2 May 2019
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ World Password Day or Groundhog Day? πŸ•΄

Despite decades trying to fortify our passwords with bolt-on solutions, attackers have always found ways to defeat them. Here are four reasons why.

πŸ“– Read

via "Dark Reading: ".
?
11:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Are We Still Celebrating World Password Day? πŸ•΄

Calls to eliminate the password abound on this World Password Day - and the technology to change is ready. So why can't we get off our password habit?

πŸ“– Read

via "Dark Reading: ".
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Facebook, Instagram Are Phishers' Favorite Social Platforms πŸ•΄

Cloud companies continue to represent the most phishing URLs, but social media saw the most growth in Q1 2019.

πŸ“– Read

via "Dark Reading: ".
12:24
❌ Cisco Warns of Critical Nexus 9000 Data Center Flaw ❌

Part of a slew of patches from the networking vendor, the CVSS 9.8 bug allows remote takeover of a vulnerable device.

πŸ“– Read

via "Threatpost".
12:31
πŸ” 6 ways to strengthen your password πŸ”

Make an effort to secure your digital life with these helpful, easy-to-follow password tips.

πŸ“– Read

via "Security on TechRepublic".
?
13:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” NIST Sets New Standard for Data Encryption Testing πŸ”

NIST has updated the Federal Information Processing Standard, or FIPS, to align with the international standard, ISO 19790 for the first time,

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-14559 (ac10_firmware, ac7_firmware, ac9_firmware)

An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A buffer overflow vulnerability exists in the router's web server (httpd). When processing the list parameters for a post request, the value is directly written with sprintf to a local variable placed on the stack, which overrides the return address of the function, causing a buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2018-14557 (ac10_firmware, ac7_firmware, ac9_firmware)

An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A buffer overflow vulnerability exists in the router's web server (httpd). When processing the page parameters for a post request, the value is directly written with sprintf to a local variable placed on the stack, which overrides the return address of the function, a causing buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2018-12244 (endpoint_protection)

SEP (Mac client) prior to and including 12.1 RU6 MP9 and prior to 14.2 RU1 may be susceptible to a CSV/DDE injection (also known as formula injection) vulnerability, which is a type of issue whereby an application or website allows untrusted input into CSV files.

πŸ“– Read

via "National Vulnerability Database".
13:43
πŸ•΄ Real-World Use, Risk of Open Source Code πŸ•΄

Organizations are using more open source software than ever before, but managing that code remains a challenge.

πŸ“– Read

via "Dark Reading: ".
?
14:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Dell Security Support Tool Harbors High-Severity Flaws ❌

Dell has patched two high-severity vulnerabilities in its SupportAssist software meant to aid security issues for customers.

πŸ“– Read

via "Threatpost".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ladders, SkyMed Leak Employment, Medical Data for Millions ❌

One of the misconfigured Elasticsearch databases showed evidence of a ransomware attack.

πŸ“– Read

via "Threatpost".
15:26
ATENTIONβ€Ό New - CVE-2017-18374

The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has two user accounts with default passwords, including a hardcoded service account with the username true and password true. These accounts can be used to login to the web interface, exploit authenticated command injections and change router settings for malicious purposes.

πŸ“– Read

via "National Vulnerability Database".
15:26
ATENTIONβ€Ό New - CVE-2017-18373

The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username user3 and and a long password consisting of a repetition of the string 0123456789. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.

πŸ“– Read

via "National Vulnerability Database".
15:26
ATENTIONβ€Ό New - CVE-2017-18372

The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp page and can be exploited through the uiViewSNTPServer parameter. Authentication can be achieved by exploiting CVE-2017-18373.

πŸ“– Read

via "National Vulnerability Database".
15:26
ATENTIONβ€Ό New - CVE-2017-18371

The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.

πŸ“– Read

via "National Vulnerability Database".
15:26
ATENTIONβ€Ό New - CVE-2017-18370

The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.

πŸ“– Read

via "National Vulnerability Database".
15:26
ATENTIONβ€Ό New - CVE-2017-18369

The Billion 5200W-T 1.02b.rc5.dt49 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the adv_remotelog.asp page and can be exploited through the syslogServerAddr parameter.

πŸ“– Read

via "National Vulnerability Database".
15:26
ATENTIONβ€Ό New - CVE-2017-18368

The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.

πŸ“– Read

via "National Vulnerability Database".
15:33
πŸ•΄ Security Depends on Careful Design πŸ•΄

Deploying focused edge protection on-site extends security beyond the network level to shield millions of previously exposed devices, apps, and control systems.

πŸ“– Read

via "Dark Reading: ".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ D-Link Cloud Camera Flaw Gives Hackers Access to Video Stream ❌

Researchers warn customers to reconsider the use of the camera’s remote access feature if the device is monitoring highly sensitive areas of their household or company.

πŸ“– Read

via "Threatpost".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Doesn't Trust IT - and IT Doesn't Trust Security πŸ•΄

How a rocky relationship between IT operations and cybersecurity teams can compound security risks.

πŸ“– Read

via "Dark Reading: ".
17:13
πŸ•΄ Misconfigured Ladders Database Exposed 13M User Records πŸ•΄

Job-hunting site Ladders leaves job seeker data exposed on the Internet.

πŸ“– Read

via "Dark Reading: ".
?
17:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to use the Enpass Password Audit tools πŸ”

If Enpass is your password manager of choice, there are three handy audit tools you should be using. Jack Wallen explains.

πŸ“– Read

via "Security on TechRepublic".
17:41
πŸ” How to use the Enpass password audit tools πŸ”

Use Enpass audit tools to identify weak, identical, and old passwords.

πŸ“– Read

via "Security on TechRepublic".
?
18:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Flaws Found in Eight Wireless Presentation Systems ❌

Crestron, Barco wePresent, Extron ShareLink and more wireless presentation systems have an array of critical flaws.

πŸ“– Read

via "Threatpost".
?
20:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Exploits For Old Configuration Issues Heighten Risk for SAP Customers πŸ•΄

Exploits give attackers a way to create havoc in business-critical SAP ERP, CRM, SCM, and other environments, Onapsis says.

πŸ“– Read

via "Dark Reading: ".
3 May 2019
?
06:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google rolling out auto-delete for your location and activity history ⚠

Auto-delete will hopefully please those of us who haven't already turned off location history altogether (for very good reason).

πŸ“– Read

via "Naked Security".
?
06:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cybersecurity experts battle for right to repair ⚠

A battle rages between manufacturers and users over who can repair a product, with tech companies using security concerns as a weapon.

πŸ“– Read

via "Naked Security".
06:53
⚠ Cryptocoin theft, scam and fraud could total more than $1.2b in Q1 ⚠

Crooks have developed "ingenious" new ways to drain user accounts and wallets, CipherTrace says, prodding regulators into action.

πŸ“– Read

via "Naked Security".
07:03
⚠ Criminals are hiding in Telegram – but backdoors are not the answer ⚠

When it comes to an easy life, the criminals behind the fearful Anubis banking malware have become big fans of Twitter and, increasingly, the secure messaging of Telegram.

πŸ“– Read

via "Naked Security".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why consumers still don't trust IoT devices πŸ”

Privacy and security concerns frequently drive consumer smart device buying decisions, according to an Internet Society and Consumers International report.

πŸ“– Read

via "Security on TechRepublic".
11:07
πŸ” Why older employees are less likely to get tricked by phishing attacks πŸ”

While Gen Zers think they won't fall for phishing scams, most don't even know what "phishing" means, according to a Google report.

πŸ“– Read

via "Security on TechRepublic".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Storytelling Can Help Keep Your Company Safe πŸ•΄

Well-crafted narratives can help you win over users in the battle to develop a sustainable cybersecurity culture.

πŸ“– Read

via "Dark Reading: ".
11:44
❌ Multiple Sierra Wireless AirLink Routers Open to Remote Code Execution ❌

Critical flaws in the software of Sierra Wireless' AirLink routers enable an array of malicious attacks.

πŸ“– Read

via "Threatpost".
?
12:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Retefe Banking Trojan Resurfaces, Says Goodbye to Tor ❌

The malware has new tricks, like using the stunnel encrypted tunneling mechanism and abusing a legitimate shareware app.

πŸ“– Read

via "Threatpost".
?
13:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The 2019 State of Cloud Security πŸ•΄

Enterprise cloud security is making real progress, but emerging technologies call for security teams to keep up the pace.

πŸ“– Read

via "Dark Reading: ".
?
13:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Executive Order Aims to Grow Federal Cybersecurity Staff πŸ•΄

The EO outlines a 'rotational assignment program' intended to help security practitioners develop their skills.

πŸ“– Read

via "Dark Reading: ".
?
14:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 5/3 Edition πŸ”

When coding is criminal, why HIPAA mandates breaches be reported after 60 days, and evaluating GDPR are all covered in this week's Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Belgian programmer solves cryptographic puzzle – 15 years too soon! ⚠

Belgian coder Bernard Fabrot just finished a 3.5-year computational marathon, solving a fascinating cryptopuzzle set at MIT back in 1999.

πŸ“– Read

via "Naked Security".
?
16:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: Cartoon Network Hack, the Catholic Church and Jason Statham Scams ❌

The Threatpost team breaks down the strangest security stories this week - from Cartoon Network hacked to show stripper videos, to a church being scammed out of $1.75 million.

πŸ“– Read

via "Threatpost".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Open Security Tests Gain Momentum With More Lab Partners πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
17:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Massive Dark Web 'Wall Street Market' Shuttered πŸ•΄

Europol-led international law enforcement operation led to takedown of world's second-largest digital underground marketplace.

πŸ“– Read

via "Dark Reading: ".
?
18:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Researchers Weigh in on Trump’s Cyber Workforce Executive Order ❌

Short on concrete details but long on affirming cybersecurity skills as a critical piece of federal defense, the White House executive order aims to bolster the national cyber workforce.

πŸ“– Read

via "Threatpost".
5 May 2019
?
19:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Mozilla bug throws Tor Browser users into chaos ⚠

A Mozilla bug has made everyone's Firefox addons 'untrustworthy' - including turning off the important NoScript security feature in Tor.

πŸ“– Read

via "Naked Security".
6 May 2019
?
10:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Amid Bug Bounty Hype, Sometimes Security is Left in the Dust ❌

Amidst the PR glitz and popularity of bug bounty programs, experts worry that actual smart security strategy is being left behind.

πŸ“– Read

via "Threatpost".
?
11:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Extinguishing the IoT Insecurity Dumpster Fire ❌

Will connected devices be insecure forever? Or will legislation - such as the recent UK mandate announced this week - help boost IoT security?

πŸ“– Read

via "Threatpost".
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Trust the Stack, Not the People πŸ•΄

A completely trusted stack lets the enterprise be confident that apps and data are treated and protected wherever they are.

πŸ“– Read

via "Dark Reading: ".
11:47
❌ Tor Security Add-On Abruptly Killed by Mozilla Bug ❌

A digital signing flaw killed add-ons for Firefox as well as Tor -- and no patch is yet available for Tor users.

πŸ“– Read

via "Threatpost".
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ High-Severity PrinterLogic Flaws Enable Remote Code Execution ❌

The three flaws enable an unauthenticated attacker to launch remote code execution attacks on printers.

πŸ“– Read

via "Threatpost".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting ❌

Web scammers are going after Marvel fans as the movie passes the $2.2 billion box-office mark, making it the second-highest grossing film of all time, behind only Avatar.

πŸ“– Read

via "Threatpost".
?
13:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Certificate issue disabling add-ons in Firefox and Tor Browser finally fixed πŸ”

Mozilla forces third party add-ons to be digitally signed, though an expired certificate disabled these, causing confusion among users of Firefox and the Tor Browser over the weekend.

πŸ“– Read

via "Security on TechRepublic".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Top Concern as Mobile Providers Think 5G πŸ•΄

The deployment of 5G networks will bring new use cases and revenue opportunities, mobile providers say, but security will be essential.

πŸ“– Read

via "Dark Reading: ".
16:11
πŸ” Popcorn Recipe Case Highlights Niche Trade Secret Theft Risk πŸ”

This company protected its sensitive data with biometric thumbprint scanner but still managed to suffer trade secret theft after a former director of research allegedly stole gigabytes of data on its recipes.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:13
❌ High-Severity Bug Leaves Cisco TelePresence Gear Open to Attack ❌

Cisco patches two high-severity bugs that could be exploited by remote attackers.

πŸ“– Read

via "Threatpost".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Oracle WebLogic Exploit-fest Continues with GandCrab Ransomware, XMRig ❌

Snowballing attacks using a recently patched critical bug show no sign of abating.

πŸ“– Read

via "Threatpost".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” The dark web is smaller, and may be less dangerous, than we think πŸ”

Another Dark Web market has been closed, its leaders arrested. Law enforcement seems to be getting a handle on the Dark Web--is it really as big of a threat as it is made out to be?

πŸ“– Read

via "Security on TechRepublic".
17:33
ATENTIONβ€Ό New - CVE-2018-13990

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brute-force attacks, because of Improper Restriction of Excessive Authentication Attempts.

πŸ“– Read

via "National Vulnerability Database".
17:33
ATENTIONβ€Ό New - CVE-2018-13983

ImpressCMS 1.3.10 has XSS via the PATH_INFO to htdocs/install/index.php, htdocs/install/page_langselect.php, or htdocs/install/page_modcheck.php.

πŸ“– Read

via "National Vulnerability Database".
17:48
ATENTIONβ€Ό New - CVE-2018-13990

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brute-force attacks, because of Improper Restriction of Excessive Authentication Attempts.

πŸ“– Read

via "National Vulnerability Database".
17:48
ATENTIONβ€Ό New - CVE-2018-13983

ImpressCMS 1.3.10 has XSS via the PATH_INFO to htdocs/install/index.php, htdocs/install/page_langselect.php, or htdocs/install/page_modcheck.php.

πŸ“– Read

via "National Vulnerability Database".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Debuts ElectionGuard to Secure Voting Processes πŸ•΄

The new software development kit - free and open source - will be available to election officials and technology suppliers this summer.

πŸ“– Read

via "Dark Reading: ".
18:19
πŸ•΄ 'Matrix'-Themed Ransomware Variant Spreads πŸ•΄

MegaCortex uses a compromised domain controller in its attack.

πŸ“– Read

via "Dark Reading: ".
?
18:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Password Reuse, Misconfiguration Blamed for Repository Compromises πŸ•΄

Armed with stolen credentials from another breach or from a misconfigured file, attackers delete developers' repositories on GitHub, Bitbucket, and GitLab, leaving behind ransom notes.

