🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

📖 Read

via "Threatpost".
🕴 Cybercrime's Most Lucrative Careers 🕴

Crime pays. Really well. Here's a look at just how much a cybercriminal can earn in a month.

📖 Read

via "Dark Reading: ".
7 Tips for Maximizing Your SOC

Use the seven points listed above to create an effective and efficient operational workflow and, importantly, happier analysts who aren't buried at the bottom of a pile of mostly irrelevant data.

📖 Read

via "Threatpost".
🕴 Operational Technology: Why Old Networks Need to Learn New Tricks 🕴

Cybercriminals are maximizing their opportunity by targeting older vulnerabilities in OT environments. It's time to fight back.

📖 Read

via "Dark Reading: ".
🕴 Microsoft Shuts Down 50 Domains Used by North Korean Hacking Group 🕴

'Thallium' nation-state threat group used the domains to target mostly US victims.

📖 Read

via "Dark Reading: ".
🔏 Is It Time To Outsource Your Data Security? 🔏

Access to advanced technology and expertise at a cost-effective price is making managed security services an increasingly attractive prospect for many organizations.

📖 Read

via "Subscriber Blog RSS Feed ".
🔐 Wearable industrial tech is coming to a production line near you 🔐

From VR training to heads-up schematics, industrial wearables may be the wave of the future.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2013-4357

The eglibc package before 2.14 incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2013-4161

gksu-polkit-0.0.3-6.fc18 was reported as fixing the issue in CVE-2012-5617 but the patch was improperly applied and it did not fixed the security issue.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2011-3585

Multiple race conditions in the (1) mount.cifs and (2) umount.cifs programs in Samba 3.6 allow local users to cause a denial of service (mounting outage) via a SIGKILL signal during a time window when the /etc/mtab~ file exists.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2004-2776

go.cgi in GoScript 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) query string or (2) artarchive parameter.

📖 Read

via "National Vulnerability Database".
🛠 SQLMAP - Automatic SQL Injection Tool 1.4 🛠

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
1
🕴 6 Security Team Goals for DevSecOps in 2020 🕴

Huge opportunities await security teams that are finally ready move the needle on security problems that have plagued organizations for years.

📖 Read

via "Dark Reading: ".
🕴 Mechanics of a Crypto Heist: How SIM Swappers Can Steal Cryptocurrency 🕴

The true vulnerability at the heart of SIM-swap attacks on crypto accounts lies in crypto exchanges' and email providers' variable implementation of 2FA.

📖 Read

via "Dark Reading: ".
TikTok Banned By U.S. Army Over China Security Concerns

The U.S. Army this week has banned TikTok from government-owned devices as scrutiny over the platform's relationship with China grows.

📖 Read

via "Threatpost".
🕴 How Cybersecurity's Metrics of Misery Fail to Describe Cybercrime Pain 🕴

Dollars lost and data records exposed are valuable measurements, but the true pain of a cybersecurity incident goes far beyond that. We asked infosec pros how they put words to the pain they feel when their defenses fall apart.

📖 Read

via "Dark Reading: ".
🕴 Landry's Restaurant Chain Discloses Payment Security Incident 🕴

Some payment cards were mistakenly swiped on order-entry systems that lacked the security of its point-of-sale terminals.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2013-4532

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2013-4318 (feature)

File injection vulnerability in Ruby gem Features 0.3.0 allows remote attackers to inject malicious html in the /tmp directory.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2013-3936

Multiple cross-site scripting (XSS) vulnerabilities in Opsview before 4.4.1 and Opsview Core before 20130522 allow remote attackers to inject arbitrary web script or HTML.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2013-3935

Cross-site request forgery (CSRF) vulnerability in Opsview before 4.4.1 and Opsview Core before 20130522 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via unspecified vectors.

📖 Read

via "National Vulnerability Database".