πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ U.S. Pipeline Disrupted by Ransomware Attack ❌

The attack took a gas compression facility offline for two days, disrupting the supply chain.

πŸ“– Read

via "Threatpost".
πŸ•΄ User Have Risky Security Habits, but Security Pros Aren't Much Better πŸ•΄

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Users Have Risky Security Habits, but Security Pros Aren't Much Better πŸ•΄

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Fool Smart Car Camera with a 2-Inch Piece of Electrical Tape πŸ•΄

McAfee researchers say they were able to get a Tesla to autonomously accelerate by tricking its camera platform into misreading a speed-limit sign.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-2018

Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Data privacy: What consumers want businesses to know πŸ”

A new PwC report reveals what customers expect when it comes to expectations of privacy surrounding their data.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2014-3484

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2629

Multiple cross-site request forgery (CSRF) and cross-site scripting (XSS) vulnerabilities in Axous 1.1.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator account via an addnew action to admin/administrators_add.php; or (2) conduct cross-site scripting (XSS) attacks via the page_title parameter to admin/content_pages_edit.php; the (3) category_name[] parameter to admin/products_category.php; the (4) site_name, (5) seo_title, or (6) meta_keywords parameter to admin/settings_siteinfo.php; the (7) company_name, (8) address1, (9) address2, (10) city, (11) state, (12) country, (13) author_first_name, (14) author_last_name, (15) author_email, (16) contact_first_name, (17) contact_last_name, (18) contact_email, (19) general_email, (20) general_phone, (21) general_fax, (22) sales_email, (23) sales_phone, (24) support_email, or (25) support_phone parameter to admin/settings_company.php; or the (26) system_email, (27) sender_name, (28) smtp_server, (29) smtp_username, (30) smtp_password, or (31) order_notice_email parameter to admin/settings_email.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-2498

The Linux kernel from v2.3.36 before v2.6.39 allows local unprivileged users to cause a denial of service (memory consumption) by triggering creation of PTE pages.

πŸ“– Read

via "National Vulnerability Database".
⚠ Ring makes 2FA mandatory to keep hackers out of your doorbell account ⚠

Amazon is following Google's lead by forcing all users to use two-factor authentication when logging into their Ring accounts.

πŸ“– Read

via "Naked Security".
⚠ Firefox 73.0.1 fixes crashes, blank web pages and DRM niggles ⚠

Firefox version 73 has only been out for a week but already Mozilla has had to update it to v73.0.1 to fix a range of browser problems.

πŸ“– Read

via "Naked Security".
❌ MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer ❌

This week a hacking forum posted data from the breachβ€”which included personal and contact details for celebrities, tech CEOs, government officials and employees at large tech companies.

πŸ“– Read

via "Threatpost".
❌ Critical Adobe Flaws Fixed in Out-of-Band Update ❌

Two critical Adobe vulnerabilities have been fixed in Adobe After Effects and Adobe Media Encoder.

πŸ“– Read

via "Threatpost".
⚠ Nearly half of hospital Windows systems still vulnerable to RDP bugs ⚠

Almost half of connected hospital devices are still exposed to the wormable BlueKeep Windows flaw nearly a year after it was announced, according to a report released this week.

πŸ“– Read

via "Naked Security".
πŸ” Cloud misconfigurations cost companies nearly $5 trillion πŸ”

A DivvyCloud report finds 196 data breaches exposed more than 33 billion records due to environments without appropriate security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Firms Improve Threat Detection but Face Increasingly Disruptive Attacks πŸ•΄

In addition, more third parties are discovering the attacks rather than the companies themselves.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 10 Tough Questions CEOs Are Asking CISOs πŸ•΄

CEOs today are prepared with better questions than 'Are we secure,' and chief information security officers had better be ready to answer.

πŸ“– Read

via "Dark Reading: ".
⚠ Ransomware attack forces 2-day shutdown of natural gas pipeline ⚠

The attacker(s) infected both IT and operational networks with an unspecified ransomware strain, though the facility never lost control.

πŸ“– Read

via "Naked Security".
πŸ•΄ 5 Strategies to Secure Cloud Operations Against Today's Cyber Threats πŸ•΄

With these fundamentals in mind, organizations can reduce their security and compliance risks as they reap the cloud's many benefits:

πŸ“– Read

via "Dark Reading: ".
πŸ” How Shadow IT could put your organization at risk πŸ”

Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How some presidential campaigns use DMARC to protect their domains from being spoofed πŸ”

DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.

πŸ“– Read

via "Security on TechRepublic".