πŸ“– Read

via "Dark Reading: ".
18:43
❌ WP Live Chat WordPress Plugin Re-Patches File Upload Flaw ❌

After researchers were able to bypass a file upload validation flaw patch in WP Live Chat, a new patch has been issued.

πŸ“– Read

via "Threatpost".
18:44
πŸ•΄ Attackers Add a New Spin to Old Scams πŸ•΄

Scammers are figuring out unique ways of abusing cloud services to make their attacks look more genuine, Netskope says.

πŸ“– Read

via "Dark Reading: ".
?
21:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-18279

Lack of check of buffer length before copying can lead to buffer overflow in camera module in Small Cell SoC, Snapdragon Mobile, Snapdragon Wear in FSM9055, FSM9955, IPQ4019, IPQ8064, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA9531, QCA9558, QCA9563, QCA9880, QCA9886, QCA9980, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 835, SDM630, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016.

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-18278

An integer underflow may occur due to lack of check when received data length from font_mgr_qsee_request_service is bigger than the minimal value of the segment header, which may result in a buffer overflow, in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850.

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-18276

Secure camera logic allows display/secure camera controllers to access HLOS memory during secure display or camera session in Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 835, SD 845, SD 850

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-18275

A new account can be inserted into simContacts service using Android command line tool in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845.

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-18274

While iterating through the models contained in a fixed-size array in the actData structure, which also stores an incorrect number of models that is greater than the size of the array, a buffer overflow occurs in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-18173

In case of using an invalid android verified boot signature with very large length, an integer underflow occurs in Snapdragon Mobile in SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 810, SD 820, SD 835, SDM630, SDM636, SDM660, Snapdragon_High_Med_2016.

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-18157

A Use After Free Condition can occur in Thermal Engine in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDX20.

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-18156

While processing camera buffers in camera driver, a use after free condition can occur in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 625, SD 820, SD 820A, SD 835, SDX20.

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-18131

In QTEE, an incorrect fuse value can be blown in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 820, SD 820A, SD 835, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016.

πŸ“– Read

via "National Vulnerability Database".
21:53
ATENTIONβ€Ό New - CVE-2017-15841

When HOST sends a Special command ID packet, Controller triggers a RAM Dump and FW reset in Snapdragon Mobile in version SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, Snapdragon_High_Med_2016.

πŸ“– Read

via "National Vulnerability Database".
7 May 2019
?
06:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Weekly review – the hot 25 stories of last week ⚠

From malware-stuffed piracy apps to the Docker breach, get yourself up to date with everything we wrote last week - it's roundup time.

πŸ“– Read

via "Naked Security".
?
06:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Blockchain project settles cross-border payment ⚠

Singapore’s central bank sent a payment to Canada using blockchain technology last week, in a clear signal that the technology has value.

πŸ“– Read

via "Naked Security".
07:02
⚠ Dark web marketplace Wall Street Market busted by international police ⚠

It went down in flames, with a rogue admin blackmailing vendors and buyers and leaking login credentials and the IP address.

πŸ“– Read

via "Naked Security".
07:12
⚠ Firefox add-ons with obfuscated code will be banned by Mozilla ⚠

The updated Add-on Policy aims to rid Firefox of third-party malicious code that hides what it's really up to.

πŸ“– Read

via "Naked Security".
?
09:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russian Nation-State Group Employs Custom Backdoor for Microsoft Exchange Server πŸ•΄

Turla hacking team abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization's messages.

πŸ“– Read

via "Dark Reading: ".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Better Behavior, Better Biometrics? πŸ•΄

Behavioral biometrics is a building block to be used in conjunction with other security measures, but it shows promise.

πŸ“– Read

via "Dark Reading: ".
?
12:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ MegaCortex ransomware distracts victims with Matrix film references ⚠

One moment, the defenders’ network looked secure but the next, as if out of nowhere, the ransom note pops up.

πŸ“– Read

via "Naked Security".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ukrainian Charged With Launching 100 Million Malicious Ads ❌

Oleksii Petrovich Ivanov has been extradited in the U.S. after allegedly launching malvertising campaigns that caused victims to view malicious ads on more than 100 million occasions.

πŸ“– Read

via "Threatpost".
12:46
πŸ” 90% of data breaches in US occur in New York and California πŸ”

Half a billion records have been exposed in total, with over 86 breaches affecting the two states since January, according to Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
?
14:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak ❌

Forensic analysis shows a Chinese APT using Equation Group hacking tools at least a year before Shadow Brokers dumped its cache in April 2017.

πŸ“– Read

via "Threatpost".
?
15:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Big E-Crime Pivot πŸ•΄

Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.

πŸ“– Read

via "Dark Reading: ".
15:22
πŸ” Trade Secret Theft Victim Wins $845 Million πŸ”

While very little money will change hands, the sum is believed to be one of the largest judgments for the theft of trade secrets in U.S. history.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Dark Web is Smaller Than You Think πŸ•΄

The number of live, accessible .onion sites amounts to less than 0.005% of surface web domains, researchers report.

πŸ“– Read

via "Dark Reading: ".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US States with the Worst Consumer Cyber-Hygiene πŸ•΄

Ranking based on consumers' cybersecurity practices - or lack thereof.

πŸ“– Read

via "Dark Reading: ".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How a Chinese Nation-State Group Reversed-Engineered NSA Attack Tools πŸ•΄

New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.

πŸ“– Read

via "Dark Reading: ".
16:54
πŸ•΄ How a Chinese Nation-State Group Reversed-Engineered NSA Attack Tools πŸ•΄

New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.

πŸ“– Read

via "Dark Reading: ".
?
17:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to enable BitLocker on non-TPM Macs πŸ”

It's easy to add Microsoft's drive encrypting BitLocker protection to your non-TPM enabled Mac computers hosting Windows via Boot Camp or third-party VM.

πŸ“– Read

via "Security on TechRepublic".
?
17:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-14485

BlogEngine.NET 3.3 allows XXE attacks via the POST body to metaweblog.axd.

πŸ“– Read

via "National Vulnerability Database".
17:28
ATENTIONβ€Ό New - CVE-2018-14478 (coppermine_photo_gallery)

ecard.php in Coppermine Photo Gallery (CPG) 1.5.46 has XSS via the sender_name, recipient_email, greetings, or recipient_name parameter.

πŸ“– Read

via "National Vulnerability Database".
17:28
ATENTIONβ€Ό New - CVE-2018-13994

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a denial-of-service attack by making more than 120 connections.

πŸ“– Read

via "National Vulnerability Database".
17:28
ATENTIONβ€Ό New - CVE-2018-13993

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF.

πŸ“– Read

via "National Vulnerability Database".
17:28
ATENTIONβ€Ό New - CVE-2018-13992

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext transmission (HTTP) of user credentials by default.

πŸ“– Read

via "National Vulnerability Database".
17:28
ATENTIONβ€Ό New - CVE-2018-13991

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 leaks private information in firmware images.

πŸ“– Read

via "National Vulnerability Database".
17:34
πŸ•΄ Orgs Are Quicker to Disclose Breaches Reported to Them Via External Sources πŸ•΄

Companies that find a breach on their own take substantially longer to report a breach, a new analysis shows.

πŸ“– Read

via "Dark Reading: ".
17:43
❌ Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover ❌

Cisco has patched a critical flaw in its virtualized function automation tool, Cisco Elastic Services Controller.

πŸ“– Read

via "Threatpost".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Baltimore City Network Struck with Ransomware Attack πŸ•΄

Government employees are working to determine the source and severity of a cyberattack that forced most city servers offline.

πŸ“– Read

via "Dark Reading: ".
8 May 2019
?
07:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers’ Evil Clippy cloaks malicious Office macros ⚠

A team of security researchers has exploited Microsoft’s patchy macro documentation to hide malicious code inside innocent-looking macros.

πŸ“– Read

via "Naked Security".
?
07:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ School lunch company exec arrested for skewering rival’s site ⚠

The Choicelunch CFO is accused of hacking student data out of The LunchMaster's site and anonymously ratting it out for bad security.

πŸ“– Read

via "Naked Security".
?
08:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Malvertiser behind 100+ million bad ads indicted in the US ⚠

A Ukrainian and his gang allegedly smeared malvertising for 4.5 years and tried to rent out a botnet full of infected computers.

πŸ“– Read

via "Naked Security".
?
08:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Latest Android security updates, and Google to fix patch delays for Pixel ⚠

Google's May security update for Android is out – but will you be lucky enough to get it this week? If you own one of a Pixel device, then yes.

πŸ“– Read

via "Naked Security".
?
09:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cynet Provides Security Responders with Free IR Tool to Validate and Respond to Active Threats ❌

Cynet Free IR empowers its users with a solution that is accessible and easy to use, bringing crucial incident response services in-house, while saving them valuable time and resources.

πŸ“– Read

via "Threatpost".
?
09:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Top 5 Configuration Mistakes That Create Field Days for Hackers ❌

Having appropriate security configurations requires your applications, servers and databases to be hardened in accordance with best practices.

πŸ“– Read

via "Threatpost".
09:46
πŸ” Are passwords obsolete? 5 things that could replace them πŸ”

Employees are still using "123456" and "qwerty" far too often. Here are five ID forms that could better protect the enterprise to consider on World Password Day.

πŸ“– Read

via "Security on TechRepublic".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Fine Line of Feedback: 6 Tips for Talking to Security Pros πŸ•΄

Feedback is a two-way street in terms of giving, receiving, and knowing how to give and receive.

πŸ“– Read

via "Dark Reading: ".
?
13:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise ❌

Cloud misconfigurations, business email compromise (BEC) and intellectual property theft are all up in the Verizon DBIR 2019 from last year.

πŸ“– Read

via "Threatpost".
13:08
❌ Google Touts Android Q’s New Security Update Process and Better Privacy Controls for Apps ❌

At Google I/O, the tech giant announced it is beefing up security in phones with its latest Android Q operating system by offering direct updates and privacy controls.

πŸ“– Read

via "Threatpost".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Americans overestimate their online safety, despite putting forward little effort πŸ”

A survey of 10,000 Americans found that 90% believe they are doing enough to protect themselves online, though less than half are even doing the bare minimum.

πŸ“– Read

via "Security on TechRepublic".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Lax Telco Security Allows Mobile Phone Hijacking and Redirects ❌

A Q&A with Kaspersky Lab researcher David Jacoby examines a gaping hole in the telco customer-service process that allows adversaries to commandeer phone calls.

πŸ“– Read

via "Threatpost".
?
14:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Patches Critical Remote Code-Execution Flaws in Android ❌

The Android security update patches 15 bugs, four rated critical, 10 rated high and one ranked moderate in severity.

πŸ“– Read

via "Threatpost".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Fix on the way for Google Chrome flaw allowing malicious websites to break back button πŸ”

Google Chrome users have complained for years about how browser handles history, allowing malicious websites to inhibit back button usage.

πŸ“– Read

via "Security on TechRepublic".
15:09
πŸ•΄ FBI: Cybercrime Losses Doubled in 2018 πŸ•΄

The world has embraced digital technology, but cybercrime is putting a serious dent in corporate finances, the FBI finds.

πŸ“– Read

via "Dark Reading: ".
?
15:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Today's most innovative enterprise solutions πŸ”

Max Wessel spoke with TechRepublic at the 2019 SAP SAPPHIRE NOW conference about the most beneficial enterprise solutions organizations should be using.

πŸ“– Read

via "Security on TechRepublic".
?
16:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cyberespionage, Social Engineering, Misconfiguration Errors Culprits in Verizon's 2019 Data Breach Report πŸ”

The latest edition of the report analyzed over 40,000 security incidents to identify trends and changes by threat actors.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create an SSH jailed user on Debian 9 πŸ”

Learn how to limit what SSH users can do by jailing them with the help of Jailkit.

πŸ“– Read

via "Security on TechRepublic".
16:47
πŸ” How to securely delete files in Linux with SRM πŸ”

Don't entrust the deletion of sensitive data to the standard tools. Install this handy data wipe command for more secure removal.

πŸ“– Read

via "Security on TechRepublic".
?
17:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Social Engineering Slams the C-Suite: Verizon DBIR πŸ•΄

Criminals are also going after cloud-based email accounts, according to Verizon's '2019 Data Breach Investigations Report.'

πŸ“– Read

via "Dark Reading: ".
?
17:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Airbnb Superhost Secretly Recorded Guests with Hidden Bedroom Camera ❌

The incident is only the latest in a string of disturbing horror stories of guests finding live, recording cameras hidden in their Airbnb flats.

πŸ“– Read

via "Threatpost".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DeepDotWeb Operators Indicted, Website Seized by the FBI πŸ•΄

Defendants allegedly earned kickbacks for sales of illegal contraband, including hacking tools and malicious code.

πŸ“– Read

via "Dark Reading: ".
?
18:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 2018 Arrests Have Done Little to Stop Marauding Threat Group πŸ•΄

In fact, FIN7's activities only appear to have broadened, according to a new report.

πŸ“– Read

via "Dark Reading: ".
9 May 2019
?
05:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to work with Protected View in Microsoft Office πŸ”

Microsoft's Protected View feature tries to protect you against potentially malicious files and documents. Here's how to use it.

πŸ“– Read

via "Security on TechRepublic".
?
09:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to use the Tor browser on an Android device πŸ”

Tor can safeguard your browsing activities on an Android device via a new app in alpha release. Here's how to use and tweak it.

πŸ“– Read

via "Security on TechRepublic".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create an SSH jailed user on Debian 9 πŸ”

Learn how to limit what SSH users can do by jailing them with the help of Jailkit.

πŸ“– Read

via "Security on TechRepublic".
10:41
πŸ” Only 9% of companies warn employees about IoT risks πŸ”

Data breaches caused by unsecured Internet of Things devices increased to 26% this year, according to a Ponemon Institute report.

πŸ“– Read

via "Security on TechRepublic".
10:41
πŸ” 5 quick SSH hardening tips πŸ”

If you make use of Secure Shell, you'll want to run down this checklist of five quick tips to make that Linux server a bit more secure.

πŸ“– Read

via "Security on TechRepublic".
10:47
⚠ Chrome plans to save you from sites that mess with your back button ⚠

Has your back button ever mysteriously stopped working?

πŸ“– Read

via "Naked Security".
?
11:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ DeepDotWeb seized, suspected admins arrested ⚠

The suspected admins of the DeepDotWeb site are alleged to have sent buyers to illegal markets in exchange for millions in kickbacks.

πŸ“– Read

via "Naked Security".
11:27
πŸ” Security Alphabet Soup πŸ”

There is no shortage of unique terms and acronyms within the cybersecurity industry. In many ways, security has a language of its own. This guide lists more than 40 of the most common cybersecurity acronyms, serving as a resource for beginners and a reference guide for those with more experience. Terms are listed in alphabetical order for ease-of-use.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
11:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ CSS tracking trick can monitor your mouse without JavaScript ⚠

A security researcher has demonstrated a new way to track mouse movements even if users block JavaScript.

