πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2012-6307

A vulnerability exists in JPEGsnoop 1.5.2 due to an unspecified issue in JPEG file handling, which could let a malicious user execute arbitrary code

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6306

A vulnerability exists in HCView (aka Hardcoreview) 1.4 due to a write access violation with a GIF file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6297

Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Phishing Personified πŸ•΄

What makes these scams so completely obvious in the physical form?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 90% of CISOs Would Cut Pay for Better Work-Life Balance πŸ•΄

Businesses receive $30,000 of 'free' CISO time as security leaders report job-related stress taking a toll on their health and relationships.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Reveal How Smart Lightbulbs Can Be Hacked to Attack πŸ•΄

New exploit builds on previous research involving Philips Hue Smart Bulbs.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to use 7zip to encrypt files πŸ”

If you need strong command line encryption on Linux, look no further than 7zip.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Irish Data Protection Puts Google on Notice for Data Privacy - Again πŸ”

Ireland's Data Protection Commission has announced that it's looking into Google yet again - this time for the way it processes user location data and transparency.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Magecart Gang Attacks Olympic Ticket Reseller and Survival Food Sites ❌

A recent slew of skimming attacks have been linked back to Magecart Group 12.

πŸ“– Read

via "Threatpost".
⚠ Cybercrooks busted for multimillion-dollar identity fraud ⚠

Organizations were attacked for employees' data, including names, addresses and birthdates used to set up hundreds of bank accounts.

πŸ“– Read

via "Naked Security".
⚠ Wacom driver caught monitoring third-party software use ⚠

Graphics tablet company Wacom can collect data unconnected to its products, such as which applications users open on their computers.

πŸ“– Read

via "Naked Security".
⚠ Facebook, Google, YouTube order Clearview to stop scraping faceprints ⚠

It's my First Amendment right to scrape publicly available face images, its CEO says. Besides, we're just doing what Google Search does.

πŸ“– Read

via "Naked Security".
⚠ Researchers transmit data covertly by altering screen brightness ⚠

Researchers have retrieved data from a disconnected computer by altering its LCD's pixel density just enough for a camera to pick it up.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five: 2/7 Edition πŸ”

Ransomware takes a dangerous turn, a flaw in the Android Twitter app is exploited, and more - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Phishing Campaign Targets 250 Android Apps with Anubis Malware ❌

New attacks discovered by Cofense can perform keylogging, steal data and completely hijack a mobile device.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Measures to Harden Election Technology πŸ•΄

Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-1567

LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1566

LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintNanny.

πŸ“– Read

via "National Vulnerability Database".
❌ Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs ❌

RCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven't yet patched CVE-2019-19781.

πŸ“– Read

via "Threatpost".
πŸ›  UFONet 1.4 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” How Shadow IT could put your organization at risk πŸ”

Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.

πŸ“– Read

via "Security on TechRepublic".