πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2013-0737

Cross-site scripting (XSS) vulnerability in BoltWire 3.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the fieldnames parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ Python is dead. Long live Python! ⚠

Is Python 2 *really* dead. Or is it just shagged out after a long squawk?

πŸ“– Read

via "Naked Security".
❌ Google Boots Security Camera Maker From Nest Hub After Private Images Go Public ❌

The issue came to light after a Reddit user claimed being able to see strangers on his Xiaomi Mijia smart camera.

πŸ“– Read

via "Threatpost".
πŸ•΄ Organizations May 'Uncloud' Over Security, Budgetary Concerns πŸ•΄

While most cloud vendors forecast continued adoption and growth, some customers are taking a harder look at the cloud services they're using

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Continental Drift: Is Digital Sovereignty Splitting Global Data Centers? πŸ•΄

The recent proposal by Germany, backed by France, to fuse the infrastructures of Europe's cloud providers could challenge every data center storing a European's data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Malware Hits Travelex Currency Exchange Service πŸ•΄

The New Year's Eve malware attack forced Travelex employees to resort to manual operations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Edge Cartoon Caption Contest: Latest Winners, New Toon 'Like a Boss' πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
❌ Travelex Knocked Offline by System-Wide Malware Attack ❌

The foreign-currency-exchange giant said that it has been hit by a virus, affecting retail customers and banking partners alike.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 1/3 Edition πŸ”

Ransomware takes down a USCG Maritime Facility, an email server belonging to the Special Olympics New York is hacked, and more - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ Cryptocurrency exchange Poloniex issues password reset warning ⚠

Yes, there was a breach. But it's an old one that the crooks are trying to use again.

πŸ“– Read

via "Naked Security".
❌ Cybercriminals Fill Up on Gas Pump Transaction Scams Ahead of Oct. Deadline ❌

Gas stations will become liable for card-skimming at their pay-at-the-pump mechanisms starting in October.

πŸ“– Read

via "Threatpost".
❌ 3 Critical Bugs Allow Remote Attacks on Cisco NX-OS and Switches ❌

Cisco patched three authentication bypass bugs tied to its DCNM platform used to manages NX-OS.

πŸ“– Read

via "Threatpost".
❌ Ransomware Attack Topples Telemarketing Firm, Leaving Hundreds Jobless ❌

Days before Christmas, employees found out that The Heritage Company had been hit by a ransomware attack and was "temporarily suspending operations."

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2012-4451

Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified input to (1) Debug, (2) Feed\PubSubHubbub, (3) Log\Formatter\Xml, (4) Tag\Cloud\Decorator, (5) Uri, (6) View\Helper\HeadStyle, (7) View\Helper\Navigation\Sitemap, or (8) View\Helper\Placeholder\Container\AbstractStandalone, related to Escaper.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cisco Drops a Dozen Vulnerability Patches πŸ•΄

Among them are three for critical authentication bypass flaws.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Victim Southwire Sues Maze Operators πŸ•΄

Attackers demanded $6 million from the wire and cable manufacturer when they launched a December ransomware campaign.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-5878

Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allows remote attackers to execute arbitrary commands via shell metacharacters in the hostingPath parameter to (1) SEAttack.pl or (2) CSAttack.pl in frameworkgui/ or the (3) appURLPath parameter to frameworkgui/attachMobileModem.pl.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-5693

Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the ipAddressTB parameter to (1) remoteAttack.pl or (2) guessPassword.pl in frameworkgui/; the filename parameter to (3) CSAttack.pl or (4) SEAttack.pl in frameworkgui/; the phNo2Attack parameter to (5) CSAttack.pl or (6) SEAttack.pl in frameworkgui/; the (7) platformDD2 parameter to frameworkgui/SEAttack.pl; the (8) agentURLPath or (9) agentControlKey parameter to frameworkgui/attach2agents.pl; or the (10) controlKey parameter to frameworkgui/attachMobileModem.pl. NOTE: The hostingPath parameter to CSAttack.pl and SEAttack.pl vectors and the appURLPath parameter to attachMobileModem.pl vector are covered by CVE-2012-5878.

πŸ“– Read

via "National Vulnerability Database".
πŸ” 5 predictions for protecting data in the payments and security ecosystem πŸ”

As demand for personalization and seamless consumer experiences grow, security must keep up, said VISA's chief risk officer.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot stories of the holidays ⚠

From 'Greta Thunberg' malware to Python 3, get yourself up to date with everything we've written since Christmas.

πŸ“– Read

via "Naked Security".
πŸ•΄ What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets? πŸ•΄

Misconfigured cloud buckets leak sensitive data. Here's how to keep your Amazon Web Services (AWS) Simple Server Storage (S3) buckets secured.

πŸ“– Read

via "Dark Reading: ".