πŸ“– Read

via "Naked Security".
11:44
πŸ•΄ Fighting Back Against Tech-Savvy Fraudsters πŸ•΄

Staying a step ahead requires moving beyond the security techniques of the past.

πŸ“– Read

via "Dark Reading: ".
11:53
⚠ Metal keys beat smart locks in NYC legal battle ⚠

A group of tenants in New York City have prevailed in a lawsuit against their landlord's use of smart locks.

πŸ“– Read

via "Naked Security".
11:53
❌ Researchers in the Dark on Powerful LightNeuron Malware for Years ❌

LightNeuron is the first to target Microsoft Exchange transport agents -- and is used as a hub for major Turla APT espionage efforts.

πŸ“– Read

via "Threatpost".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Sectigo Buys Icon Labs to Expand IoT Security Platform πŸ•΄

End-to-end IoT security product aims to give manufacturers, systems integrators, and businesses a means to harden device security.

πŸ“– Read

via "Dark Reading: ".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Companies moving to the cloud still ignore security concerns πŸ”

Nine in 10 cloud breaches occur due to employee mistakes, according to a Kaspersky Lab report.

πŸ“– Read

via "Security on TechRepublic".
13:07
❌ Serious Phar Flaw Allows Arbitrary Code Execution on Drupal ❌

Drupal, Typo3 and Joomla are all impacted by the bug.

πŸ“– Read

via "Threatpost".
?
13:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-12788

Multiple cross-site scripting (XSS) vulnerabilities in admin/index.php in Metinfo 5.3.18 allows remote attackers to inject arbitrary web script or HTML via the (1) class1 parameter or the (2) anyid parameter.

πŸ“– Read

via "National Vulnerability Database".
?
13:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Sextortion mail from yourself? It doesn’t mean you’ve been hacked… ⚠

Here's a 30-second video you can show your friends and family if they freak out after receiving a scam email apparently from themselves...

πŸ“– Read

via "Naked Security".
14:10
πŸ” On-device speech recognition may make smart assistants more appealing πŸ”

Google unveiled the next-generation Google Assistant at I/O 2019, featuring an on-device speech recognition model-bypassing the need to upload voice samples to cloud systems.

πŸ“– Read

via "Security on TechRepublic".
14:12
❌ Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked ❌

Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password.

πŸ“– Read

via "Threatpost".
?
15:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-12839

A heap-based buffer over-read in the getbits function in src/libmpg123/getbits.h in mpg123 through 1.25.5 allows remote attackers to cause a possible denial-of-service (out-of-bounds read) or possibly have unspecified other impact via a crafted mp3 file.

πŸ“– Read

via "National Vulnerability Database".
15:26
ATENTIONβ€Ό New - CVE-2017-12806

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2017-12805

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2017-12804 (imageworsener)

The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2017-12790

Metinfo 5.3.18 is affected by: Cross Site Request Forgery (CSRF). The impact is: Information Disclosure (remote). The component is: admin/index.php. The attack vector is: The administrator clicks on the malicious link in the login state.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2017-12778

The UI Lock feature in qBittorrent version 3.3.15 is vulnerable to Authentication Bypass, which allows Attack to gain unauthorized access to qBittorrent functions by tampering the affected flag value of the config file at the C:\Users\<username>\Roaming\qBittorrent pathname. The attacker must change the value of the "locked" attribute to "false" within the "Locking" stanza.

πŸ“– Read

via "National Vulnerability Database".
15:35
πŸ•΄ How to Close the Critical Cybersecurity Talent Gap πŸ•΄

If we don't change our ways, the gap will keep getting worse. Outside-the-box thinking and new techniques are required, and here are a few ways to get started.

πŸ“– Read

via "Dark Reading: ".
?
16:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How the Skills Gap Strains - and Constrains - Security Pros πŸ•΄

New ISSA/ESG survey underscores increasing pressures and security fallout of a strapped security team.

πŸ“– Read

via "Dark Reading: ".
16:17
πŸ” News Roundup: Microsoft Build, Google I/O, and Sapphire πŸ”

Karen Roby gives us a snapshot of the news covered this week on TechRepublic and ZDNet. The stories include 3 major conferences, a telecommunications data breach and a look at the amount of CIO's implementing AI.

πŸ“– Read

via "Security on TechRepublic".
16:17
πŸ” News Roundup: Microsoft Build, Google I/O, Sapphire πŸ”

Karen Roby gives us a snapshot of the news covered this week on TechRepublic and ZDNet. The stories include 3 major conferences, a telecommunications data breach and a look at the amount of CIO's implementing AI.

πŸ“– Read

via "Security on TechRepublic".
16:18
❌ Hackers Take Over IoT Devices to β€˜Click’ on Ads ❌

A video interview and Q&A with IoT specialist Dan Demeter of Kaspersky Lab.

πŸ“– Read

via "Threatpost".
16:26
πŸ” Cybersecurity burnout: 10 most stressful parts of the job πŸ”

The cybersecurity skills shortage has gotten worse for the third consecutive year, according to the Information Systems Security Association.

πŸ“– Read

via "Security on TechRepublic".
16:35
πŸ•΄ New Initiative Aims to Fast-Track Women into Cybersecurity Careers πŸ•΄

'100 Women in 100 Days' is a career development program made possible by a $160,000 gift from Craig Newmark Philanthropies.

πŸ“– Read

via "Dark Reading: ".
?
17:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-12761

http://codecanyon.net/user/Endober WebFile Explorer 1.0 is affected by: SQL Injection. The impact is: Arbitrary File Download (remote). The component is: $file = $_GET['id'] in download.php. The attack vector is: http://speicher.example.com/envato/codecanyon/demo/web-file-explorer/download.php?id=WebExplorer/../config.php.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2017-12760

Ynet Interactive - http://demo.ynetinteractive.com/mobiketa/ Mobiketa 4.0 is affected by: SQL Injection. The impact is: Code execution (remote).

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2017-12759

Ynet Interactive - http://demo.ynetinteractive.com/soa/ SOA School Management 3.0 is affected by: SQL Injection. The impact is: Code execution (remote).

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2017-12758 (component_appointment)

https://www.joomlaextensions.co.in/ Joomla! Component Appointment 1.1 is affected by: SQL Injection. The impact is: Code execution (remote). The component is: com_appointment component.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2017-12757

Certain Ambit Technologies Pvt. Ltd products are affected by: SQL Injection. This affects iTech B2B Script 4.42i and Tech Business Networking Script 8.26i and Tech Caregiver Script 2.71i and Tech Classifieds Script 7.41i and Tech Dating Script 3.40i and Tech Freelancer Script 5.27i and Tech Image Sharing Script 4.13i and Tech Job Script 9.27i and Tech Movie Script 7.51i and Tech Multi Vendor Script 6.63i and Tech Social Networking Script 3.08i and Tech Travel Script 9.49. The impact is: Code execution (remote).

πŸ“– Read

via "National Vulnerability Database".
?
18:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Chinese Hackers Behind 2015 Anthem Data Breach Indicted ❌

Two have been indicted in the 2015 massive data breach of health insurer Anthem, which compromised the data of at least 78 million customers.

πŸ“– Read

via "Threatpost".
18:12
❌ β€˜Unhackable’ Biometric USB Offers Up Passwords in Plain Text ❌

A simple Wireshark analysis was enough to subvert the gadget, which uses iris identification to protect the drive.

πŸ“– Read

via "Threatpost".
?
18:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Nation-State Breaches Surged in 2018: Verizon DBIR πŸ•΄

The source of breaches has fluctuated significantly over the past nine years, but organized crime has almost always topped nation-state actors each year. The gap narrowed significantly in 2018, according to the annual report.

πŸ“– Read

via "Dark Reading: ".
?
19:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US DoJ Indicts Chinese Man for Anthem Breach πŸ•΄

Fujie Wang allegedly worked as part of a hacking team out of China that stole information on nearly 80 million Americans in the massive healthcare breach.

πŸ“– Read

via "Dark Reading: ".
?
19:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-1600

The ServiceNow driver in NetIQ Identity Manager versions prior to 4.6 are susceptible to an information disclosure vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
23:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Data Dump Purportedly Reveals Details on Previously Unknown Iranian Threat Group πŸ•΄

Rana targets airline companies and others in well-planned, well-researched attacks, Israel's ClearSky says.

πŸ“– Read

via "Dark Reading: ".
10 May 2019
?
06:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Airbnb Superhost’s creepy spycam sniffed out by sleuthing infosec pro ⚠

Why motion sensors in the bedrooms, she wondered? Why the extra light and weird wiring on the router?

πŸ“– Read

via "Naked Security".
?
07:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FTC renews call for single federal privacy law ⚠

It also wants to be the country's data-privacy police: commissioners called for more resources and ability to impose penalties.

πŸ“– Read

via "Naked Security".
07:23
⚠ 275m personal records swiped from exposed MongoDB database ⚠

Records included not only the individuals’ name and email address but also their employment history, salary, and phone number.

πŸ“– Read

via "Naked Security".
?
09:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ThreatList: Nigerian Cybercrime Surged 54 Percent in 2018 ❌

Nigerian scam groups launched even more attacks in 2018 - and used more complex types of malware to reach more victims.

πŸ“– Read

via "Threatpost".
?
10:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Bumper Crop of New Briefings Added for Black Hat USA πŸ•΄

Among the 50+ new Briefings confirmed for this August event are a deep dive into the Apple T2 chip and a pile of lessons learned from the Equifax and Home Depot breaches.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Hackers Still Outpace Breach Detection, Containment Efforts πŸ•΄

Research shows time to discovery and containment of breaches slowly shrinking, but attackers don't need a very big window to do a lot of damage.

πŸ“– Read

via "Dark Reading: ".
?
10:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Half of employees think the cloud is actually in the sky, according to a third of IT workers πŸ”

It's not a secret that IT professionals--particularly first-tier tech support--have a low opinion of users, though a new survey paints a rather bleak picture.

πŸ“– Read

via "Security on TechRepublic".
?
10:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Symantec CEO Greg Clark Steps Down πŸ•΄

Exec shake-up comes amid earnings drop in financial report.

πŸ“– Read

via "Dark Reading: ".
11:06
πŸ•΄ How We Collectively Can Improve Cyber Resilience πŸ•΄

Three steps you can take, based on Department of Homeland Security priorities.

πŸ“– Read

via "Dark Reading: ".
11:09
⚠ Chrome browser pushes SameSite cookie security overhaul ⚠

Slowly but steadily, developers are being given the tools with which to tame the promiscuous and often insecure world of the browser cookie.

πŸ“– Read

via "Naked Security".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 5/10 Edition πŸ”

A dark web service takedown, Google gets better about data privacy, and another city hit by ransomware - catch up on the week's news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
12:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Nvidia Warns Windows Gamers on GPU Driver Flaws ❌

Nvidia has patched three vulnerabilities in its Windows GPU display driver that could enable information disclosure, denial of service and privilege escalation.

πŸ“– Read

via "Threatpost".
?
13:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-12885

OX Software GmbH App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
13:32
ATENTIONβ€Ό New - CVE-2017-12795

OpenMRS openmrs-module-htmlformentry 3.3.2 is affected by: (Improper Input Validation).

πŸ“– Read

via "National Vulnerability Database".
13:32
ATENTIONβ€Ό New - CVE-2017-12789

Metinfo 5.3.18 is affected by: Cross Site Request Forgery (CSRF). The impact is: Information Disclosure (remote). The component is: admin/interface/online/delete.php. The attack vector is: The administrator clicks on the malicious link in the login state.

πŸ“– Read

via "National Vulnerability Database".
13:32
ATENTIONβ€Ό New - CVE-2015-1006

A vulnerable file in Opto 22 PAC Project Professional versions prior to R9.4006, PAC Project Basic versions prior to R9.4006, PAC Display Basic versions prior to R9.4f, PAC Display Professional versions prior to R9.4f, OptoOPCServer versions prior to R9.4c, and OptoDataLink version R9.4d and prior versions that were installed by PAC Project installer, versions prior to R9.4006, is susceptible to a heap-based buffer overflow condition that may allow remote code execution on the target system. Opto 22 suggests upgrading to the new product version as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
?
13:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The WannaCry Security Legacy and What’s to Come ❌

The WannaCry attack proved pivotal, changing the way organizations go about securing their environments.

πŸ“– Read

via "Threatpost".
?
14:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft SharePoint Bug Exploited in the Wild πŸ•΄

A number of reports show CVE-2019-0604 is under active attack, Alien Labs researchers say.

πŸ“– Read

via "Dark Reading: ".
?
15:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-12884

OX Software GmbH App Suite 7.8.4 and earlier is affected by: Information Exposure.

πŸ“– Read

via "National Vulnerability Database".
?
15:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: Facebook Regulation, Verizon DBIR, Hidden Airbnb Cameras ❌

From a creepy Airbnb incident to Verizon's Data Breach Investigations Report, Threatpost editors break down the top privacy and security stories for the week ended May 10.

πŸ“– Read

via "Threatpost".
?
16:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Demystifying the Dark Web: What You Need to Know πŸ•΄

The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.

πŸ“– Read

via "Dark Reading: ".
?
18:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FIN7 Linked to Escalating Active Exploits for Microsoft SharePoint Bug ❌

Using a bug patched in March, the attacks are starting to ramp up worldwide.

πŸ“– Read

via "Threatpost".
13 May 2019
?
05:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 18 stories of the week ⚠

From spying Airbnb creeps to the CSS trick that tracks your mouse movements - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
07:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Break up Facebook, cofounder says: it’s an un-American monopoly ⚠

During the 2018 "annus horribilis", users disgusted at privacy flops swore to dump Facebook. But where else is there to go?

πŸ“– Read

via "Naked Security".
?
07:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Study finds Android smartphones riddled with suspect β€˜bloatware’ ⚠

According to a new study, Android bloatware can create hidden security and privacy risks.

πŸ“– Read

via "Naked Security".
?
08:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Two Chinese hackers indicted for massive Anthem breach ⚠

They're part of a gang that spearphished millions of records out of the health insurer and other businesses, the DOJ says.

πŸ“– Read

via "Naked Security".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 challenges keeping IT pros up at night πŸ”

IT professionals face a slew of concerns in today's connected ecosystem, according to an Insight Enterprises report.

πŸ“– Read

via "Security on TechRepublic".
11:26
ATENTIONβ€Ό New - CVE-2018-12303

Cross-site scripting in filebrowser in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via directory names.

