πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2016-6328

A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).

πŸ“– Read

via "National Vulnerability Database".
⚠ RoboCops: AI on the rise in policing to predict crime and uncover lies ⚠

PrediPol uses predictive policing algorithms, VeriPol analyzes fake-report text. Who ya gonna call?

πŸ“– Read

via "Naked Security".
⚠ US indicts alleged Chinese spies for hacking aerospace companies ⚠

The DOJ described five years of stealing turbofan engine designs that relied on insiders, state-sponsored hackers, phishing and malware.

πŸ“– Read

via "Naked Security".
⚠ Update now! Apple releases security fixes for iOS, MacOS, Safari, others ⚠

If you own any kind of Apple device or software, you may want to check to see if you have an update waiting for you.

πŸ“– Read

via "Naked Security".
⚠ Facebook is still approving fake political ads ⚠

Just a couple of weeks before the US midterm elections, journalists have revealed that Facebook is continuing to approve fake advertisements from fake sources.

πŸ“– Read

via "Naked Security".
⚠ Passcodes are protected by Fifth Amendment, says court ⚠

The government isn't really after the password, after all; it's after any potential evidence it protects. In other words: fishing expedition.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-2123

A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-2120

An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Not Every Security Flaw Is Created Equal πŸ•΄

You need smart prioritization to close the riskiest vulnerabilities. Effective DevSecOps leads the way, according to a new study.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Not Every Security Flaw Is Created Equal πŸ•΄

You need smart prioritization to close the riskiest vulnerabilities. Effective DevSecOps leads the way, according to a new study.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cyberattacks increasingly targeting enterprise IT networks in energy and utilities industry πŸ”

Increased attacks prove the importance of detecting threat behaviors early and monitoring network traffic, stopping cybercriminals in their tracks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Google won't let you sign in if you disabled JavaScript in your browser πŸ”

Google announces for new security features to protect Google accounts.

πŸ“– Read

via "Security on TechRepublic".
❌ Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack ❌

Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Artificial intelligence agent pilot launched to expose liars at EU borders πŸ”

AI is being employed to act as a lie detector to reduce the pressure on country borders and human agents.

πŸ“– Read

via "Security on TechRepublic".
❌ PoC Exploit Compromises Microsoft Live Accounts via Subdomain Hijacking ❌

Poor DNS housekeeping opens the door to account takeover.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ FIFA Reveals Second Hack πŸ•΄

Successful phishing campaign leads attackers to confidential information of world soccer's governing body.

πŸ“– Read

via "Dark Reading: ".
❌ Utilities, Energy Sector Attacked Mainly Via IT, Not ICS ❌

Stealing administrative credentials to carry out months-long spy campaigns is a top threat.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Radisson Rewards Program Targeted in Data Breach πŸ•΄

It's the latest in a series of attacks targeting the travel industry, following incidents at British Airways and Cathay Pacific.

πŸ“– Read

via "Dark Reading: ".
πŸ” Social media support fraud is up nearly 500%, reaches highest level ever πŸ”

While social media platforms have succeeded in protecting users from phishing links, angler phishing has become the new mode of attack for many malicious actors.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Where Is the Consumer Outrage about Data Breaches? πŸ•΄

Facebook, Equifax, Cambridge Analytica ... Why do breaches of incomprehensible magnitude lead to a quick recovery for the businesses that lost or abused the data and such little lasting impact for the people whose information is stolen.

πŸ“– Read

via "Dark Reading: ".
πŸ” Carbon Black Incident Response Threat Report: US elections are endangered by cyberattacks πŸ”

A recent report by cybersecurity organization Carbon Black paints a grim picture of potential cyberattacks involving the upcoming US Elections. Learn more about the details.

πŸ“– Read

via "Security on TechRepublic".