πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2011-3624

Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3617

Tahoe-LAFS v1.3.0 through v1.8.2 could allow unauthorized users to delete immutable files in some cases.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3609

A CSRF issue was found in JBoss Application Server 7 before 7.1.0. JBoss did not properly restrict access to the management console information (for example via the "Access-Control-Allow-Origin" HTTP access control flag). This can lead to unauthorized information leak if a user with admin privileges visits a specially-crafted web page provided by a remote attacker.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3606

A DOM based cross-site scripting flaw was found in the JBoss Application Server 7 before 7.1.0 Beta 1 administration console. A remote attacker could provide a specially-crafted web page and trick the valid JBoss AS user, with the administrator privilege, to visit it, which would lead into the DOM environment modification and arbitrary HTML or web script execution.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3600

The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.

πŸ“– Read

via "National Vulnerability Database".
⚠ Sir Tim Berners-Lee publishes plan to save the web from β€˜digital dystopia’ ⚠

Web inventor Sir Tim Berners-Lee has proposed a 'Contract for the Web' to rescue it from a headlong plunge into a moral abyss.

πŸ“– Read

via "Naked Security".
❌ Black Friday Shoppers Targeted By Scams and Fake Domains ❌

Cybercriminals are tapping in on Black Friday and Cyber Monday shoppers with an array of scams and malware - including domain impersonation, social media giveaway scams, and a malicious Chrome extension.

πŸ“– Read

via "Threatpost".
⚠ National Veterinary Associates catches dose of ransomware ⚠

Ransomware attacks don't discriminate - and are just as happy targeting those with four legs as those with two.

πŸ“– Read

via "Naked Security".
⚠ Court says suspect can’t be forced to reveal 64-character password ⚠

We have to protect the constitutional rights of the innocent, and that can mean shielding guilty-as-hell child abusers, the court said.

πŸ“– Read

via "Naked Security".
⚠ Parents say creep hacked their baby monitor to tell toddler they β€˜love’ her ⚠

The Taococo FREDI baby monitor has repeatedly been criticized for being easy to hack.

πŸ“– Read

via "Naked Security".
⚠ Naked Security needs an intern! Here’s how to apply ⚠

Naked Security is looking for a content marketing intern to join the team for 12 months in 2020.

πŸ“– Read

via "Naked Security".
πŸ” How scammers use Black Friday to target consumers πŸ”

Holiday shopping scams try to bait consumers with special giveaways, giftcards, discounts, and coupons, according to a new report from cyber security company ZeroFOX.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 5 Ways to Champion and Increase Your 2020 Security Budget πŸ•΄

Give your organization's leadership an impactful, out-of-office experience so they know what's at stake with their budgeting decisions.

πŸ“– Read

via "Dark Reading: ".
❌ Managing the Human Security Factor in the Age of Ransomware ❌

Convincing employees to take security seriously takes more than awareness campaigns.

πŸ“– Read

via "Threatpost".
πŸ” How Cyber insurance works to protect companies in case of a breach πŸ”

Cyber insurance can help protect your organization from the financial costs associated with data breaches. Learn the details to decide if it's the right fit for your company.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Per Survey, GDPR Compliance Still Lagging πŸ”

According to a recent GDPR survey, only 18 percent of respondents said they were highly confident of their organizations' ability to report a data breach within 72 hours.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ NYPD Pulls Fingerprint Database Offline Due to Ransomware Scare πŸ•΄

An infected minicomputer distributed an unidentified threat to 23 machines connected to the LiveScan fingerprint tracking system.

πŸ“– Read

via "Dark Reading: ".
πŸ›  GNU Privacy Guard 2.2.18 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” The top cybersecurity mistakes companies are making (and how to avoid them) πŸ”

There's not a one-size-fits-all approach to cybersecurity. Learn some of the common mistakes and how you can get on the right path.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DDoS: An Underestimated Threat πŸ•΄

Distributed denial-of-service (DDoS) attacks have become more common, more powerful, and more useful to attackers. Here's how to fight back.

πŸ“– Read

via "Dark Reading: ".