πŸ“– Read

via "National Vulnerability Database".
11:26
ATENTIONβ€Ό New - CVE-2018-12302

Missing HTTPOnly flag on session cookies in the Seagate NAS OS version 4.3.15.1 web application allows attackers to steal session tokens via cross-site scripting.

πŸ“– Read

via "National Vulnerability Database".
11:26
ATENTIONβ€Ό New - CVE-2018-12301

Unvalidated URL in Download Manager in Seagate NAS OS version 4.3.15.1 allows attackers to access the loopback interface via a Download URL of 127.0.0.1 or localhost.

πŸ“– Read

via "National Vulnerability Database".
11:26
ATENTIONβ€Ό New - CVE-2018-12300

Arbitrary Redirect in echo-server.html in Seagate NAS OS version 4.3.15.1 allows attackers to disclose information in the Referer header via the 'state' URL parameter.

πŸ“– Read

via "National Vulnerability Database".
11:26
ATENTIONβ€Ό New - CVE-2018-12299

Cross-site scripting in filebrowser in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via uploaded file names.

πŸ“– Read

via "National Vulnerability Database".
11:26
ATENTIONβ€Ό New - CVE-2018-12298

Directory Traversal in filebrowser in Seagate NAS OS 4.3.15.1 allows attackers to read files within the application's container via a URL path.

πŸ“– Read

via "National Vulnerability Database".
11:26
ATENTIONβ€Ό New - CVE-2018-12297

Cross-site scripting in API error pages in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via URL path names.

πŸ“– Read

via "National Vulnerability Database".
11:26
ATENTIONβ€Ό New - CVE-2018-12296

Insufficient access control in /api/external/7.0/system.System.get_infos in Seagate NAS OS version 4.3.15.1 allows attackers to obtain information about the NAS without authentication via empty POST requests.

πŸ“– Read

via "National Vulnerability Database".
11:26
ATENTIONβ€Ό New - CVE-2018-12295

SQL injection in folderViewSpecific.psp in Seagate NAS OS version 4.3.15.1 allows attackers to execute arbitrary SQL commands via the dirId URL parameter.

πŸ“– Read

via "National Vulnerability Database".
11:40
πŸ•΄ How Open Testing Standards Can Improve Security πŸ•΄

When creating security metrics, it's critical that test methodologies cover multiple scenarios to ensure that devices perform as expected in all environments.

πŸ“– Read

via "Dark Reading: ".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to use SFTP with a chroot jail πŸ”

Lock down all SFTP users on your data center Linux servers with a chroot jail.

πŸ“– Read

via "Security on TechRepublic".
?
13:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-6652

Directory traversal vulnerability in pageflipbook.php script from index.php in Page Flip Book plugin for WordPress (wppageflip) allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the pageflipbook_language parameter.

πŸ“– Read

via "National Vulnerability Database".
13:45
❌ ThreatList: Top 5 Most Dangerous Attachment Types ❌

From ZIP attachments spreading Gandcrab, to DOC files distributing Trickbot, researchers tracked five widescale spam campaigns in 2019 that have made use of malicious attachments.

πŸ“– Read

via "Threatpost".
13:50
❌ ScarCruft APT Adds Bluetooth Harvester to its Malware Bag of Tricks ❌

In its latest observed campaign, there were also overlaps in victimology with the DarkHotel APT.

πŸ“– Read

via "Threatpost".
?
15:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 78% of Consumers Say Online Companies Must Protect Their Info πŸ•΄

Yet 68% of US consumers agree they also must do more to protect their own information.

πŸ“– Read

via "Dark Reading: ".
15:20
πŸ•΄ Poorly Configured Server Exposes Most Panama Citizens' Data πŸ•΄

Compromised information includes full names, birth dates, national ID numbers, medical insurance numbers, and other personal data.

πŸ“– Read

via "Dark Reading: ".
15:31
ATENTIONβ€Ό New - CVE-2015-9287

Directory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field ("kid") of the IdP's HTTP response message ("WLS-Response") can be manipulated by an attacker. The "kid" field is not signed like the rest of the message, and manipulation is therefore trivial. The "kid" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.

πŸ“– Read

via "National Vulnerability Database".
?
15:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” FTC Backs Federal Privacy Law As Long As It Can Enforce It πŸ”

The FTC told Congress last week that if a national privacy law gets passed, it wants more resources and greater authority to impose penalties under it.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attacks on JavaScript Services Leak Info From Websites πŸ•΄

Three marketing tools, including the Best Of The Web security logomark, were compromised in supply chain attacks, allegedly leaving website customers leaking their users' sensitive information.

πŸ“– Read

via "Dark Reading: ".
?
18:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Twitter Leaks Apple iOS Users’ Location Data to Ad Partner ❌

A Twitter glitch "inadvertently" leaked iOS users' location data to an unnamed partner.

πŸ“– Read

via "Threatpost".
?
18:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ LockerGoga, MegaCortex Ransomware Share Unlikely Traits πŸ•΄

New form of ransomware MegaCortex shares commonalities with LockerGoga, enterprise malware recently seen in major cyberattacks.

πŸ“– Read

via "Dark Reading: ".
?
19:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Pair of Cisco Bugs, One Unpatched, Affect Millions of Devices ❌

The two high-severity bugs impact a wide array of enterprise, military and government networks.

πŸ“– Read

via "Threatpost".
19:30
πŸ•΄ Thrangrycat Claws Cisco Customer Security πŸ•΄

A linked pair of vulnerabilities could allow an attacker to take over many different types of Cisco networking components.

πŸ“– Read

via "Dark Reading: ".
19:30
πŸ•΄ Korean APT Adds Rare Bluetooth Device-Harvester Tool πŸ•΄

ScarCruft has evolved into a skilled and resourceful threat group, new research shows.

πŸ“– Read

via "Dark Reading: ".
14 May 2019
?
07:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Feds hook ELECTRICFISH, new Windows malware from North Korea ⚠

The FBI and Department of Homeland Security have identified a new strain of malware from North Korea, representing the latest in a long line of cyber attacks from the country

πŸ“– Read

via "Naked Security".
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Windows 10 brings password-free access another step closer ⚠

Microsoft has put another nail in the password’s coffin by winning a certification that will make it easier to log into Windows machines.Β 

πŸ“– Read

via "Naked Security".
07:54
⚠ White label SOS panic buttons can be hacked via SMS ⚠

A Chinese white-label panic alarm used by elderly and vulnerable people can be remotely controlled by sending it simple SMS commands.

πŸ“– Read

via "Naked Security".
?
08:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
08:59
⚠ Update WhatsApp now! One call could give spies access to your phone ⚠

A WhatsApp zero-day has allowed an β€œadvanced cyber actor” to successfully install spyware on victims' phones with no more than a phone call.

πŸ“– Read

via "Naked Security".
09:10
❌ Cynet: An Autonomous Security Platform for Any Size Organization ❌

Cynet Β protects the entire internal environment – including hosts, files, users and the network.

πŸ“– Read

via "Threatpost".
?
10:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WhatsApp Zero-Day Exploited in Targeted Spyware Attacks ❌

WhatsApp has patched a vulnerability that allowed attackers to install spyware on victims' phones.

πŸ“– Read

via "Threatpost".
?
11:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to securely delete files in Linux with srm πŸ”

Don't entrust the deletion of sensitive data to the standard tools. Install this handy data wipe command for a more secure removal.

πŸ“– Read

via "Security on TechRepublic".
?
11:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Slack vulnerability allows attackers to intercept, modify downloads πŸ”

Improper handling of a custom URI creates a vulnerability for users of the Slack Desktop client on Windows.

πŸ“– Read

via "Security on TechRepublic".
11:40
πŸ•΄ Why AI Will Create Far More Jobs Than It Replaces πŸ•΄

Just as spreadsheets and personal computers created a job boom in the '70s, so too will artificial intelligence spur security analysts' ability to defend against advanced threats.

πŸ“– Read

via "Dark Reading: ".
?
12:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Linux Kernel Flaw Allows Remote Code-Execution ❌

The bug is remotely exploitable without authentication or user interaction.

πŸ“– Read

via "Threatpost".
?
13:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Effective Pen Tests Follow These 7 Steps πŸ•΄

Third-party pen tests are part of every comprehensive security plan. Here's how to get the most from this mandatory investment.

πŸ“– Read

via "Dark Reading: ".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Adobe Addresses Critical Adobe Flash Player, Acrobat Reader Flaws ❌

Adobe has issued patches for 87 vulnerabilities on Patch Tuesday - the bulk of which exist in Adobe's Acrobat and Reader product.

πŸ“– Read

via "Threatpost".
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intel CPUs Impacted By New Class of Spectre-Like Attacks ❌

Intel has disclosed a new class of speculative execution side channel attacks.

πŸ“– Read

via "Threatpost".
15:10
πŸ•΄ Missing in Action: Cybersecurity Professionals πŸ•΄

Just as every organization security team's needs are unique, so are the reasons for the shortage of candidates for open positions. Here are five strategies to help you close the gap.

πŸ“– Read

via "Dark Reading: ".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” $3M HIPAA Settlement, First of 2019, in the Books πŸ”

It took five months but the Office for Civil Rights' first HIPAA settlement of the year, $3M, stems from a breach involving an unsecured FTP server.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Patches Wormable Vuln in Windows 7, 2003, XP, Server 2008 πŸ•΄

Microsoft releases security updates for some out-of-support systems to fix a bug that could be weaponized as a worm if exploited.

πŸ“– Read

via "Dark Reading: ".
?
17:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Patches Intel Side-Channel Bugs; Updates iOS, macOS and More ❌

A massive update addresses the breadth of the computing giant's product portfolio.

πŸ“– Read

via "Threatpost".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Patches Zero-Day Bug Under Active Attack ❌

Microsoft Patch Tuesday security bulletin tackles 22 critical vulnerabilities.

πŸ“– Read

via "Threatpost".
18:01
πŸ•΄ Baltimore Ransomware Attack Takes Strange Twist πŸ•΄

Tweet suggests possible screenshot of stolen city documents and credentials in the wake of attack that took down city servers last week.

πŸ“– Read

via "Dark Reading: ".
?
18:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Uniqlo Parent Company Says Hack Compromised 461,091 πŸ•΄

Fast Retailing Co. reports cyberattackers accessed accounts registered to its Japanese Uniqlo and GU brand websites.

πŸ“– Read

via "Dark Reading: ".
18:55
πŸ•΄ Commercial Spyware Uses WhatsApp Flaw to Infect Phones πŸ•΄

A single flaw allowed attackers - thought to be linked to a government - to target human rights workers and install surveillance software by sending a phone request. The victims did not even have to answer.

πŸ“– Read

via "Dark Reading: ".
18:55
πŸ•΄ Resolution Requires Cybersecurity Training for Members of Congress πŸ•΄

A bipartisan resolution would mandate IT and cybersecurity training for all members of Congress, their staff, and employees.

πŸ“– Read

via "Dark Reading: ".
?
19:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Website Attack Attempts Rose by 69% in 2018 πŸ•΄

Millions of websites have been compromised, but the most likely malware isn't cyptomining: it's quietly stealing files and redirecting traffic, a new Sitelock report shows.

πŸ“– Read

via "Dark Reading: ".
15 May 2019
?
07:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook sues app developer Rankwave over data misuse ⚠

The suit says Rankwave used Facebook user data for targeted marketing and ignored its cease-and-desist letter.

πŸ“– Read

via "Naked Security".
07:49
⚠ Update iOS and Mojave now! Apple patches are out ⚠

Apple has released its May 2019 security updates, taking iOS to version 12.3 and macOS Mojave to version 10.14.5.

πŸ“– Read

via "Naked Security".
07:54
⚠ Twitter bug leaks to iOS users’ location data to partner ⚠

Now fixed, the bug affected some users with multiple accounts running on an iOS device.

πŸ“– Read

via "Naked Security".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create a business-driven cybersecurity strategy: 3 tips πŸ”

Companies achieve better results with a business-driven cybersecurity strategy, according to new survey results from consulting firm PwC.

πŸ“– Read

via "Security on TechRepublic".
09:14
⚠ Microsoft fixes Intel ZombieLoad bug with Patch Tuesday updates ⚠

May 2019 Patch TuesdayΒ fixed 79 vulnerabilities, 19 of which are classed as Critical. Here's a summary of the most notable ones.Β 

πŸ“– Read

via "Naked Security".
09:14
⚠ UPDATE NOW! Critical, remote, β€˜wormable’ Windows vulnerability ⚠

Microsoft has fixed an RDP vulnerability that can be exploited remotely, without authentication and used to run arbitrary code.

πŸ“– Read

via "Naked Security".
?
10:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Brush Up on the Latest Security Techniques at Black Hat USA πŸ•΄

Learn to set malware lures, pinpoint unintentional but identifying human behaviors, and detect industrial control system attacks via sensor noise.

πŸ“– Read

via "Dark Reading: ".
10:14
πŸ” Why cybersecurity pros want to share information to combat threats πŸ”

Security professionals are willing to share intel with their peers and the government if such sharing improved their ability to detect cyber threats, according to an IronNet survey.

πŸ“– Read

via "Security on TechRepublic".
?
11:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 71% of medical devices still run on Windows 7, Windows 2008, and Windows mobile πŸ”

Medical IoT devices carry significant cybersecurity risks, according to a Forescout report.

πŸ“– Read

via "Security on TechRepublic".
?
11:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Windows 10 Migration: Getting It Right πŸ•΄

The transition to Windows 10 doesn't need to be a sprint. Organizations can still take advantage of the security in Windows 7 while gaining added management flexibility from the newer OS.

πŸ“– Read

via "Dark Reading: ".
?
11:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Billions of Malicious Bots Take to Cipher-Stunting to Hide ❌

Attackers have been tampering with TLS signatures at a scale never before seen using a technique called cipher-stunting.

πŸ“– Read

via "Threatpost".
12:00
πŸ” How to create a secure website: 4 tips πŸ”

A major gap exists between the perception and reality of online security safety, according to Google Registry and The Harris Poll.

πŸ“– Read

via "Security on TechRepublic".
?
13:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-7151

Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86_insn_reg_intel in arch/X86/X86Mapping.c.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2016-10719

TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2014-9919

An issue was discovered in Bilboplanet 2.0. Stored XSS exists in the fullname parameter to signup.php.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2014-9918

An issue was discovered in Bilboplanet 2.0. Stored XSS exists in the user_id parameter to signup.php.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2014-9917

An issue was discovered in Bilboplanet 2.0. There is a stored XSS vulnerability when adding a tag via the user/?page=tribes tags parameter.

