πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Insider data breach survey finds directors most likely to break company policy πŸ”

Report suggests IT leaders think breaches are inevitable and don't have adequate risk management in place.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2014-3622

Use-after-free vulnerability in the add_post_var function in the Posthandler component in PHP 5.6.x before 5.6.1 might allow remote attackers to execute arbitrary code by leveraging a third-party filter extension that accesses a certain ksep value.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-2727

The STARTTLS implementation in MailMarshal before 7.2 allows plaintext command injection.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-2228

The XStream extension in HP Fortify SCA before 2.2 RC3 allows remote attackers to execute arbitrary code via unsafe deserialization of XML messages.

πŸ“– Read

via "National Vulnerability Database".
❌ Hamas Ensnares Israeli Soldiers with Pretty β€˜Ladies’ ❌

The third catfish attempt in three years from the Palestinian militant group adds a few technical advances to the mix.

πŸ“– Read

via "Threatpost".
❌ SMS Attack Spreads Emotet, Steals Bank Credentials ❌

A new Emotet campaign is spread via SMS messages pretending to be from banks and may have ties to the TrickBot trojan.

πŸ“– Read

via "Threatpost".
πŸ•΄ DHS's CISA Warns of New Critical Infrastructure Ransomware Attack πŸ•΄

An attack on a natural gas compression facility sent the operations offline for two days.

πŸ“– Read

via "Dark Reading: ".
πŸ” Security holes in 2G and 3G networks will pose a risk for next several years πŸ”

Despite the growth of 5G and 4G, older network technologies beset with certain security flaws will be around for many more years, says enterprise security provider Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2013-5581

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6685

Nokogiri before 1.5.4 is vulnerable to XXE attacks

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6614

D-Link DSR-250N devices before 1.08B31 allow remote authenticated users to obtain "persistent root access" via the BusyBox CLI, as demonstrated by overwriting the super user password.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1932

A cross-site scripting (XSS) vulnerability in Wolf CMS 0.75 and earlier allows remote attackers to inject arbitrary web script or HTML via the setting[admin_email] parameter to admin/setting.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 44% of Security Threats Start in the Cloud πŸ•΄

Amazon Web Services is a top source of cyberattacks, responsible for 94% of all Web attacks originating in the public cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Zero-Factor Authentication: Owning Our Data πŸ•΄

Are you asking the right questions to determine how well your vendors will protect your data? Probably not.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-0055

OverlayFS in the Linux kernel before 3.0.0-16.28, as used in Ubuntu 10.0.4 LTS and 11.10, is missing inode security checks which could allow attackers to bypass security restrictions and perform unauthorized actions.

πŸ“– Read

via "National Vulnerability Database".
πŸ” U.S. Warns of Ransomware Attacks Targeting Pipeline Ops πŸ”

Following an attack on a gas compression facility, CISA is urging organizations to take steps to safeguard their systems.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ BlueKeep Flaw Plagues Outdated Connected Medical Devices ❌

More than 55 percent of medical imaging devices - including MRIs, XRays and ultrasound machines - are powered by outdated Windows versions, researchers warn.

πŸ“– Read

via "Threatpost".
❌ U.S. Pipeline Disrupted by Ransomware Attack ❌

The attack took a gas compression facility offline for two days, disrupting the supply chain.

πŸ“– Read

via "Threatpost".
πŸ•΄ User Have Risky Security Habits, but Security Pros Aren't Much Better πŸ•΄

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Users Have Risky Security Habits, but Security Pros Aren't Much Better πŸ•΄

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Fool Smart Car Camera with a 2-Inch Piece of Electrical Tape πŸ•΄

McAfee researchers say they were able to get a Tesla to autonomously accelerate by tricking its camera platform into misreading a speed-limit sign.

πŸ“– Read

via "Dark Reading: ".