πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2014-2228

The XStream extension in HP Fortify SCA before 2.2 RC3 allows remote attackers to execute arbitrary code via unsafe deserialization of XML messages.

πŸ“– Read

via "National Vulnerability Database".
❌ Hamas Ensnares Israeli Soldiers with Pretty β€˜Ladies’ ❌

The third catfish attempt in three years from the Palestinian militant group adds a few technical advances to the mix.

πŸ“– Read

via "Threatpost".
❌ SMS Attack Spreads Emotet, Steals Bank Credentials ❌

A new Emotet campaign is spread via SMS messages pretending to be from banks and may have ties to the TrickBot trojan.

πŸ“– Read

via "Threatpost".
πŸ•΄ DHS's CISA Warns of New Critical Infrastructure Ransomware Attack πŸ•΄

An attack on a natural gas compression facility sent the operations offline for two days.

πŸ“– Read

via "Dark Reading: ".
πŸ” Security holes in 2G and 3G networks will pose a risk for next several years πŸ”

Despite the growth of 5G and 4G, older network technologies beset with certain security flaws will be around for many more years, says enterprise security provider Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2013-5581

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6685

Nokogiri before 1.5.4 is vulnerable to XXE attacks

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6614

D-Link DSR-250N devices before 1.08B31 allow remote authenticated users to obtain "persistent root access" via the BusyBox CLI, as demonstrated by overwriting the super user password.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1932

A cross-site scripting (XSS) vulnerability in Wolf CMS 0.75 and earlier allows remote attackers to inject arbitrary web script or HTML via the setting[admin_email] parameter to admin/setting.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 44% of Security Threats Start in the Cloud πŸ•΄

Amazon Web Services is a top source of cyberattacks, responsible for 94% of all Web attacks originating in the public cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Zero-Factor Authentication: Owning Our Data πŸ•΄

Are you asking the right questions to determine how well your vendors will protect your data? Probably not.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-0055

OverlayFS in the Linux kernel before 3.0.0-16.28, as used in Ubuntu 10.0.4 LTS and 11.10, is missing inode security checks which could allow attackers to bypass security restrictions and perform unauthorized actions.

πŸ“– Read

via "National Vulnerability Database".
πŸ” U.S. Warns of Ransomware Attacks Targeting Pipeline Ops πŸ”

Following an attack on a gas compression facility, CISA is urging organizations to take steps to safeguard their systems.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ BlueKeep Flaw Plagues Outdated Connected Medical Devices ❌

More than 55 percent of medical imaging devices - including MRIs, XRays and ultrasound machines - are powered by outdated Windows versions, researchers warn.

πŸ“– Read

via "Threatpost".
❌ U.S. Pipeline Disrupted by Ransomware Attack ❌

The attack took a gas compression facility offline for two days, disrupting the supply chain.

πŸ“– Read

via "Threatpost".
πŸ•΄ User Have Risky Security Habits, but Security Pros Aren't Much Better πŸ•΄

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Users Have Risky Security Habits, but Security Pros Aren't Much Better πŸ•΄

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Fool Smart Car Camera with a 2-Inch Piece of Electrical Tape πŸ•΄

McAfee researchers say they were able to get a Tesla to autonomously accelerate by tricking its camera platform into misreading a speed-limit sign.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-2018

Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Data privacy: What consumers want businesses to know πŸ”

A new PwC report reveals what customers expect when it comes to expectations of privacy surrounding their data.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2014-3484

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

πŸ“– Read

via "National Vulnerability Database".