πŸ“– Read

via "National Vulnerability Database".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intel ZombieLoad Side-Channel Attack: 10 Takeaways ❌

Here are 10 top takeaways from Intel's most recent class of Spectre-like speculative execution vulnerabilities, disclosed this week.

πŸ“– Read

via "Threatpost".
14:06
πŸ•΄ Two Ransomware Recovery Firms Typically Pay Hackers πŸ•΄

Companies promising the safe return of data sans ransom payment secretly pass Bitcoin to attackers and charge clients added fees.

πŸ“– Read

via "Dark Reading: ".
?
14:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: Microsoft Office 365, Facebook scandal, and AI adoption πŸ”

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the highest paying internships for 2019.

πŸ“– Read

via "Security on TechRepublic".
14:54
πŸ” Tech news roundup: Microsoft Office 365, Facebook scandal, and AI adoption πŸ”

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the highest paying internships for 2019.

πŸ“– Read

via "Security on TechRepublic".
15:04
πŸ” Why MDS vulnerabilities present a threat as serious as Spectre and Meltdown πŸ”

Microarchitectural Data Sampling are CPU side-channel vulnerabilities that allow attackers to view in-flight data from CPU-internal buffers. Learn more about MDS attacks in this comprehensive guide.

πŸ“– Read

via "Security on TechRepublic".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Spectre and Meltdown explained: A comprehensive guide for professionals πŸ”

Staying up to date on Spectre and Meltdown can be challenging. This guide includes in-depth explanations about these uniquely dangerous security vulnerabilities and the best mitigation solutions.

πŸ“– Read

via "Security on TechRepublic".
15:33
ATENTIONβ€Ό New - CVE-2016-7043

It has been reported that KIE server and Busitess Central before version 7.21.0.Final contain username and password as plaintext Java properties. Any app deployed on the same server would have access to these properties, thus granting access to ther services.

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2013-7285

Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.

πŸ“– Read

via "National Vulnerability Database".
?
15:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Senate Bill Would Crackdown on IP Theft πŸ”

A new bill introduced in the Senate this week would restrict U.S. tech exports to China and crack down on intellectual property theft.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Introducing the Digital Transformation Architect πŸ•΄

Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.

πŸ“– Read

via "Dark Reading: ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Titan Security Key Recalled After Bluetooth Pairing Bug ❌

Google is offering free replacements for its Titan Security Key after discovering a misconfiguration in its pairing protocols.

πŸ“– Read

via "Threatpost".
?
17:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Builds on Decentralized Identity Vision πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Are Messing with Encryption Traffic to Evade Detection πŸ•΄

Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.

πŸ“– Read

via "Dark Reading: ".
19:41
πŸ•΄ New Intel Vulnerabilities Bring Fresh CPU Attack Dangers πŸ•΄

Four newly discovered vulns from the speculative-execution family bring Meltdown-like threats to Intel's processors.

πŸ“– Read

via "Dark Reading: ".
?
21:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ GDPR Drives Changes, but Privacy by Design Proves Elusive πŸ•΄

One year later, the EU mandate's biggest impact has been to focus more attention on data protection and privacy, security analysts say.

πŸ“– Read

via "Dark Reading: ".
16 May 2019
?
08:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cheat sheet: How to become a cybersecurity pro πŸ”

If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field.

πŸ“– Read

via "Security on TechRepublic".
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ San Francisco bans police use of facial recognition ⚠

The city that gave us facial recognition tech says "not in my back yard".

πŸ“– Read

via "Naked Security".
?
09:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Severe Linux kernel flaw found in RDS ⚠

Unpatched Linux systems are vulnerable to remote compromise from the local network.

πŸ“– Read

via "Naked Security".
10:02
⚠ Facebook restores disabled β€˜View As’ feature used in 2018 breach ⚠

The feature still lets you see how others see you, but without leaking access tokens.

πŸ“– Read

via "Naked Security".
10:09
❌ Cybercrime Gang Behind GozNym Banking Malware Dismantled ❌

Europol said it has dismantled the cybercrime network behind the GozNym malware, which siphoned more than $100 million from businesses.

πŸ“– Read

via "Threatpost".
?
10:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Service Provider, WebEx Bugs Offer Up Remote Code Execution ❌

The vendor also issued a patch schedule for the still-unpatched bug in its Secure Boot trusted hardware environment, which affects most of its enterprise and SMB portfolio, amounting to millions of vulnerable devices.

πŸ“– Read

via "Threatpost".
11:06
πŸ•΄ Cyber Workforce Exec Order: Right Question, Wrong Answer πŸ•΄

Shuffling resources, adding administrative process, and creating a competition and incentive system will do little to grow and mature the talent we need to meet the cybersecurity challenges we face.

πŸ“– Read

via "Dark Reading: ".
?
11:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Please vote for Naked Security at the European Blogger Awards 2018! ⚠

If you like what we do... please vote for us!

πŸ“– Read

via "Naked Security".
?
12:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” MDS vulnerabilities lead Chrome OS 74 to disable hyper-threading πŸ”

Hyper-Threading, Intel's implementation of symmetric multithreading (SMT) can be exploited using the newly-disclosed MDS vulnerabilities, like Fallout and ZombieLoad.

πŸ“– Read

via "Security on TechRepublic".
12:09
πŸ” Data Security Standard for the Insurance Industry Catching On πŸ”

Alabama is the latest state to adopt the Insurance Data Security Model Law, a legal framework that requires insurers to develop and implement an information security program and breach notification standards.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Forbes Becomes Latest Victim of Magecart Payment Card Skimmer ❌

The web skimming script was recently found stealing payment data on the websites of Forbes Magazine as well as seven others.

πŸ“– Read

via "Threatpost".
?
15:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mobile Risks Boom in a Post-Perimeter World ❌

The bloom is on mobile, whether it be the enterprise, employees or the cybercriminals plotting new ways to slip past a corporate defenses in a post-parameter world.

πŸ“– Read

via "Threatpost".
?
16:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Data Problem in Security πŸ•΄

CISOs must consider reputation, resiliency, and regulatory impact to establish their organization's guidelines around what data matters most.

πŸ“– Read

via "Dark Reading: ".
16:41
πŸ•΄ US Charges Members of GozNym Cybercrime Gang πŸ•΄

The FBI and counterparts from other nations say group infected over 41,000 computers with malware that steals banking credentials.

πŸ“– Read

via "Dark Reading: ".
?
17:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Executive Order Limits Certain Tech Sales, Hits Huawei Hard πŸ•΄

The executive order signed by President Trump bars the sale or installation of equipment seen to be controlled by hostile foreign governments and a threat to national security.

πŸ“– Read

via "Dark Reading: ".
?
18:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google to Replace Titan Security Keys Affected by Bluetooth Bug πŸ•΄

A misconfiguration in Bluetooth Titan Security Keys' pairing protocols could compromise users under specific circumstances.

πŸ“– Read

via "Dark Reading: ".
17 May 2019
?
07:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Trump seeks tales of social media bias – and your phone number ⚠

A tool from the White House invites those who suspect political bias in social media censorship to "share their story with President Trump."

πŸ“– Read

via "Naked Security".
07:52
⚠ Europol arrests end GozNym banking malware gang ⚠

Arrests in Europe and the US appear to have ended the cybercrime careers of the gang behind the GozNym banking malware.

πŸ“– Read

via "Naked Security".
08:07
⚠ Hacking gang stole millions in cryptocurrency via SIM swaps ⚠

Six alleged members of "The Community" were indicted, along with three phone service employees who allegedly helped target subscribers.

πŸ“– Read

via "Naked Security".
?
08:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google recalls Titan Bluetooth keys after finding security flaw ⚠

Google had egg on its face this week after it had to recall some of its Titan hardware security keys for being insecure.

πŸ“– Read

via "Naked Security".
08:39
❌ News Wrap: WhatsApp, Microsoft, Intel and Cisco Flaws ❌

From a zero day flaw in WhatsApp, to Patch Tuesday fixes, Threatpost breaks down the top vulnerabilities of this week.

πŸ“– Read

via "Threatpost".
?
09:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How IoT and blockchain could eliminate counterfeit goods across the supply chain πŸ”

Businesses across industries lose money and reputation due to knock-off products and questionably sourced materials, but a solution may already exist, according to a Cisco and BCG report.

πŸ“– Read

via "Security on TechRepublic".
?
10:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” TechRepublic wins gold at the national 2019 Azbee awards πŸ”

TechRepublic took home multiple awards at the national 2019 Azbee Awards of Excellence, including two gold awards and honorable mention for Website of the Year.

πŸ“– Read

via "Security on TechRepublic".
?
11:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Trustworthy Digital Foundation Is Essential to Digital Government πŸ•΄

Agencies must take steps to ensure that citizens trust in the security of government's digital channels.

πŸ“– Read

via "Dark Reading: ".
?
11:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” The largest cybersecurity breaches of the past three years, and their effects on companies πŸ”

There have been some major security breaches in recent years, according to a recent Bitglass report, and those breaches have cost companies billions of dollars along the way.

πŸ“– Read

via "Security on TechRepublic".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ How Decoding Network Traffic Can Save Your Data Bacon ❌

The importance of reading the network tealeaves of a company’s network traffic to head off an attack.

πŸ“– Read

via "Threatpost".
13:04
πŸ” Friday Five: 5/17 Edition πŸ”

News on the latest microprocessor side-channel attack, the big WhatsApp vulnerability, and combating online harassment are all covered in this week's Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
13:06
πŸ•΄ Exposed Elasticsearch Database Compromises Data on 8M People πŸ•΄

Personal data exposed includes full names, physical and email addresses, birthdates, phone numbers, and IP addresses.

πŸ“– Read

via "Dark Reading: ".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware β€˜Remediation’ Firm Exposed: Researchers Weigh in on Paying ❌

The decision to pay a ransom in the case of a ransomware attack can be a complex one for businesses.

πŸ“– Read

via "Threatpost".
?
15:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ When Older Windows Systems Won't Die πŸ•΄

Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw is a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.

πŸ“– Read

via "Dark Reading: ".
?
16:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DevOps Repository Firms Establish Shared Analysis Capability πŸ•΄

Following an attack on their users, and their shared response, Atlassian, GitHub, and GitLab decide to make the sharing of attack information a permanent facet of their operations.

πŸ“– Read

via "Dark Reading: ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WordPress WP Live Chat Support Plugin Fixes XSS Flaw ❌

A cross-site scripting flaw in a popular WordPress plugin enables an unauthenticated attacker to insert JavaScript payloads into impacted websites.

πŸ“– Read

via "Threatpost".
16:41
πŸ•΄ Q1 2019 Smashes Record For Most Reported Vulnerabilities in a Quarter πŸ•΄

Once again, a high-proportion of the reported flaws have no current fix, according to Risk Based Security.

πŸ“– Read

via "Dark Reading: ".
?
17:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Artist Uses Malware in Installation πŸ•΄

A piece of 'art' currently up for auction features six separate types of malware running on a vulnerable computer.

πŸ“– Read

via "Dark Reading: ".
?
17:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DevOps Repository Firms Establish Shared Analysis Capability πŸ•΄

Following an attack on their users, and their shared response, Atlassian, GitHub, and GitLab decide to make the sharing of attack information a permanent facet of their operations.

πŸ“– Read

via "Dark Reading: ".
20 May 2019
?
06:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 20 stories of the week ⚠

It was a week of patches - from a severe Linux kernel flaw to a new 'wormable' Windows bug, here's a roundup of the week's top stories.

πŸ“– Read

via "Naked Security".
?
07:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Bots rigged Russian finale of β€˜The Voice Kids’ talent show ⚠

It turns out that robo-dialed calls accounted for 56.5% of the phone-in vote for the millionaire's daughter.

πŸ“– Read

via "Naked Security".
?
09:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook bans accounts of fake news firm ⚠

It's not clear who paid Archimedes Group for its reality-warping campaigns, but it's clear disinformation is now a global scourge.

πŸ“– Read

via "Naked Security".
?
10:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to block hijacking attacks on your Google account πŸ”

Bot and phishing attacks can compromise your G Suite account, but there is an easy way to block the majority of these attempts, according to Google.

πŸ“– Read

via "Security on TechRepublic".
10:10
πŸ•΄ Black Hat Q&A: Bruce Schneier Calls For Public-Interest Technologists πŸ•΄

Ahead of his 2019 Black Hat USA talk, cybersecurity luminary Bruce Schneier explains why it's so important for tech experts to be actively involved in setting public policy.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Black Hat Q&A: Bruce Schneier Calls For Public-Interest Technologists πŸ•΄

Ahead of his 2019 Black Hat USA talk, cybersecurity luminary Bruce Schneier explains why it's so important for tech experts to be actively involved in setting public policy.

πŸ“– Read

via "Dark Reading: ".
10:16
⚠ Brave browser concerned that Client Hints could be abused for tracking ⚠

Privacy-focused browser Brave has criticised an industry proposal it says would make browser fingerprinting easier.

πŸ“– Read

via "Naked Security".
10:31
⚠ CEO told to hand back 757,000 fraudulently obtained IP addresses ⚠

A company accused of fraudulently obtaining 757,000 IPv4 addresses has been ordered to hand them back.

πŸ“– Read

via "Naked Security".
10:40
πŸ•΄ How a Manufacturing Firm Recovered from a Devastating Ransomware Attack πŸ•΄

The infamous Ryuk ransomware slammed a small company that makes heavy-duty vehicle alternators for government and emergency fleet. Here's what happened.

πŸ“– Read

via "Dark Reading: ".
10:44
❌ ZombieLoad: How Intel’s Latest Side Channel Bug Was Discovered and Disclosed ❌

Daniel Gruss, the researcher behind Spectre, Meltdown - and most recently, ZombieLoad - Intel CPU side channel attacks, gives an inside look into how he discovered the flaws.

πŸ“– Read

via "Threatpost".
?
11:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Signs of the Rising Threat of Magecart Attacks in 2019 πŸ•΄

Magecart attacks continue to grow in momentum. Here are the stats and stories that show what's behind the mayhem.

πŸ“– Read

via "Dark Reading: ".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Slack Bug Allows Remote File Hijacking, Malware Injection ❌

An attacker can supply a malicious hyperlink in order to secretly alter the download path for files shared in a Slack channel.

πŸ“– Read

via "Threatpost".
11:30
ATENTIONβ€Ό New - CVE-2015-9287 (the_university_of_cambridge_web_authentication_system_apache_authentication_agent)

Directory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field ("kid") of the IdP's HTTP response message ("WLS-Response") can be manipulated by an attacker. The "kid" field is not signed like the rest of the message, and manipulation is therefore trivial. The "kid" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.

