ATENTIONβΌ New - CVE-2012-0718
π Read
via "National Vulnerability Database".
IBM Tivoli Endpoint Manager 8 does not set the HttpOnly flag on cookies.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-5146
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
π Is your firmware vulnerable to attack? A report says it might be π
π Read
via "Security on TechRepublic".
Unsigned firmware in WiFi adapters, USB hubs, trackpads, and other devices can be compromised by hackers, says enterprise firmware security company Eclypsium in a new report.π Read
via "Security on TechRepublic".
TechRepublic
Is your firmware vulnerable to attack? A report says it might be
Unsigned firmware in WiFi adapters, USB hubs, trackpads, and other devices can be compromised by hackers, says enterprise firmware security company Eclypsium in a new report.
π΄ Lumu to Emerge from Stealth at RSAC π΄
π Read
via "Dark Reading: ".
The new company will focus on giving customers earlier indications of network and server compromise.π Read
via "Dark Reading: ".
Dark Reading
Lumu to Emerge from Stealth at RSAC
The new company will focus on giving customers earlier indications of network and server compromise.
β Iran-Backed APTs Collaborate on 3-Year βFox Kittenβ Global Spy Campaign β
π Read
via "Threatpost".
APT34/OilRig and APT33/Elfin have established a highly developed and persistent infrastructure that could be converted to distribute destructive wiper malware.π Read
via "Threatpost".
Threat Post
Iran-Backed APTs Collaborate on 3-Year βFox Kittenβ Global Spy Campaign
APT34/OilRig and APT33/Elfin have established a highly developed and persistent infrastructure that could be converted to distribute destructive wiper malware.
π Finally, the world is getting concerned about data privacy π
π Read
via "Security on TechRepublic".
Consumers and employees are finally becoming more sensitive to the privacy of their data. As technology leaders it's worth getting ahead of this trend.π Read
via "Security on TechRepublic".
TechRepublic
Finally, the world is getting concerned about data privacy
Consumers and employees are finally becoming more sensitive to the privacy of their data. As technology leaders it's worth getting ahead of this trend.
β Ring Mandates 2FA After Rash of Hacks β
π Read
via "Threatpost".
Ring outlined new security and data privacy measures, Tuesday, following backlash of the connected doorbell in the past year.π Read
via "Threatpost".
Threat Post
Ring Mandates 2FA After Rash of Hacks
Ring outlined new security and data privacy measures, Tuesday, following backlash of the connected doorbell in the past year.
π Washington Privacy Act Clears Senate π
π Read
via "Subscriber Blog RSS Feed ".
Like other recent state data privacy laws, new legislation in Washington would require businesses to establish, implement, and maintain reasonable administrative, technical, and physical data security practices.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Washington Privacy Act Clears Senate
Like other recent state data privacy laws, new legislation in Washington would require businesses to establish, implement, and maintain reasonable administrative, technical, and physical data security practices.
ATENTIONβΌ New - CVE-2013-4228
π Read
via "National Vulnerability Database".
The OG access fields (visibility fields) implementation in Organic Groups (OG) module 7.x-2.x before 7.x-2.3 for Drupal does not properly restrict access to private groups, which allows remote authenticated users to guess node IDs, subscribe to, and read the content of arbitrary private groups via unspecified vectors.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4226
π Read
via "National Vulnerability Database".
The Authenticated User Page Caching (Authcache) module 7.x-1.x before 7.x-1.5 for Drupal does not properly restrict access to cached pages, which allows remote attackers with the same role-combination as the superuser to obtain sensitive information via the cached pages of the superuser.π Read
via "National Vulnerability Database".
π΄ Dell Sells RSA to Private Equity Firm for $2.1B π΄
π Read
via "Dark Reading: ".
Deal with private equity entity Symphony Technology Group revealed one week before the security industry's RSA Conference in San Francisco.π Read
via "Dark Reading: ".
Dark Reading
Dell Sells RSA to Private Equity Firm for $2.1B
Deal with private equity entity Symphony Technology Group revealed one week before the security industry's RSA Conference in San Francisco.
β FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter β
π Read
via "Threatpost".
OurMine took over the Spanish powerhouse soccer team's Twitter account.π Read
via "Threatpost".
Threat Post
FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter
OurMine took over the Spanish powerhouse soccer team's Twitter account.
π΄ The Trouble with Free and Open Source Software π΄
π Read
via "Dark Reading: ".
Insecure developer accounts, legacy software, and nonstandard naming schemes are major problems, Linux Foundation and Harvard study concludes.π Read
via "Dark Reading: ".
Dark Reading
The Trouble with Free and Open Source Software
Insecure developer accounts, legacy software, and nonstandard naming schemes are major problems, Linux Foundation and Harvard study concludes.
ATENTIONβΌ New - CVE-2015-0749
π Read
via "National Vulnerability Database".
A vulnerability in Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected software. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-2054
π Read
via "National Vulnerability Database".
A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.π Read
via "National Vulnerability Database".
β OpenSSH eases admin hassles with FIDO U2F token support β
π Read
via "Naked Security".
OpenSSH version 8.2 is out and the big news is that the worldβs most popular remote management software now supports authentication using any FIDO (Fast Identity Online) U2F hardware token.π Read
via "Naked Security".
Naked Security
OpenSSH eases admin hassles with FIDO U2F token support
OpenSSH version 8.2 is out and the big news is that the worldβs most popular remote management software now supports authentication using any FIDO (Fast Identity Online) U2F hardware token.
β WordPress plugin hole could have allowed attackers to wipe websites β
π Read
via "Naked Security".
A WordPress plugin with over 100,000 active installations had a bug that could have allowed unauthorised attackers to wipe its users' blogs clean, it emerged this week.π Read
via "Naked Security".
Naked Security
WordPress plugin hole could have allowed attackers to wipe websites
A WordPress plugin with over 100,000 active installations had a bug that could have allowed unauthorised attackers to wipe its usersβ blogs clean, it emerged this week.
β Facebook asks to be regulated kinda like a newspaper, kinda like telco β
π Read
via "Naked Security".
Zuckerberg is in Brussels right in time for the European Commission's release of its manifesto on regulating AI.π Read
via "Naked Security".
Naked Security
Facebook asks to be regulated kinda like a newspaper, kinda like telco
Zuckerberg is in Brussels right in time for the European Commissionβs release of its manifesto on regulating AI.
β Private photos leaked by PhotoSquaredβs unsecured cloud storage β
π Read
via "Naked Security".
With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.π Read
via "Naked Security".
Naked Security
Private photos leaked by PhotoSquaredβs unsecured cloud storage
With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.
β Latest Tax Scams Target Apps and Tax-Prep Websites β
π Read
via "Threatpost".
Traditional e-mail based scams are also in the mix this year, one in particular that uses the legitimate app TeamViewer to take over victimsβ systems.π Read
via "Threatpost".
Threat Post
Latest Tax Scams Target Apps and Tax-Prep Websites
Traditional e-mail based scams are also in the mix this year, one in particular that uses the legitimate app TeamViewer to take over victimsβ systems.
π How to manage security and privacy in the new Microsoft Edge browser π
π Read
via "Security on TechRepublic".
There's a new version of Microsoft Edge in town based on Chromium. Here's how to manage the browser's security and privacy settings.π Read
via "Security on TechRepublic".
TechRepublic
How to manage security and privacy in the new Microsoft Edge browser
There's a new version of Microsoft Edge in town based on Chromium. Here's how to manage the browser's security and privacy settings.