πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How voter registration databases are vulnerable to nefarious actors πŸ”

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, discusses the risks of data being changed or removed in voter registration databases and how voters can counter these actions.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How voter registration databases are vulnerable to nefarious actors πŸ”

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, discusses the risks of data being changed or removed in voter registration databases and how voters can counter these actions.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How database hacks could impact elections and voters' fears πŸ”

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, explains SQL injection attacks and discusses how voter registration database hacks can lead to doubt in the election process.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How database hacks could impact elections and voters' fears πŸ”

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, explains SQL injection attacks and discusses how voter registration database hacks can lead to doubt in the election process.

πŸ“– Read

via "Security on TechRepublic".
πŸ” What we need to worry about with election hacking πŸ”

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, says that voters need to put election hacking vulnerability risks into perspective.

πŸ“– Read

via "Security on TechRepublic".
πŸ” What we need to worry about with election hacking πŸ”

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, says that voters need to put election hacking vulnerability risks into perspective.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to secure the US electoral system πŸ”

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, details some of the steps that can be taken to shore up the American electoral system.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to secure the US electoral system πŸ”

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, details some of the steps that can be taken to shore up the American electoral system.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Kraken Resurfaces From the Deep Web πŸ•΄

Fallout Exploit Kit releases Kraken Cryptor ransomware, giving the simple threat a much larger target pool.

πŸ“– Read

via "Dark Reading: ".
❌ Square, PayPal POS Hardware Open to Multiple Attack Vectors ❌

Popular card readers like Square and PayPal have various flaws that allow attacks ranging from fraud to card data theft.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Destructive Cyberattacks Spiked in Q3 πŸ•΄

Instead of simply fleeing when discovered, adversaries are actively engaging with incident response teams, a new Carbon Black study finds.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-7266

The Interactive Advertising Bureau (IAB) OpenRTB 2.3 protocol implementation might allow remote attackers to conceal the status of ad transactions and potentially compromise bid integrity by leveraging failure to limit the time between bid responses and impression notifications, aka the Amnesia Bug.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5159

python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to make your apps passwordless with Microsoft Authenticator and FIDO2 πŸ”

Stop making users change passwords and start getting rid of passwords entirely.

πŸ“– Read

via "Security on TechRepublic".
⚠ Mirai author fined $8.6million, gets 6 months house arrest ⚠

An Alaskan court has handed one of the Mirai authors a huge fine.

πŸ“– Read

via "Naked Security".
⚠ Crypto exchange collapses, victims accuse it of exit scam ⚠

Another day, another exchange goes down - but was it a hack or an exit scam?

πŸ“– Read

via "Naked Security".
⚠ Google’s stealthy reCAPTCHA v3 detects humans – no questions asked ⚠

After 20 years of waiting you'll no longer feel your will to live drain away as you solve tedious visual puzzles. Maybe.

πŸ“– Read

via "Naked Security".
⚠ How one man could have taken over any business on Facebook ⚠

The recently patched flaw would have enabled anyone to make themselves an administrator for any Facebook business account.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-6343

JBoss BPM Suite 6 is vulnerable to a reflected XSS via dashbuilder. Remote attackers can entice authenticated users that have privileges to access dashbuilder (usually admins) to click on links to /dashbuilder/Controller containing malicious scripts. Successful exploitation would allow execution of script code within the context of the affected user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-5402

A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-2121

A permissions flaw was found in redis, which sets weak permissions on certain files and directories that could potentially contain sensitive information. A local, unprivileged user could possibly use this flaw to access unauthorized system information.

πŸ“– Read

via "National Vulnerability Database".