πŸ“– Read

via "National Vulnerability Database".
11:40
πŸ•΄ Killer SecOps Skills: Soft Is the New Hard πŸ•΄

The sooner we give mindsets and tool sets equal bearing, the better. We must put SOC team members through rigorous training for emergency situations.

πŸ“– Read

via "Dark Reading: ".
11:40
πŸ•΄ Financial Sector Under Siege πŸ•΄

The old take-the-money-and-run approach has been replaced by siege tactics such as DDOS attacks and land-and-expand campaigns with multiple points of persistence and increased dwell time.

πŸ“– Read

via "Dark Reading: ".
?
12:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Behind the Naming of ZombieLoad and Other Intel Spectre-Like Flaws ❌

A lot of thought and meaning goes into the naming of infamous CPU side channel flaws, like ZombieLoad, Spectre and Meltdown.

πŸ“– Read

via "Threatpost".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Salesforce Woes Linger as Admins Clean Up After Service Outage ❌

An accidental permissions snafu caused a massive outage for all Salesforce customers that continues to affect some businesses.

πŸ“– Read

via "Threatpost".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 97% of Americans Can't Ace a Basic Security Test πŸ•΄

Still, a new Google study uncovers a bit of good news, too.

πŸ“– Read

via "Dark Reading: ".
13:31
ATENTIONβ€Ό New - CVE-2018-12270

In Valve Steam 1528829181 BETA, it is possible to perform a homograph / homoglyph attack to create fake URLs in the client, which may trick users into visiting unintended web sites.

πŸ“– Read

via "National Vulnerability Database".
13:32
πŸ” How has GDPR actually affected businesses? πŸ”

The EU's General Data Protection Regulation is now a year old, and has resulted in financial repercussions and changes to how businesses handle data.

πŸ“– Read

via "Security on TechRepublic".
?
13:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” The current cybersecurity landscape of guerrilla warfare πŸ”

A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.

πŸ“– Read

via "Security on TechRepublic".
?
14:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” The current cybersecurity landscape of guerrilla warfare πŸ”

A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.

πŸ“– Read

via "Security on TechRepublic".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” California Consumer Privacy Act Amendment Blocked by Lawmakers πŸ”

SB 561, a contested amendment to the California Consumer Privacy Act that could have expanded the right of consumers to sue companies over their handling of personal data, has been shelved by the state for now, likely giving businesses a sigh a relief.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Windows 10 Update Bricks PCs, Microsoft Offers Workarounds ❌

A glitch in Microsoft's Windows 10 update is causing systems to freeze after users tried to use the System Reboot function. Luckily, workarounds exist.

πŸ“– Read

via "Threatpost".
?
17:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sharing Threat Intelligence: Time for an Overhaul ❌

All too often, information-sharing is limited to vertical market silos; to build better defenses, it's time to take a broader view beyond the ISAC.

πŸ“– Read

via "Threatpost".
?
18:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Trickbot Variant Uses URL Redirection to Spread πŸ•΄

Switch in tactic is the latest attempt by operators of the prolific banking Trojan to slip past detection mechanisms.

πŸ“– Read

via "Dark Reading: ".
18:20
πŸ•΄ DHS Warns of Data Theft via Chinese-Made Drones πŸ•΄

The drones are reportedly built with parts that can compromise organizations' data and share it on a server accessible to the Chinese government.

πŸ“– Read

via "Dark Reading: ".
?
18:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ TeamViewer Admits Breach from 2016 πŸ•΄

The company says it stopped the attack launched by a Chinese hacking group.

πŸ“– Read

via "Dark Reading: ".
21 May 2019
?
05:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Think Data Security, Not Endpoint Security πŸ•΄

A strong data protection strategy is essential to protect information as it moves across endpoints and in the cloud.

πŸ“– Read

via "Dark Reading: ".
?
07:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WordPress plugin sees second serious security bug in six weeks ⚠

Researchers have uncovered another serious bug in WP Live Chat that could lead to the mass compromise of websites.

πŸ“– Read

via "Naked Security".
?
08:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Rats leave the sinking ship as hackers’ forum gets hacked ⚠

The OGUsers forum, which trades in hijacked social accounts, has been hacked, its hard drives wiped, and its user database published online.

πŸ“– Read

via "Naked Security".
08:56
⚠ Amnesty sues maker of Pegasus, the spyware let in by WhatsApp zero day ⚠

Amnesty International, which was sent the Pegasus spyware via a WhatsApp message, is seeking to stop NSO Group’s "web of surveillance."

πŸ“– Read

via "Naked Security".
?
09:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Data Security: Think Beyond the Endpoint πŸ•΄

A strong data protection strategy is essential as data moves across endpoints and in the cloud.

πŸ“– Read

via "Dark Reading: ".
?
10:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why post-quantum encryption will be critical to protect current classical computers πŸ”

Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.

πŸ“– Read

via "Security on TechRepublic".
?
10:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Deep Packet Inspection a threat to net neutrality, say campaigners ⚠

Europe’s biggest ISPs and mobile operators are accused of undermining net neutrality rules and user privacy with their use of DPI.

πŸ“– Read

via "Naked Security".
?
11:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Old Threats Are New Again πŸ•΄

They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.

πŸ“– Read

via "Dark Reading: ".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Massive DDoS attacks lasting more than an hour increased 487% in 2019 πŸ”

After decreasing in 2018, the number of DDoS attacks jumped up in Q1 2019, according to Kaspersky Lab. Here's how to stay safe.

πŸ“– Read

via "Security on TechRepublic".
11:29
❌ Millions of Golfers Land in Privacy Hazard After Cloud Misconfig ❌

A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see.

πŸ“– Read

via "Threatpost".
?
12:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak ❌

HCL domain pages exposed sensitive data - including passwords and project analysis reports - for thousands of employees and customers.

πŸ“– Read

via "Threatpost".
12:32
πŸ” Your data, stolen twice: Pirated phishing kit contains hidden backdoor πŸ”

A commercial phishing platform that targets Apple users has proven popular enough for other criminals to pirate, though the pirated version transmits harvested data through a hidden back channel.

πŸ“– Read

via "Security on TechRepublic".
12:47
πŸ” How to improve cloud provider security: 4 tips πŸ”

Many IT pros remain concerned with the risk of data loss and leakage in the cloud, according to a new survey from AlgoSec.

πŸ“– Read

via "Security on TechRepublic".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable ❌

A flaw in the Secure Boot trusted hardware root-of-trust affects enterprise, military and government network gear, including routers, switches and firewalls.

πŸ“– Read

via "Threatpost".
?
14:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ KnowBe4 Focuses on Security Culture with CLTRe Acquisition πŸ•΄

The acquisition solidifies KnowBe4's European presence and shows a focus on building and measuring security culture.

πŸ“– Read

via "Dark Reading: ".
?
15:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ To Narrow the Cyber Skills Gap with Attackers, Cut the Red Tape πŸ•΄

Attackers are getting further ahead, and entrenched corporate rules shoulder much of the blame.

πŸ“– Read

via "Dark Reading: ".
15:44
πŸ” Half A Million DPOs in Place One Year Post-GDPR πŸ”

One year after GDPR was first implemented, an estimated 500,000 organizations have registered data protection officers in place.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 49 Million Instagram Influencer Records Exposed in Open Database πŸ•΄

An AWS-hosted database was configured with no username or password required for access to personal data.

πŸ“– Read

via "Dark Reading: ".
17:22
❌ Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter ❌

Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world.

πŸ“– Read

via "Threatpost".
?
18:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intel Fixes Critical, High-Severity Flaws Across Several Products ❌

Intel has issued fixes for a slew of vulnerabilities, separate from the side-channel bugs disclosed last week.

πŸ“– Read

via "Threatpost".
?
18:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why post-quantum encryption will be critical to protect current classical computers πŸ”

Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.

πŸ“– Read

via "Security on TechRepublic".
18:27
❌ Mozilla Tackles Two Critical Flaws with Firefox 67 Release ❌

Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox, which touts better speed and privacy.

πŸ“– Read

via "Threatpost".
?
21:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Satan Ransomware Adds More Evil Tricks πŸ•΄

The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.

πŸ“– Read

via "Dark Reading: ".
22 May 2019
?
02:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to change the complexity of your Windows PIN πŸ”

Learn how to create a Windows PIN with more than four digits.

πŸ“– Read

via "Security on TechRepublic".
?
06:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Most hackers for hire are scammers, research shows ⚠

Google & UC-San Diego researchers found that only 5 of 27 hacker-for-hire services actually launched attacks against their targets.

πŸ“– Read

via "Naked Security".
?
07:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Don’t break Windows 10 by deleting SID, Microsoft warns ⚠

Sometimes it's best not to tinker under the hood - especially when it comes to security IDs.

πŸ“– Read

via "Naked Security".
08:01
⚠ Some Androids don’t call 911 when you tell them to call an ambulance ⚠

Sometimes you get a list of ambulance companies, sometimes a blog post on when it's OK to call an ambulance.

πŸ“– Read

via "Naked Security".
?
08:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cache of 49 million Instagram records found online ⚠

A security researcher has discovered a massive cache of data on millions of Instagram influencers, publicly accessible for everyone to see.

πŸ“– Read

via "Naked Security".
?
09:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What You Need to Know About Zero Trust Security πŸ•΄

The zero trust model might be the answer to a world in which perimeters are made to be breached. Is it right for your organization?

πŸ“– Read

via "Dark Reading: ".
?
10:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Learn to Hack Non-Competes & Sell 0-Days at Black Hat USA πŸ•΄

Plus, hear from key figures about the history and the enduring influence of The Cult of the Dead Cow this August in Las Vegas.

πŸ“– Read

via "Dark Reading: ".
10:22
❌ Google Stored G Suite Passwords in Plaintext Since 2005 ❌

Google said it had stored G Suite enterprise users' passwords in plain text since 2005 marking a giant security faux pas.

πŸ“– Read

via "Threatpost".
10:30
πŸ•΄ Consumer IoT Devices Are Compromising Enterprise Networks πŸ•΄

While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.

πŸ“– Read

via "Dark Reading: ".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Arm suspends cooperation with Huawei, endangering mobile and server business πŸ”

UK-based Arm Holdings has issued a memo to staff indicating it must stop working with Chinese equipment manufacturer Huawei, following a US trade dispute.

πŸ“– Read

via "Security on TechRepublic".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The 3 Cybersecurity Rules of Trust πŸ•΄

Every day, keeping anything secure requires being smart about trust. The rules of trust will keep you and your data safer.

πŸ“– Read

via "Dark Reading: ".
11:47
πŸ” Tech news roundup: GDPR turns 1, and who makes the best apps? πŸ”

Karen Roby reports on this week's biggest tech news, including Huawei's Android license and the one year anniversary of GDPR. How have businesses been affected by the legislation and what does Microsoft have to say about a potential version of the law in the US?

πŸ“– Read

via "Security on TechRepublic".
?
12:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Windows Zero-Day Drops on Twitter, Developer Promises 4 More ❌

SandboxEscaper has released her latest local privilege-escalation exploit for Windows.

πŸ“– Read

via "Threatpost".
?
12:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: GDPR turns 1, and who makes the best apps? πŸ”

Karen Roby reports on this week's biggest tech news, including Huawei's Android license and the one year anniversary of GDPR. How have businesses been affected by the legislation and what does Microsoft have to say about a potential version of the law in the US?

πŸ“– Read

via "Security on TechRepublic".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-1991

IBM API Connect 5.0.0.0, and 5.0.8.6 could could return sensitive information that could provide critical information as to the underlying software stack in CMC UI headers. IBM X-Force ID: 154284.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2016-10750

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
?
14:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Flaws in Khan Academy Opened Door to Account Takeovers ❌

The two critical cross-site request forgery flaws in the online learning non-profit Khan Academy have been resolved.

πŸ“– Read

via "Threatpost".
?
15:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS Attacks Up in Q1 After Months of Steady Decline πŸ•΄

Sudden surge suggests that new actors have stepped up to the plate to replace the old operators.

πŸ“– Read

via "Dark Reading: ".
15:40
πŸ•΄ Proving the Value of Security Awareness with Metrics that 'Deserve More' πŸ•΄

Without metrics that matter to the business, awareness programs will continue to be the bastard child of security.

πŸ“– Read

via "Dark Reading: ".
15:50
πŸ•΄ Google Alerts Admins to Unhashed Password Storage πŸ•΄

The company reports it has seen improper access to, or misuse of, affected enterprise G Suite credentials.

πŸ“– Read

via "Dark Reading: ".
16:00
πŸ•΄ Baltimore Email, Other Systems Still Offline from May 7 Ransomware Attack πŸ•΄

The city's mayor says there's no 'exact timeline on when all systems will be restored.'

πŸ“– Read

via "Dark Reading: ".
16:02
πŸ” Lithuanian DPA Hopes First GDPR Fine Is A Wake Up Call πŸ”

It took a year but Lithuania's data protection authority issued its first fine, to a fintech company, for breaching three provisions of the GDPR.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WannaCry-Infested Laptop Starts at $1.13M in Art Auction ❌

The "bestiary" houses six historical threats that combined resulted in at least $95B in damages worldwide.

πŸ“– Read

via "Threatpost".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-7202

An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2018-14729

The database backup feature in upload/source/admincp/admincp_db.php in Discuz! 2.5 and 3.4 allows remote attackers to execute arbitrary PHP code.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2018-12886

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2017-9809

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Information Exposure.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2017-6514 (wordpress)

WordPress 4.7.2 mishandles listings of post authors, which allows remote attackers to obtain sensitive information (Path Disclosure) via a /wp-json/oembed/1.0/embed?url= request, related to the "author_name":" substring.

πŸ“– Read

via "National Vulnerability Database".
?
19:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Data Asset Management: What Do You Really Need? πŸ•΄

At Interop, a cybersecurity and privacy leader explains her approach to data management and governance at a massive, decentralized company.

πŸ“– Read

via "Dark Reading: ".
?
19:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Software Skims Credit Card Info From Online Credit Card Transactions πŸ•΄

The new exploit builds a fake frame around legitimate portions of an online commerce website.

πŸ“– Read

via "Dark Reading: ".
?
20:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-9808

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
20:14
ATENTIONβ€Ό New - CVE-2017-8777

Open-Xchange GmbH OX Cloud Plugins 1.4.0 and earlier is affected by: Missing Authorization.

πŸ“– Read

via "National Vulnerability Database".
20:14
ATENTIONβ€Ό New - CVE-2017-8341

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Content Spoofing.

πŸ“– Read

via "National Vulnerability Database".
20:14
ATENTIONβ€Ό New - CVE-2017-8340

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
20:14
ATENTIONβ€Ό New - CVE-2017-6912

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
20:14
ATENTIONβ€Ό New - CVE-2017-5984

In libavcodec in Libav 9.21, ff_h264_execute_ref_pic_marking() has a heap-based buffer over-read.

