πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2011-2669

Mozilla Firefox prior to 3.6 has a DoS vulnerability due to an issue in the validation of certificates.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-2668

Mozilla Firefox through 1.5.0.3 has a vulnerability in processing the content-length header

πŸ“– Read

via "National Vulnerability Database".
πŸ” Why corporate boards are unprepared to handle cybersecurity risks πŸ”

A new report recommends that corporate boards answer four key questions on a regular basis to guide cybersecurity governance.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Avoid That Billion-Dollar Fine: Blurring the Lines Between Security and Privacy πŸ•΄

While doing good for the user is the theoretical ideal, the threat of fiscal repercussions should drive organizations to take privacy seriously. That means security and data privacy teams must work more closely.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2005-4891 (simple_machine_forum)

Simple Machine Forum (SMF) versions 1.0.4 and earlier have an SQL injection vulnerability that allows remote attackers to inject arbitrary SQL statements.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Post-GDPR, 160,000 Data Breaches and Counting πŸ”

A new report that aggregates post-GDPR data breach statistics in Europe suggests new, higher fines are to come in 2020.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ›  WebSploit Framework 4.0.1 πŸ› 

WebSploit is an advanced man-in-the-middle framework.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SolarWindows MSP n-Central Information Disclosure πŸ› 

This application, known as the SolarWinds n-Central Dumpster Diver, utilizes the nCentral agent dot net libraries to simulate the agent registration and pull the agent/appliance configuration settings. This information can contain plain text active directory domain credentials. This was reported to SolarWinds PSIRT(psirt@solarwinds.com) on 10/10/2019. In most cases the agent download URL is not secured allowing anyone without authorization and known customer id to download the agent software. Once you have a customer id you can self register and pull the config. Application will test availability of customer id via agent download URL. If successful it will then pull the config. We do not attempt to just pull the config because timing out on the operation takes to long. Removing the initial check, could produce more results as the agent download could be being blocked where as agent communication would not be. Harmony is only used to block the nCentral libraries from saving and creating a config directory that is not needed.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Zed Attack Proxy 2.9.0 Cross Platform Package πŸ› 

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ China-Based Cyber Espionage Group Reportedly Behind Breach at Mitsubishi Electric πŸ•΄

Personal data on over 8,100 individuals and confidential business information likely exposed in June 2019 incident.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FireEye Buys Cloudvisory πŸ•΄

The purchase is intended to bring new cloud capabilities to the FireEye Helix security platform.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Ransomware Tactic Shows How Windows EFS Can Aid Attackers πŸ•΄

Researchers have discovered how ransomware can take advantage of the Windows Encrypting File System, prompting security vendors to release patches.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft, DHS Warn of Zero-Day Attack Targeting IE Users πŸ•΄

Software firm is "aware of limited targeted attacks" exploiting a scripting issue vulnerability in Internet Explorer 9, 10, and 11 that previously has not been disclosed.

πŸ“– Read

via "Dark Reading: ".
❌ 16Shop Phishing Gang Goes After PayPal Users ❌

A sophisticated malware-as-a-service phishing kit includes full customer service and anti-detection technologies.

πŸ“– Read

via "Threatpost".
πŸ” Bug bounties won't make you rich (but you should participate anyway) πŸ”

Commentary: There's a lot of hype about bug bounties, but here's some truth.

πŸ“– Read

via "Security on TechRepublic".
⚠ Nobody boogies quite like you ⚠

Our unique dancing style can be used by a machine-learning model to ID us, regardless of musical genre. Unless it's Metal. We all headbang.

πŸ“– Read

via "Naked Security".
⚠ Regus spills data of 900 staff on Trello board set to β€˜public’ ⚠

Another company has ended up accidentally spilling sensitive data from business collaboration tool Trello.

πŸ“– Read

via "Naked Security".
⚠ NIST’s new privacy rules – what you need to know ⚠

How do you ensure you're compliant with privacy regulations? NIST has released a Privacy Framework to help you get your house in order.

πŸ“– Read

via "Naked Security".
⚠ Ubisoft sues DDoS-for-hire operators for ruining game play ⚠

The network of sites and services run by the alleged operators target the Rainbow Six Siege game, selling attacks to cheating players.

πŸ“– Read

via "Naked Security".
❌ PoC Exploits Do More Good Than Harm: Threatpost Poll ❌

More than half of security experts think that the good outweighs the bad when it comes to proof-of-concept exploits, according to a recent Threatpost poll.

πŸ“– Read

via "Threatpost".
❌ New Muhstik Botnet Attacks Target Tomato Routers ❌

Palo Alto Networks’ Unit 42 researchers observed a variant of the wormlike botnet that adds scanner technology to brute-force Web authentication.

πŸ“– Read

via "Threatpost".