πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ 5 tips for you and your family on Safer Internet Day ⚠

Why not make Safer Internet Day the excuse you need to do all those cybersecurity tweaks you've been putting off?

πŸ“– Read

via "Naked Security".
πŸ•΄ Keeping a Strong Security Metrics Framework Strong πŸ•΄

Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage πŸ•΄

Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.

πŸ“– Read

via "Dark Reading: ".
πŸ›  GRR 3.4.0.4 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Adobe Addresses Critical Flash, Framemaker Flaws ❌

Overall, Adobe patched flaws tied to 42 CVEs as part of its regularly scheduled updates.

πŸ“– Read

via "Threatpost".
πŸ” How to gain more control over DNS with NextDNS: 5 steps πŸ”

As an alternative to an on-site DNS server, this cloud-hosted DNS service lets you block, filter, and analyze activity across your network and devices.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ What Are Some Foundational Ways to Protect My Global Supply Chain? πŸ•΄

Assessing supply chains is one of the more challenging third-party risk management endeavors organizations can take on.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Macs See More Adware, Unwanted Apps Than PCs πŸ•΄

The latest data from Malwarebytes show the average Mac sees almost twice as many bad apps as Windows systems, but actual malware continues to be scarce.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits πŸ•΄

Infection vectors were evenly divided among phishing, vulnerability exploitation, and unauthorized credential use in 2019.

πŸ“– Read

via "Dark Reading: ".
❌ Estée Lauder Exposes 440M Records, with Email Addresses, Network Info ❌

Middleware data was exposed, which can create a secondary path for malware through which applications and data can be compromised.

πŸ“– Read

via "Threatpost".
πŸ•΄ Why Ransomware Will Soon Target the Cloud πŸ•΄

As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-4519

Zenphoto before 1.4.3.4 admin-news-articles.php date parameter XSS.

πŸ“– Read

via "National Vulnerability Database".
❌ Intel Patches High-Severity Flaw in Security Engine ❌

The high-severity vulnerability could enable denial of service, privilege escalation and information disclosure.

πŸ“– Read

via "Threatpost".
πŸ” U.S. Indicts Four Chinese Military Members for Equifax Hack πŸ”

In charging four Chinese nationals with 2017's Equifax hack this week, the DOJ also said intellectual property - Equifax's own trade secrets - were stolen as part of the hack.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Microsoft Patches Exploited Internet Explorer Flaw πŸ•΄

This month's Patch Tuesday brings fixes for 99 CVEs, including one IE flaw seen exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-2517

Cross-site scripting (XSS) vulnerability in PrestaShop before 1.4.9 allows remote attackers to inject arbitrary web script or HTML via the index of the product[] parameter to ajax.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2452

Multiple cross-site scripting (XSS) vulnerabilities in pragmaMx 1.x before 1.12.2 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter to modules.php or (2) img_url to includes/wysiwyg/spaw/editor/plugins/imgpopup/img_popup.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2216

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6720 and CVE-2012-6721. Reason: this candidate was intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2012-6720 and CVE-2012-6721 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1124

SQL injection vulnerability in search.php in phxEventManager 2.0 beta 5 allows remote attackers to execute arbitrary SQL commands via the search_terms parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-4067

Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches ❌

There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update.

πŸ“– Read

via "Threatpost".