πŸ“– Read

via "National Vulnerability Database".
20:14
ATENTIONβ€Ό New - CVE-2017-5871

Odoo Version <= 8.0-20160726 and Version 9 is affected by: CWE-601: Open redirection. The impact is: obtain sensitive information (remote).

πŸ“– Read

via "National Vulnerability Database".
20:14
ATENTIONβ€Ό New - CVE-2017-5864

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
20:14
ATENTIONβ€Ό New - CVE-2017-5863

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
?
20:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Alphabet's Chronicle Explores Code-Signing Abuse in the Wild πŸ•΄

A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.

πŸ“– Read

via "Dark Reading: ".
23 May 2019
?
07:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ The city of Baltimore is being held hostage by ransomware ⚠

The mayor said noβ€”for nowβ€”to paying 13 Bitcoins to (purportedly) unlock all seized systems. Manual rebuilding could take months.

πŸ“– Read

via "Naked Security".
07:46
⚠ Mozilla fixes bugs, improves privacy in latest Firefox release ⚠

Mozilla rolled out version 67 of its Firefox browser this week, fixing some security bugs and introducing a host of privacy features.

πŸ“– Read

via "Naked Security".
?
08:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Tor Browser for Android 8.5 offers mobile users privacy boost ⚠

After nine months of alpha testing, a stable release of the Tor browser for Android can now be downloaded from Google’s Play store or direct from the Project’s website.

πŸ“– Read

via "Naked Security".
?
09:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google stored some passwords in plain text for 14 years ⚠

Nobody got at the subset of G Suite passwords, Google said, apologizing and saying that it's working to ensure this is an isolated incident.

πŸ“– Read

via "Naked Security".
?
11:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Soaring Cryptocurrency Prices Draw Malicious New Onslaught of Apps, Malware ❌

As Bitcoin prices surge, so too are malicious apps, malware-ridden scams and cryptojacking attacks looking to profit from the cryptocurrency industry.

πŸ“– Read

via "Threatpost".
?
11:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Incident Response: 3 Easy Traps & How to Avoid Them πŸ•΄

Sage legal advice about navigating a data breach from a troubleshooting cybersecurity outside counsel.

πŸ“– Read

via "Dark Reading: ".
?
12:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ SandboxEscaper Drops Three More Windows Exploits, IE Zero-Day ❌

As promised, developer SandboxEscaper has dropped exploit code for four more bugs, on the heels of releasing a Windows zero-day yesterday.

πŸ“– Read

via "Threatpost".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-15664

In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-5213

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-5212

Open-Xchange GmbH OX App Suite 7.8.3 is affected by: Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-5211

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Content Spoofing.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-5210

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Information Exposure.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-17061

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-17060

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Insecure Permissions.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-15652

Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of imagemagick also use libga, so it was affected as well.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-15030

Open-Xchange GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2017-15029

Open-Xchange GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF.

πŸ“– Read

via "National Vulnerability Database".
?
14:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russian Nation-State Hacking Unit's Tools Get More Fancy πŸ•΄

APT28/Fancy Bear has expanded its repertoire to more than 30 commands for infecting systems, executing code, and reconnaissance, researchers have found.

πŸ“– Read

via "Dark Reading: ".
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Opens Defender ATP for Mac to Public Preview πŸ•΄

Users of the security platform who have preview features enabled can access Defender ATP for Mac via the Security Center onboarding section.

πŸ“– Read

via "Dark Reading: ".
?
15:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” GDPR fines levied so far: The lessons businesses can learn πŸ”

After one year of enforcement of the GDPR, businesses can learn much from how the provisions of the regulation have been applied and how organizations have been fined.

πŸ“– Read

via "Security on TechRepublic".
15:27
πŸ” NYDFS Tasks New Cybersecurity Division to Enforce Cybersecurity Regulation πŸ”

With a new cybersecurity team dedicated to enforcing the department’s regulations under its wing, the New York Department of Financial Services (NYDFS) will grow even more vigilant of violations.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:29
ATENTIONβ€Ό New - CVE-2017-13668

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-11740

In Zoho ManageEngine Application Manager 13.1 Build 13100, the administrative user has the ability to upload files/binaries that can be executed upon the occurrence of an alarm. An attacker can abuse this functionality by uploading a malicious script that can be executed on the remote system.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-11739

In Zoho ManageEngine Application Manager 13.1 Build 13100, an authenticated user, with administrative privileges, has the ability to add a widget on any dashboard. This widget can be a "Utility Widget" with a "Custom HTML or Text" field. Once this widget is created, it will be loaded on the dashboard where it was added. An attacker can abuse this functionality by creating a "Utility Widget" that contains malicious JavaScript code, aka XSS.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-11738

In Zoho ManageEngine Application Manager 13.1 Build 13100, the 'haid' parameter of the '/auditLogAction.do' module is vulnerable to a Time-based Blind SQL Injection attack.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-11561

An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the "Group Chat" or "Alarm" section. This functionality can be abused by a malicious user by uploading a web shell.

πŸ“– Read

via "National Vulnerability Database".
15:40
πŸ•΄ Google's Origin & the Danger of Link Sharing πŸ•΄

How the act of sharing links to files stored in a public cloud puts organizations at risk, and what security teams can do to safeguard data and PII.

πŸ“– Read

via "Dark Reading: ".
?
16:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mobile Exploit Fingerprints Devices with Sensor Calibration Data πŸ•΄

Data from routines intended to calibrate motion sensors can identify individual iOS and Android devices in a newly released exploit.

πŸ“– Read

via "Dark Reading: ".
?
17:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Calibration Attack Drills Down on iPhone, Pixel Users ❌

A new way of tracking mobile users creates a globally unique device fingerprint that browsers and other protections can't stop.

πŸ“– Read

via "Threatpost".
17:32
❌ Shade Ransomware Expands to U.S. Targets ❌

Coming to America: The Shade ransomware, which has historically targeted Russian victims, was recently spotted expanding its sights.

πŸ“– Read

via "Threatpost".
17:45
πŸ•΄ FEC Gives Green Light for Free Cybersecurity Help in Federal Elections πŸ•΄

Official opinion issued by the Federal Election Commission to nonprofit Defending Digital Campaigns is good news for free and reduced-cost security offerings to political candidates and committees.

πŸ“– Read

via "Dark Reading: ".
?
18:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Goodbye Passwords: Hello Identity Management ❌

As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack.

πŸ“– Read

via "Threatpost".
18:14
ATENTIONβ€Ό New - CVE-2017-13667

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2017-11560

An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2017-11559

An issue was discovered in ZOHO ManageEngine OpManager 12.2. The 'apiKey' parameter of "/api/json/admin/getmailserversettings" and "/api/json/dashboard/gotoverviewlist" is vulnerable to a Blind SQL Injection attack.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2017-11557

An issue was discovered in ZOHO ManageEngine Applications Manager 12.3. It is possible for an unauthenticated user to view the list of domain names and usernames used in a company's network environment via a userconfiguration.do?method=editUser request.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2017-11365

Certain Symfony products are affected by: Incorrect Access Control. This affects Symfony 2.7.30 and Symfony 2.8.23 and Symfony 3.2.10 and Symfony 3.3.3. The type of exploitation is: remote. The component is: Password validator.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2016-9969

In libwebp 0.5.1, there is a double free bug in libwebpmux.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2016-8901

b2evolution 6.7.6 suffer from an Object Injection vulnerability in /htsrv/call_plugin.php.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2016-8899

Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expCatController.php related to change_cats.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2016-8897

Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/help/controllers/helpController.php.

πŸ“– Read

via "National Vulnerability Database".
18:14
ATENTIONβ€Ό New - CVE-2016-7550

asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote).

πŸ“– Read

via "National Vulnerability Database".
?
19:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Moody's Downgrade of Equifax: A Wakeup Call to Boards πŸ•΄

The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.

πŸ“– Read

via "Dark Reading: ".
?
20:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ To Manage Security Risk, Manage Data First πŸ•΄

At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.

πŸ“– Read

via "Dark Reading: ".
?
21:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Moody's Downgrade of Equifax: A Wake-up Call to Boards πŸ•΄

The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.

πŸ“– Read

via "Dark Reading: ".
21:15
πŸ•΄ Researcher Publishes Four Zero-Day Exploits in Three Days πŸ•΄

The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues.

πŸ“– Read

via "Dark Reading: ".
24 May 2019
?
02:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” GDPR: A cheat sheet πŸ”

Enforcement of the EU General Data Protection Regulation (GDPR) applies to any company that transacts with European Union citizens. Here's your GDPR go-to guide.

πŸ“– Read

via "Security on TechRepublic".
?
07:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google Ad Exchange in data privacy probe ⚠

It was triggered by a complaint filed by Dr. Johnny Ryan, CPO of privacy-focused Brave browser, which is fighting Google's search domination.

πŸ“– Read

via "Naked Security".
?
07:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Batterygate news: Apple to warn users if iOS updates throttle iPhones ⚠

Competition regulators investigated Apple due to concerns that people were needlessly repairing or replacing slow phones.

πŸ“– Read

via "Naked Security".
?
08:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Safari test points to a future with tracker-free ads ⚠

Apple thinks it has come up with a way for advertisers to track how well their ads are doing without compromising user privacy.

πŸ“– Read

via "Naked Security".
08:31
⚠ Any advance on $1.2m for this virus-infested netbook? ⚠

Can you ever call malware art? That question is now up for debate as a Chinese internet artist puts a laptop full of viruses up for auction.

πŸ“– Read

via "Naked Security".
?
09:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Nessus expands vulnerability scanner offerings to 16 IPs in commercial environments πŸ”

Tenable introduced the free Nessus Essentials product, and also discussed the wisdom of building apps in Electron, along with fixes for Spectre and Meltdown.

πŸ“– Read

via "Security on TechRepublic".
?
10:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Recent Wins Against Cybercrime πŸ•΄

The increasing number of successful law enforcement actions and prosecutions suggest that cybercriminals have plenty of reason to be looking over their shoulders.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Master NSA-Grade Security Tools at New Black Hat Trainings Virginia πŸ•΄

Get ready, because this October Black Hat will bring its highly-regarded Trainings to Alexandria, Virginia for two days of intensive, practical cybersecurity education.

πŸ“– Read

via "Dark Reading: ".
?
10:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t? ❌

The Threatpost team breaks down the top privacy-related data incidents of the week - including data leaks from HCL and a golfing app - and highlights some surprisingly good privacy news.

πŸ“– Read

via "Threatpost".
?
11:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Oh Canada: Why half of phishing attacks target the Great White North πŸ”

Though phishing volume remained relatively stable, attacks against Canadian users dominate, according to an RSA report.

πŸ“– Read

via "Security on TechRepublic".
11:15
πŸ•΄ How Security Vendors Can Address the Cybersecurity Talent Shortage πŸ•΄

The talent gap is too large for any one sector, and cybersecurity vendors have a big role to play in helping to close it.

πŸ“– Read

via "Dark Reading: ".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Moody's Downgrade of Equifax: A Wake-up Call to Boards πŸ•΄

The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.

πŸ“– Read

via "Dark Reading: ".
?
12:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NSS Labs Admits Its Test of CrowdStrike Falcon Was 'Inaccurate' πŸ•΄

CrowdStrike, NSS Labs reach confidential settlement over 2017 endpoint product testing dispute.

πŸ“– Read

via "Dark Reading: ".
?
12:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mist Computing Startup Distributes Security AI to the Network Edge πŸ•΄

MistNet, founded by former Juniper employees, moves AI processing to the network edge to build distributed detection and analysis models for security.

πŸ“– Read

via "Dark Reading: ".
12:57
❌ Microsoft Beefs Up Wi-Fi Protection ❌

The Windows 10 update that's rolling out addresses insecure Wi-Fi hotspots with new user notifications.

πŸ“– Read

via "Threatpost".
?
14:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 5/24 Edition πŸ”

Google's password faux pas, how real-time bidding may violate the GDPR, and tips on mitigating trade theft risk are all covered in this week's Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
14:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Joomla and WordPress Found Harboring Malicious Redirect Code ❌

New .htaccess injector threat on Joomla and WordPress websites redirects to malicious websites.

πŸ“– Read

via "Threatpost".
?
15:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What the future looks like as GDPR's one-year anniversary approaches πŸ”

ZDNet's Danny Palmer sits down with TechRepublic's Karen Roby to break down exactly what GDPR is, what it does, and what the future looks like as its one-year anniversary approaches.

πŸ“– Read

via "Security on TechRepublic".
?
15:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-8900

Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expTagController.php related to change_tags.

πŸ“– Read

via "National Vulnerability Database".
15:36
ATENTIONβ€Ό New - CVE-2016-8898

Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/ecommerce/controllers/cartController.php.

πŸ“– Read

via "National Vulnerability Database".
15:36
ATENTIONβ€Ό New - CVE-2016-10245

Insufficient sanitization of the query parameter in templates/html/search_opensearch.php could lead to reflected cross-site scripting or iframe injection.

πŸ“– Read

via "National Vulnerability Database".
15:40
❌ Snapchat Privacy Blunder Piques Concerns About Insider Threats ❌

After a report found that Snap employees were abusing their access to Snapchat data, experts are warning that insider threats will continue to be a top challenge for privacy.

πŸ“– Read

via "Threatpost".
?
17:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-10759

The Xinha plugin in Precurio 2.1 allows Directory Traversal, with resultant arbitrary code execution, via ExtendedFileManager/Classes/ExtendedFileManager.php because ExtendedFileManager can be used to rename the .htaccess file that blocks .php uploads.

πŸ“– Read

via "National Vulnerability Database".
17:26
ATENTIONβ€Ό New - CVE-2016-10758

PHPKIT 1.6.6 allows arbitrary File Upload, as demonstrated by a .php file to pkinc/admin/mediaarchive.php and pkinc/func/default.php via the image_name parameter.

πŸ“– Read

via "National Vulnerability Database".
17:26
ATENTIONβ€Ό New - CVE-2016-10757

In Redaxo 5.2.0, the cron management of the admin panel suffers from CSRF that leads to arbitrary Remote Code Execution via addons/cronjob/lib/types/phpcode.php.

πŸ“– Read

via "National Vulnerability Database".
17:26
ATENTIONβ€Ό New - CVE-2016-10756

Kliqqi 3.0.0.5 allows CSRF with resultant Arbitrary File Upload because module.php?module=upload can be used to configure the uploading of .php files, and then modules/upload/upload_main.php can be used for the upload itself.

