πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2007-0158

thttpd 2007 has buffer underflow.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-4980

Multiple stack-based buffer overflows in CFProfile.exe in Toshiba ConfigFree Utility 8.0.38 allow user-assisted attackers to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
⚠ 7 types of virus – a short glossary of contemporary cyberbadness ⚠

Here's a short list of 7 malware categories we hope you never encounter. Sadly, it's not an exhaustive list... but it's a helpful start.

πŸ“– Read

via "Naked Security".
πŸ” How to change the HTTP listening port in Apache πŸ”

If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 6 CISO New Year's Resolutions for 2020 πŸ•΄

We asked chief information security officers how they plan to get their infosec departments in shape next year.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – the hot 12 stories of the week ⚠

From smartphone tracking to "climate change" malware, get up to date with everything we've written in the last week.

πŸ“– Read

via "Naked Security".
πŸ” How to change the HTTP listening port in Apache πŸ”

If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.

πŸ“– Read

via "Security on TechRepublic".
❌ Top Mobile Security Stories of 2019 ❌

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost's Top 10 mobile security stories of 2019.

πŸ“– Read

via "Threatpost".
❌ Mean Time to Hardening: The Next-Gen Security Metric ❌

Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours to harden your systems before you will see new exploits.

πŸ“– Read

via "Threatpost".
πŸ•΄ Fraud in the New Decade πŸ•΄

Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growth

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How Can My Security Team Begin Future-Proofing for Quantum Computing? πŸ•΄

Knowing where your digital certificates are is just the start.

πŸ“– Read

via "Dark Reading: ".
❌ IoT Company Wyze Leaks Emails, Device Data of 2.4M ❌

The Internet of Things vendor confirmed that customer data was left unsecured on an Elasticsearch database.

πŸ“– Read

via "Threatpost".
⚠ Celebrity addresses posted online in New Year’s Honours List leak ⚠

Too much information.

πŸ“– Read

via "Naked Security".
πŸ” How to choose the best MDM partner: 5 key considerations πŸ”

Here's what organizations considering using a mobile device management server should keep in mind.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How AI and Cybersecurity Will Intersect in 2020 πŸ•΄

Understanding the new risks and threats posed by increased use of artificial intelligence.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-5645

A denial of service flaw was found in the way the server component of Freeciv before 2.3.4 processed certain packets. A remote attacker could send a specially-crafted packet that, when processed would lead to memory exhaustion or excessive CPU consumption.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-5476

Within the RHOS Essex Preview (2012.2) of the OpenStack dashboard package, the file /etc/quantum/quantum.conf is world readable which exposes the admin password and token value.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-5474

The file /etc/openstack-dashboard/local_settings within Red Hat OpenStack Platform 2.0 and RHOS Essex Release (python-django-horizon package before 2012.1.1) is world readable and exposes the secret key value.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-2016

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-0264

An import error was introduced in Cumin in the code refactoring in r5310. Server certificate validation is always disabled when connecting to Aviary servers, even if the installed packages on a system support it.

πŸ“– Read

via "National Vulnerability Database".