🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2012-3810

Samsung Kies before 2.5.0.12094_27_11 has registry modification.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3809

Samsung Kies before 2.5.0.12094_27_11 has arbitrary directory modification.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3808

Samsung Kies before 2.5.0.12094_27_11 has arbitrary file modification.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3807

Samsung Kies before 2.5.0.12094_27_11 has arbitrary file execution.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3806

Samsung Kies before 2.5.0.12094_27_11 contains a NULL pointer dereference vulnerability which could allow remote attackers to perform a denial of service.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3490

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-2950

Gateway Geomatics MapServer for Windows before 3.0.6 contains a Local File Include Vulnerability which allows remote attackers to execute local PHP code and obtain sensitive information.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-2931

PHP code injection in TinyWebGallery before 1.8.8 allows remote authenticated users with admin privileges to inject arbitrary code into the .htusers.php file.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-2226

Invision Power Board before 3.3.1 fails to sanitize user-supplied input which could allow remote attackers to obtain sensitive information or execute arbitrary code by uploading a malicious file.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-2142

The error function in Error.cc in poppler before 0.21.4 allows remote attackers to execute arbitrary commands via a PDF containing an escape sequence for a terminal emulator.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-1915

EllisLab CodeIgniter 2.1.2 allows remote attackers to bypass the xss_clean() Filter and perform XSS attacks.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2010-3282

389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.

📖 Read

via "National Vulnerability Database".
🕴 Attackers Increase Focus on North American Electric Utilities: Report 🕴

Electric utilities continue to be a target of nation-state attackers, even before the latest tensions between Iran and the United States, says a critical-infrastructure security firm.

📖 Read

via "Dark Reading: ".
Fake-review purge: Facebook boots 188 groups, eBay bans 140 shills

After a poke from the UK's watchdog, the companies promised to beef up filters to strain out those who write, buy and sell fluffy nonsense.

📖 Read

via "Naked Security".
Ransomware pounces on California schools, Las Vegas trounces attack

We'll have one serving of whatever Las Vegas is eating and wish Pittsburg Unified School District good luck with getting unstuck.

📖 Read

via "Naked Security".
Hackers use system weakness to rattle doors on Citrix systems

Attackers are using a serious bug in Citrix products to scan the internet for weaknesses, according to experts.

📖 Read

via "Naked Security".
Oil-and-Gas Specialist APT Pivots to U.S. Power Plants

Researchers say that physically disruptive attacks aren't imminent, but an increased focus on U.S. electrical-grid operators doesn't bode well.

📖 Read

via "Threatpost".
🕴 Study Points to Lax Focus on Cybersecurity 🕴

Despite ranking at the top of respondents' concerns, organizations still show gaps in acting on cybersecurity, Society for Information Management (SIM) report finds.

📖 Read

via "Dark Reading: ".
🔐 How cybercriminals are using Microsoft Sway to launch phishing attacks 🔐

Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted, says security firm Avanan.

📖 Read

via "Security on TechRepublic".
🕴 5 Tips on How to Build a Strong Security Metrics Framework 🕴

The carpentry maxim 'measure twice, cut once' underscores the importance of timely, accurate, and regular metrics to inform security leaders' risk decisions.

📖 Read

via "Dark Reading: ".
🔏 Friday Five: 1/10 Edition 🔏

Possible Iranian retaliation may include cyberattacks, laboratory testing company recieves lawsuit after data breach, and another school district hit with ransomware - catch up on the week's news with the Friday Five.

📖 Read

via "Subscriber Blog RSS Feed ".