-HTTPS and DNS-over-TLS into its networking client.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Top Nontechnical Degrees for Cybersecurity πŸ•΄

A computer science degree isn't the only path into a cybersecurity career.

πŸ“– Read

via "Dark Reading: ".