πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Why Ransomware Will Soon Target the Cloud πŸ•΄

As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-4519

Zenphoto before 1.4.3.4 admin-news-articles.php date parameter XSS.

πŸ“– Read

via "National Vulnerability Database".
❌ Intel Patches High-Severity Flaw in Security Engine ❌

The high-severity vulnerability could enable denial of service, privilege escalation and information disclosure.

πŸ“– Read

via "Threatpost".
πŸ” U.S. Indicts Four Chinese Military Members for Equifax Hack πŸ”

In charging four Chinese nationals with 2017's Equifax hack this week, the DOJ also said intellectual property - Equifax's own trade secrets - were stolen as part of the hack.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Microsoft Patches Exploited Internet Explorer Flaw πŸ•΄

This month's Patch Tuesday brings fixes for 99 CVEs, including one IE flaw seen exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-2517

Cross-site scripting (XSS) vulnerability in PrestaShop before 1.4.9 allows remote attackers to inject arbitrary web script or HTML via the index of the product[] parameter to ajax.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2452

Multiple cross-site scripting (XSS) vulnerabilities in pragmaMx 1.x before 1.12.2 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter to modules.php or (2) img_url to includes/wysiwyg/spaw/editor/plugins/imgpopup/img_popup.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2216

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6720 and CVE-2012-6721. Reason: this candidate was intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2012-6720 and CVE-2012-6721 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1124

SQL injection vulnerability in search.php in phxEventManager 2.0 beta 5 allows remote attackers to execute arbitrary SQL commands via the search_terms parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-4067

Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches ❌

There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update.

πŸ“– Read

via "Threatpost".
πŸ•΄ Healthcare Ransomware Damage Passes $157M Since 2016 πŸ•΄

Researchers found the total cost far exceeded the amount of ransom paid to attackers.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-4938

Multiple cross-site scripting (XSS) vulnerabilities in Ariadne 2.7.6 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO parameter to (1) index.php and (2) loader.php.

πŸ“– Read

via "National Vulnerability Database".
⚠ Data about inmates and jail staff spilled by leaky prison app ⚠

A web-mapping project came across detainees' prescriptions and other PII that could be used by identity thieves to victimize prisoners.

πŸ“– Read

via "Naked Security".
πŸ” Cloud computing security: These two Microsoft tools can help you battle shadow IT πŸ”

Finding what cloud services employees are using is only half the battle: integrating Microsoft Cloud App Security and Defender Advanced Threat Protection means you can track, block or audit cloud app usage.

πŸ“– Read

via "Security on TechRepublic".
⚠ US charges four Chinese military members with Equifax hack ⚠

The indictment suggests the hack was part of a series of major data thefts organized by Chinese military and intelligence agencies.

πŸ“– Read

via "Naked Security".
❌ FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware ❌

Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work.

πŸ“– Read

via "Threatpost".
❌ Katie Moussouris: The Bug Bounty Conflict of Interest ❌

Kate Moussouris sounds off on the challenges behind creating successful bug bounty programs.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Common Errors That Allow Attackers to Go Undetected πŸ•΄

Make these mistakes and invaders might linger in your systems for years.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Chaos May Be the Key to Quantum-Proof Encryption πŸ•΄

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-0810

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.

πŸ“– Read

via "National Vulnerability Database".