πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Top 10 Breaches and Leaky Server Screw Ups of 2019 ❌

2019 was a banner year for data exposures, with billions of people affected by cloud misconfigurations, hacks and poor security practices in general. Here's the Threatpost Top 10 for data-breach news of the year, featuring all the low-lights.

πŸ“– Read

via "Threatpost".
❌ Combining AI and Playbooks to Predict Cyberattacks ❌

Mature machine learning can analyze attack strategies and look for underlying patterns that the AI system can use to predict an attacker's next move.

πŸ“– Read

via "Threatpost".
⚠ Apple iCloud β€œdata dump” extortionist avoids prison ⚠

He claimed to have logins for millions of iCloud accounts, and told Apple he'd shut them all down unless he received a payoff.

πŸ“– Read

via "Naked Security".
πŸ•΄ 'Honoring' CCPA's Binding Principles Nationally Won't Be Easy πŸ•΄

Even companies with the reach, capital, and innovative capacity of Microsoft or Google will struggle to adhere to the tenets of California's new consumer privacy law.

πŸ“– Read

via "Dark Reading: ".
❌ Critical Citrix Bug Puts 80,000 Corporate LANs at Risk ❌

The flaw resides in the Citrix Application Delivery Controller and Gateway.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-20492

An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control (issue 2 of 6).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2736

In NetworkManager 0.9.2.0, when a new wireless network was created with WPA/WPA2 security in AdHoc mode, it created an open/insecure network.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-1474

A locally locally exploitable DOS vulnerability was found in pax-linux versions 2.6.32.33-test79.patch, 2.6.38-test3.patch, and 2.6.37.4-test14.patch. A bad bounds check in arch_get_unmapped_area_topdown triggered by programs doing an mmap after a MAP_GROWSDOWN mmap will create an infinite loop condition without releasing the VM semaphore eventually leading to a system crash.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5290

ircd-ratbox 3.0.9 mishandles the MONITOR command which allows remote attackers to cause a denial of service (system out-of-memory event).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4318

File injection vulnerability in Ruby gem Features 0.3.0 allows remote attackers to inject malicious html in the /tmp directory.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-2011

WordPress W3 Super Cache Plugin before 1.3.2 contains a PHP code-execution vulnerability which could allow remote attackers to inject arbitrary code. This issue exists because of an incomplete fix for CVE-2013-2009.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-4420

An information disclosure flaw was found in the way the Java Virtual Machine (JVM) implementation of Java SE 7 as provided by OpenJDK 7 incorrectly initialized integer arrays after memory allocation (in certain circumstances they had nonzero elements right after the allocation). A remote attacker could use this flaw to obtain potentially sensitive information.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-3462

A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-3088

Belkin N900 router (F9K1104v1) contains an Authentication Bypass using "Javascript debugging".

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-3085

An authentication bypass exists in the web management interface in Belkin F5D8236-4 v2.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Should My Security Department Begin Future-Proofing for Quantum Computing? πŸ•΄

Knowing where your digital certificates are is just the start.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Two-Thirds of Security Pros Ready to or Already Volunteer Their Services πŸ•΄

Majority of survey respondents seek to share their security expertise with causes they care about.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Gauging the Cybersecurity Climate πŸ•΄

Is climate change impacting your cybersecurity, cyber-risk, or cyber-incident response plans?

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect specific folders and files in Windows πŸ”

Learn how to hide or encrypt specific files in Windows in order to better protect them.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Security teams have a challenging and ever-changing role. Here's how a SOC can keep up πŸ”

Security teams should coordinate and operate by standard practices to ensure their efforts yield the maximum results. Learn some tips from an industry insider on how to make it happen.

πŸ“– Read

via "Security on TechRepublic".