πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2011-4907

Joomla! 1.5x through 1.5.12: Missing JEXEC Check

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4336

Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php.

πŸ“– Read

via "National Vulnerability Database".
❌ Trump Slams Apple for Refusing to Unlock Suspected Shooter’s iPhones ❌

Legal battle pitting Feds against the tech giant over data privacy and device security in criminal cases seems inevitable.

πŸ“– Read

via "Threatpost".
πŸ” How to disconnect devices and revoke app privileges from your Firefox cloud account πŸ”

You'll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why Google plans to cut off support for third-party cookies in Chrome πŸ”

Google is aiming to phase out third-party cookies in Chrome in two years, but that will have to prove palatable to users, publishers, and advertisers.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ ISACs Join Forces to Secure the Travel Industry πŸ•΄

Together, the Travel & Hospitality ISAC and the Retail & Hospitality ISAC intend to improve communications and collaboration about the evolving threat landscape.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How to Comprehend the Buzz About Honeypots πŸ•΄

Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe and useful for your organization.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Report Spotlights Changes in Phishing Techniques πŸ•΄

Common and evolving strategies include the use of zero-font attacks, homograph attacks, and new tactics for fake attachments.

πŸ“– Read

via "Dark Reading: ".
❌ Equifax Settles Class-Action Breach Lawsuit for $380.5M ❌

Class members have until Jan. 22, next week, to claim benefits.

πŸ“– Read

via "Threatpost".
πŸ•΄ Why Firewalls Aren't Going Anywhere πŸ•΄

Written off multiple times as obsolete, firewalls continue to elude demise by adding features and ensuring that VPNs keep humming.

πŸ“– Read

via "Dark Reading: ".
❌ U.N. Weathers Storm of Emotet-TrickBot Malware ❌

A concerted, targeted phishing campaign took aim at 600 different staffers and officials, using Norway as a lure.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2011-5250 (snare)

Snare for Linux before 1.7.0 has CSRF in the web interface.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-1120

EMC RepliStor Server Service before ESA-09-003 has a DoASOCommand Remote Code Execution Vulnerability. The flaw exists within the DoRcvRpcCall RPC function -exposed via the rep_srv.exe process- where the vulnerability is caused by an error when the rep_srv.exe handles a specially crafted packet sent by an unauthenticated attacker.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-4774

The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-4773

Systrace before 1.6.0 has insufficient escape policy enforcement.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2005-4891

Simple Machine Forum (SMF) versions 1.0.4 and earlier have an SQL injection vulnerability that allows remote attackers to inject arbitrary SQL statements.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Ex-Pharma Employees Arrested Following Data Theft in India πŸ”

The employees allegedly stole confidential information belonging to the company, including batch production control records for drug manufacturing, according to reports.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to better protect your organization's most valuable data πŸ”

Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire.

πŸ“– Read

via "Security on TechRepublic".
❌ Podcast: NSA Reports Major Crypto-Spoofing Bug to Microsoft ❌

Threatpost talks to Venafi about the recently-disclosed Microsoft vulnerability and whether the hype around the flaw was warranted.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2011-5266 (securesphere_web_application_firewall)

Imperva SecureSphere Web Application Firewall (WAF) before 12-august-2010 allows SQL injection filter bypass.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Lets iPhone Users Turn Device into Security Key πŸ•΄

The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.

πŸ“– Read

via "Dark Reading: ".