🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Chaos May Be the Key to Quantum-Proof Encryption 🕴

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2012-0810

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2009-5140

The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2009-5139

The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

📖 Read

via "National Vulnerability Database".
Mozilla issues final warning to websites using TLS 1.0

From March, the Firefox, Chrome, Safari and Edge browsers will show warnings when users visit websites that only support TLS versions 1.0 or 1.1.

📖 Read

via "Naked Security".
🕴 Chaos & Order: The Keys to Quantum-Proof Encryption 🕴

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up.

📖 Read

via "Dark Reading: ".
🔐 Data breaches up 17% in 2019 over previous year 🔐

The Identity Theft Recource Center warns that businesses of all sizes should be vigilant about data security.

📖 Read

via "Security on TechRepublic".
🕴 What Are Some Basic Ways to Protect My Global Supply Chain? 🕴

Assessing supply chains is one of the more challenging third-party risk management endeavors organizations can take on.

📖 Read

via "Dark Reading: ".
🕴 5G Adoption Should Change How Organizations Approach Security 🕴

With 5G adoption, businesses will be able to power more IoT devices and perform tasks more quickly, but there will be security ramifications.

📖 Read

via "Dark Reading: ".
SoundCloud Tackles DoS, Account Takeover Issues

Among other issues, the music platform didn't limit the number of login attempts someone could make.

📖 Read

via "Threatpost".
🛠 NTCrackPipe 2.0 🛠

NTCrackPipe is a basic local Windows account cracking tool.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🕴 Stop Defending Everything 🕴

Instead, try prioritizing with the aid of a thorough asset inventory.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2012-0951

A Memory Corruption Vulnerability exists in NVIDIA Graphics Drivers 29549 due to an unknown function in the file proc/driver/nvidia/registry.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2011-4661

A memory leak vulnerability exists in Cisco IOS before 15.2(1)T due to a memory leak in the HTTP PROXY Server process (aka CSCtu52820), when configured with Cisco ISR Web Security with Cisco ScanSafe and User Authenticaiton NTLM configured.

📖 Read

via "National Vulnerability Database".
Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs

The release of Firefox 73 fixed high-severity memory safety bugs that could cause arbitrary code execution and missing bounds check that could enable memory corruption.

📖 Read

via "Threatpost".
🔏 U.S. Counterintelligence Center Pledges to Focus on Supply Chains, Democracy 🔏

The National Counterintelligence and Security Center said this week it plans to double down on securing critical infrastructure, supply chain, the economy, democratic institutions, and cyber/technical operations.

📖 Read

via "Subscriber Blog RSS Feed ".
ATENTION New - CVE-2011-4338

Shaman 1.0.9: Users can add the line askforpwd=false to his shaman.conf file, without entering the root password in shaman. The next time shaman is run, root privileges are granted despite the fact that the user never entered the root password.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2011-3901

Android SQLite Journal before 4.0.1 has an information disclosure vulnerability.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2011-3336

regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2011-2499

Mambo CMS through 4.6.5 has multiple XSS.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2011-2343

The Bluetooth stack in Android before 2.3.6 allows a physically proximate attacker to obtain contact information via an AT phonebook transfer.

📖 Read

via "National Vulnerability Database".