πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2012-2216

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6720 and CVE-2012-6721. Reason: this candidate was intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2012-6720 and CVE-2012-6721 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1124

SQL injection vulnerability in search.php in phxEventManager 2.0 beta 5 allows remote attackers to execute arbitrary SQL commands via the search_terms parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-4067

Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches ❌

There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update.

πŸ“– Read

via "Threatpost".
πŸ•΄ Healthcare Ransomware Damage Passes $157M Since 2016 πŸ•΄

Researchers found the total cost far exceeded the amount of ransom paid to attackers.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-4938

Multiple cross-site scripting (XSS) vulnerabilities in Ariadne 2.7.6 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO parameter to (1) index.php and (2) loader.php.

πŸ“– Read

via "National Vulnerability Database".
⚠ Data about inmates and jail staff spilled by leaky prison app ⚠

A web-mapping project came across detainees' prescriptions and other PII that could be used by identity thieves to victimize prisoners.

πŸ“– Read

via "Naked Security".
πŸ” Cloud computing security: These two Microsoft tools can help you battle shadow IT πŸ”

Finding what cloud services employees are using is only half the battle: integrating Microsoft Cloud App Security and Defender Advanced Threat Protection means you can track, block or audit cloud app usage.

πŸ“– Read

via "Security on TechRepublic".
⚠ US charges four Chinese military members with Equifax hack ⚠

The indictment suggests the hack was part of a series of major data thefts organized by Chinese military and intelligence agencies.

πŸ“– Read

via "Naked Security".
❌ FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware ❌

Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work.

πŸ“– Read

via "Threatpost".
❌ Katie Moussouris: The Bug Bounty Conflict of Interest ❌

Kate Moussouris sounds off on the challenges behind creating successful bug bounty programs.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Common Errors That Allow Attackers to Go Undetected πŸ•΄

Make these mistakes and invaders might linger in your systems for years.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Chaos May Be the Key to Quantum-Proof Encryption πŸ•΄

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-0810

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-5140

The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-5139

The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

πŸ“– Read

via "National Vulnerability Database".
⚠ Mozilla issues final warning to websites using TLS 1.0 ⚠

From March, the Firefox, Chrome, Safari and Edge browsers will show warnings when users visit websites that only support TLS versions 1.0 or 1.1.

πŸ“– Read

via "Naked Security".
πŸ•΄ Chaos & Order: The Keys to Quantum-Proof Encryption πŸ•΄

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up.

πŸ“– Read

via "Dark Reading: ".
πŸ” Data breaches up 17% in 2019 over previous year πŸ”

The Identity Theft Recource Center warns that businesses of all sizes should be vigilant about data security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ What Are Some Basic Ways to Protect My Global Supply Chain? πŸ•΄

Assessing supply chains is one of the more challenging third-party risk management endeavors organizations can take on.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 5G Adoption Should Change How Organizations Approach Security πŸ•΄

With 5G adoption, businesses will be able to power more IoT devices and perform tasks more quickly, but there will be security ramifications.

πŸ“– Read

via "Dark Reading: ".