πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Leveraging the Cloud for Cyber Intelligence πŸ•΄

How fusing output datasets and sharing information can create a real-time understanding of suspicious activity across your enterprise.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-2228

SaltStack RSA Key Generation allows remote users to decrypt communications

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-2106

webauth before 4.6.1 has authentication credential disclosure

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-2103

OpenShift cartridge allows remote URL retrieval

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-2101

Katello has multiple XSS issues in various entities

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-4525

piwigo has XSS in password.php

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-4480

mom creates world-writable pid files in /var/run

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-4428

openslp: SLPIntersectStringList()' Function has a DoS vulnerability

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Siemens Offers Workarounds for Newly Found PLC Vulnerability πŸ•΄

An undocumented hardware-based special access feature recently found by researchers in Siemens' S7-1200 can be used by attackers to gain control of the industrial devices.

πŸ“– Read

via "Dark Reading: ".
❌ Critical Android Flaw Leads to β€˜Permanent DoS’ ❌

The December security update stomped out critical denial-of-service (DoS) and remote-code-execution (RCE) vulnerabilities in the Android operating system.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2013-4486

Zanata 3.0.0 through 3.1.2 has RCE due to EL interpolation in logging

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4411

Review Board: URL processing gives unauthorized users access to review lists

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4235

shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Smith & Wesson Is Magecart's Latest Target πŸ•΄

Researchers estimate the gun manufacturer's website was compromised sometime before Black Friday.

πŸ“– Read

via "Dark Reading: ".
❌ Android Ups the Mobile Security Ante with Default TLS Encryption ❌

More than 90 percent of Android apps running on the latest OS encrypt their traffic by default.

πŸ“– Read

via "Threatpost".
πŸ” Report highlights nation-state cyberthreats facing SMBs in 2020 πŸ”

An increasing number of US executives expressed concern about the prevalence of threats coming from foreign powers.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ What Security Leaders Can Learn from Marketing πŸ•΄

Employees can no longer be pawns who must be protected all the time. They must become partners in the battle against threats.

πŸ“– Read

via "Dark Reading: ".
πŸ” European Data Protection Board Data Urges Protection by Design and by Default πŸ”

A new set of guidelines from the European Data Protection Board helps inform data controllers of the safeguards that should be followed when designing data processing activities.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ When Rogue Insiders Go to the Dark Web πŸ•΄

Employees gone bad sell stolen company information, sometimes openly touting their companies, researchers say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ TrickBot Expands in Japan Ahead of the Holidays πŸ•΄

Data indicates TrickBot operators are modifying its modules and launching widespread campaigns around the world.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: A Third of Biometric Systems Targeted by Malware in Q3 ❌

A successful attack could wreak havoc, given the potential for biometric forgery, and a lack of options in the event one’s biometric profile is stolen.

πŸ“– Read

via "Threatpost".