πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ IoT Company Wyze Leaks Emails, Device Data of 2.4M ❌

The Internet of Things vendor confirmed that customer data was left unsecured on an Elasticsearch database.

πŸ“– Read

via "Threatpost".
⚠ Celebrity addresses posted online in New Year’s Honours List leak ⚠

Too much information.

πŸ“– Read

via "Naked Security".
πŸ” How to choose the best MDM partner: 5 key considerations πŸ”

Here's what organizations considering using a mobile device management server should keep in mind.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How AI and Cybersecurity Will Intersect in 2020 πŸ•΄

Understanding the new risks and threats posed by increased use of artificial intelligence.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-5645

A denial of service flaw was found in the way the server component of Freeciv before 2.3.4 processed certain packets. A remote attacker could send a specially-crafted packet that, when processed would lead to memory exhaustion or excessive CPU consumption.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-5476

Within the RHOS Essex Preview (2012.2) of the OpenStack dashboard package, the file /etc/quantum/quantum.conf is world readable which exposes the admin password and token value.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-5474

The file /etc/openstack-dashboard/local_settings within Red Hat OpenStack Platform 2.0 and RHOS Essex Release (python-django-horizon package before 2012.1.1) is world readable and exposes the secret key value.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-2016

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-0264

An import error was introduced in Cumin in the code refactoring in r5310. Server certificate validation is always disabled when connecting to Aviary servers, even if the installed packages on a system support it.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-0196

A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-5663

The isearch package (textproc/isearch) before 1.47.01nb1 uses the tempnam() function to create insecure temporary files into a publicly-writable area (/tmp).

πŸ“– Read

via "National Vulnerability Database".
❌ 2020 Cybersecurity Trends to Watch ❌

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybercrime's Most Lucrative Careers πŸ•΄

Crime pays. Really well. Here's a look at just how much a cybercriminal can earn in a month.

πŸ“– Read

via "Dark Reading: ".
❌ 7 Tips for Maximizing Your SOC ❌

Use the seven points listed above to create an effective and efficient operational workflow and, importantly, happier analysts who aren't buried at the bottom of a pile of mostly irrelevant data.

πŸ“– Read

via "Threatpost".
πŸ•΄ Operational Technology: Why Old Networks Need to Learn New Tricks πŸ•΄

Cybercriminals are maximizing their opportunity by targeting older vulnerabilities in OT environments. It's time to fight back.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Shuts Down 50 Domains Used by North Korean Hacking Group πŸ•΄

'Thallium' nation-state threat group used the domains to target mostly US victims.

πŸ“– Read

via "Dark Reading: ".
πŸ” Is It Time To Outsource Your Data Security? πŸ”

Access to advanced technology and expertise at a cost-effective price is making managed security services an increasingly attractive prospect for many organizations.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Wearable industrial tech is coming to a production line near you πŸ”

From VR training to heads-up schematics, industrial wearables may be the wave of the future.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2013-4357

The eglibc package before 2.14 incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4161

gksu-polkit-0.0.3-6.fc18 was reported as fixing the issue in CVE-2012-5617 but the patch was improperly applied and it did not fixed the security issue.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3585

Multiple race conditions in the (1) mount.cifs and (2) umount.cifs programs in Samba 3.6 allow local users to cause a denial of service (mounting outage) via a SIGKILL signal during a time window when the /etc/mtab~ file exists.

πŸ“– Read

via "National Vulnerability Database".