πŸ“– Read

via "National Vulnerability Database".
17:26
ATENTIONβ€Ό New - CVE-2016-10755

AbanteCart 1.2.8 allows SQL Injection via the source_language parameter to admin/controller/pages/localisation/language.php and core/lib/language_manager.php, or via POST data to admin/controller/pages/tool/backup.php and admin/model/tool/backup.php.

πŸ“– Read

via "National Vulnerability Database".
17:26
ATENTIONβ€Ό New - CVE-2016-10754

modules/Calendar/Activity.php in Vtiger CRM 6.5.0 allows SQL injection via the contactidlist parameter.

πŸ“– Read

via "National Vulnerability Database".
17:26
ATENTIONβ€Ό New - CVE-2016-10753

e107 2.1.2 allows PHP Object Injection with resultant SQL injection, because usersettings.php uses unserialize without an HMAC.

πŸ“– Read

via "National Vulnerability Database".
17:26
ATENTIONβ€Ό New - CVE-2016-10752

serendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by "php" as a filename.

πŸ“– Read

via "National Vulnerability Database".
17:26
ATENTIONβ€Ό New - CVE-2016-10751

osClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP code in the EXIF data via index.php?page=ajax&action=ajax_upload.

πŸ“– Read

via "National Vulnerability Database".
?
18:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ First American Financial Corp Left Mortgage Data Exposed on Website πŸ•΄



πŸ“– Read

via "Dark Reading: ".
25 May 2019
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Serious Security: Don’t let your SQL server attack you with ransomware ⚠

Tales from the honeypot: this time a MySQL-based attack. Old tricks still work, because we're still making old mistakes - here's what to do.

πŸ“– Read

via "Naked Security".
27 May 2019
?
10:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ThreatList: Top 8 Threat Actors Targeting Canada in 2019 ❌

Bad actors are looking to hit financial and banking firms in Canada with geo-specific campaigns touting malware like Emotet, GandCrab and Ursnif.

πŸ“– Read

via "Threatpost".
?
11:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Chinese Spy Group Mixes Up Its Malware Arsenal with Brand-New Loaders ❌

New campaigns also show modified versions of known payloads.

πŸ“– Read

via "Threatpost".
28 May 2019
?
05:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Tuesday review – the hot 21 stories of the week ⚠

A day late! From potential Windows 10 borkings to hackers hacking hackers - catch up on everything we wrote last week.

πŸ“– Read

via "Naked Security".
?
08:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US Senate passes anti-robocalling bill ⚠

The TRACED Act was a slam dunk in the Senate, where it passed with an overwhelming 97-1 vote.

πŸ“– Read

via "Naked Security".
?
08:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hackers breach US license plate scanning company ⚠

One of the US’s most widely used vehicle license plate reader (LPR) companies, Perceptics, is reportedly investigating a data breach.

πŸ“– Read

via "Naked Security".
?
09:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Redditor can stay anonymous, court rules ⚠

The Watch Tower sought to unmask a Jehovah's Witness who posted its content to show what data the organization collects and processes.

πŸ“– Read

via "Naked Security".
?
09:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google-protected mobile browsers were open to phishing for over a year ⚠

Researchers revealed a massive hole in Google Safe Browsing's mobile browser protection that existed for over a year.

πŸ“– Read

via "Naked Security".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Dark web data monitoring: 6 questions to ask πŸ”

The dark web is home to a multitude of threats for businesses. Here is how to stay protected, according to a Terbium Labs report.

πŸ“– Read

via "Security on TechRepublic".
?
11:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Cattle, Not Pets' & the Rise of Security-as-Code πŸ•΄

Nearly a decade in, the famous analogy has underpinned a sea change in enterprise IT, but still falls short of the security mark. More recent developments can help.

πŸ“– Read

via "Dark Reading: ".
11:47
❌ One Million Devices Open to Wormable Microsoft BlueKeep Flaw ❌

Researchers have discovered one million devices that are vulnerable to a "wormable" Microsoft flaw, which could open the door to a WannaCry-like cyberattack.

πŸ“– Read

via "Threatpost".
?
13:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Keys for Working with Modern MSSPs πŸ•΄

How to determine what an MSSP can do for your organization, and the questions to ask before signing a contract.

πŸ“– Read

via "Dark Reading: ".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Gatekeeper Bug in MacOS Mojave Allows Malware to Execute ❌

Researcher discloses vulnerability in macOS Gatekeeper security feature that allows the execution of malicious code on current version of the OS.

πŸ“– Read

via "Threatpost".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Millions of Canva users’ data stolen as GnosticPlayers strikes again ⚠

The initial breach notification was topped with marketing fluff: an unfortunate choice, given what could be the resulting glazed eyeballs.

πŸ“– Read

via "Naked Security".
?
15:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 200k Personal Records Exposed by Events Planning Firm ❌

Amazingco, an events planning firm, exposed 212,220 records with personal data relating to children's parties, wine tours and more.

πŸ“– Read

via "Threatpost".
?
16:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybercrime: Looking Beyond the Dark Web πŸ•΄

Fighting cybercrime requires visibility into much more than just the Dark Web. Here's where to look and a glimpse of what you'll find.

πŸ“– Read

via "Dark Reading: ".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Ways to Authenticate Without Passwords πŸ•΄

Passwordless authentication has a shot at becoming more ubiquitous in the next few years. We take a look at where things stand at the moment.

πŸ“– Read

via "Dark Reading: ".
?
16:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” One Year In, GDPR Keeping Irish Data Protection Commission Busy πŸ”

Ireland's Data Protection Commission has fielded nearly 6,000 reports of security breaches since GDPR went into effect.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Web App Vulnerabilities Flying Under Your Radar πŸ•΄

A penetration tester shows how low-severity Web application bugs can have a greater effect than businesses realize.

πŸ“– Read

via "Dark Reading: ".
?
17:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FireEye Buys Verodin for $250 Million πŸ•΄

Acquisition of security instrumentation firm will add more than $70 million to 2020 billing, FireEye estimates.

πŸ“– Read

via "Dark Reading: ".
?
18:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 privacy plugins πŸ”

Privacy on the web is a growing concern. Tom Merritt suggests five privacy plugins to help keep your personal information safe.

πŸ“– Read

via "Security on TechRepublic".
18:01
πŸ” Top 5 privacy plugins πŸ”

Privacy on the web is a growing concern. Tom Merritt suggests five privacy plugins to help keep your personal information safe.

πŸ“– Read

via "Security on TechRepublic".
?
19:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ GandCrab Gets a SQL Update πŸ•΄

A new attack is found that uses MySQL as part of the attack chain in a GandCrab ransomware infection.

πŸ“– Read

via "Dark Reading: ".
?
20:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FirstAm Leak Highlights Importance of Verifying the Basics πŸ•΄

The Fortune 500 giant in the real estate industry missed a basic vulnerability in its website, leaving as many as 885 million sensitive records accessible to attackers. The fix: teaching developers the top 10 security issues and frequent testing.

πŸ“– Read

via "Dark Reading: ".
29 May 2019
?
01:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Emotet Made Up 61% of Malicious Payloads in Q1 πŸ•΄

The botnet has displaced credential stealers, stand-alone downloaders, and RATs in the overall threat landscape.

πŸ“– Read

via "Dark Reading: ".
?
06:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers uncover smart padlock’s dumb security ⚠

Pen Test Partners has found some major security flaws in the Bluetooth Nokelock that consumers might like to know about.

πŸ“– Read

via "Naked Security".
?
08:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Three tech-support scammers charged with ripping off the elderly ⚠

The defendants allegedly pulled in over $1.3 million over the course of about six years for unnecessary and undelivered tech support.

πŸ“– Read

via "Naked Security".
08:03
⚠ New research generates deepfake video from a single picture ⚠

Now it's easier for attackers to produce deepfakes, even if the target doesn't have much existing footage. Like the Mona Lisa.

πŸ“– Read

via "Naked Security".
?
10:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Level Up Your Data Forensics Game at Black Hat USA πŸ•΄

Learn about the latest supply chain attacks, red team threats, and "deep fake" detection tricks at the premier cybersecurity event in Las Vegas this August.

πŸ“– Read

via "Dark Reading: ".
10:07
❌ 50k Servers Infected with Cryptomining Malware in Nansh0u Campaign ❌

A rapidly-expanding campaign has infected 50,000 servers with malware that mines an open source cryptocurrency called TurtleCoin.

πŸ“– Read

via "Threatpost".
?
10:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to avoid botnet attacks and other cyberthreats: 4 tips πŸ”

The Emotet botnet drove 61% of malicious payloads in Q1 2019, according to a Proofpoint report. Here's how to keep your business safe.

πŸ“– Read

via "Security on TechRepublic".
10:31
πŸ” How WannaCry is still launching 3,500 successful attacks per hour πŸ”

The proliferation of unpatched systems in manufacturing and healthcare settings allows the North Korean state-sponsored malware to persist.

πŸ“– Read

via "Security on TechRepublic".
?
11:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Fostering Flexibility Is a Win for Women & Cybersecurity πŸ•΄

Creating a culture of supporting and advancing women is no small feat, but it's worth the challenge. Start with yourself. Here's how.

πŸ“– Read

via "Dark Reading: ".
?
12:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Flipboard Confirms Two Hacks, Prompts Password Resets πŸ•΄

The company reports two incidents affected a subset of its users and is resetting passwords for involved accounts.

πŸ“– Read

via "Dark Reading: ".
12:02
❌ Top UK Official Derides Huawei Claiming it has β€˜Bad Security’ ❌

A top UK government cyber-official has called out the telecom supplier, long suspected to use its infrastructure sales as a base for industrial espionage.

πŸ“– Read

via "Threatpost".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WordPress Plugin Has Unpatched Privilege Escalation Flaw, Warn Researchers ❌

Researchers are warning of flaws in two WordPress plugins - Slick Popup and WP Database Backup - including one that remains unpatched.

πŸ“– Read

via "Threatpost".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ WannaCry Lives On in 145K Infected Devices πŸ•΄

Data from the last half year shows devices worldwide infected with the self-propagating ransomware, putting organizations with poor patching initiatives at risk.

πŸ“– Read

via "Dark Reading: ".
?
14:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 5G IoT: Literally a Matter of Life or Death ❌

High-risk applications that require zero latency, like remote surgery, could cause loss of life in the event of a cyberattack.

πŸ“– Read

via "Threatpost".
?
15:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5 reasons you should be using a Password Manager πŸ”

Need a reason to use a password manager? How about five?

πŸ“– Read

via "Security on TechRepublic".
15:17
πŸ•΄ Palo Alto Networks Said to Buy Twistlock πŸ•΄

Reports in Israel-based business publications say Palo Alto Networks has reached a deal to purchase the container security startup, as well as another Israeli security startup.

πŸ“– Read

via "Dark Reading: ".
?
15:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Don't Just Tune Your SIEM, Retune It πŸ•΄

Your SIEM isn't a set-it-and-forget-it proposition. It's time for a spring cleaning.

πŸ“– Read

via "Dark Reading: ".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” OCR Reiterates HIPAA Liability of Business Associates πŸ”

The Office for Civil Rights recently reminded business associates what HIPAA violations it can be held liable for and when the Department of Health and Human Services can take enforcement action.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Impersonation Attacks Up 67% for Corporate Inboxes πŸ•΄

Nearly three-quarters of organizations hit with impersonation attacks experienced direct losses of money, customers, and data.

πŸ“– Read

via "Dark Reading: ".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜5G is Coming,’ But Can the Security Industry Keep Up? ❌

What does 5G mean from a security vendor perspective? A Palo Alto Networks expert sounds off at GSMA's Mobile360 this week.

πŸ“– Read

via "Threatpost".
?
19:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Docker Vulnerability Opens Servers to Container Code πŸ•΄

Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE.

πŸ“– Read

via "Dark Reading: ".
30 May 2019
?
08:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ What a teen grade hacker’s confession can teach us ⚠

"We had access to the grade book. Now we could change the grades."

πŸ“– Read

via "Naked Security".
08:23
⚠ A million devices still vulnerable to β€˜wormable’ RDP hole ⚠

An internet-wide scan has revealed almost one million devices vulnerable to CVE-2019-0708.

πŸ“– Read

via "Naked Security".
?
09:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ New Zealand’s β€œhacked” budget was found on a website ⚠

Police close their investigation, concluding that New Zealand's "wellbeing" budget wasn't hacked.

πŸ“– Read

via "Naked Security".
?
09:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Most businesses 'overconfident' in their ability to stop cybersecurity breaches πŸ”

Some 93% of organizations said they feel prepared against cyberthreats, though they lack common cyber best practices, according to a Centrify report.

πŸ“– Read

via "Security on TechRepublic".
10:03
⚠ The cryptominer that kept coming back ⚠

A Monero cryptominer made a home on an Apache Tomcat server and just wouldn't stay away.

πŸ“– Read

via "Naked Security".
?
10:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 2.3B Files Exposed in a Year: A New Record for Misconfigs ❌

Amazon S3 cloud bucket misconfigurations however have dropped dramatically.

πŸ“– Read

via "Threatpost".
10:36
πŸ” Vulnerabilities in industrial control systems surface lack of basic security hygiene πŸ”

Standard security practices among IT companies do not necessarily carry over to the IT departments of other firms, leading to products sold without basic security measures in place.

πŸ“– Read

via "Security on TechRepublic".
?
11:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization's online data: 5 tips πŸ”

The wrong use of SMB, FTP, and other file storage technologies exposed 2.3 billion online files globally over the past year, according to a Digital Shadows report.

πŸ“– Read

via "Security on TechRepublic".
11:52
πŸ•΄ The Ransomware Dilemma: What if Your Local Government Is Next? πŸ•΄

Baltimore has so far refused to comply with a ransom demand. It's being forced to make a decision all such victims face: to act morally or practically.

πŸ“– Read

via "Dark Reading: ".
?
12:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 35 of the Best Information Security Podcasts to Follow in 2019 πŸ”

Podcasts are a go-to resource for security professionals – here's our roundup of 35 of the top podcasts covering information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
12:12
❌ POS Malware Found at 102 Checkers Restaurant Locations ❌

One of the most popular U.S. drive-through restaurants has been hit with a data breach due to POS malware.

πŸ“– Read

via "Threatpost".
?
13:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ AI, the Mandatory Element of 5G Mobile Security ❌

The complexity and scale of the 5G ecosystem, combined with a lack of skills and training in software-centric security, will be important drivers for AI deployment in the carrier space.

πŸ“– Read

via "Threatpost".
?
14:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Palo Alto Networks Confirms PureSec Acquisition πŸ•΄

The company also agreed to buy container security company Twistlock as it develops its cloud security suite.

πŸ“– Read

via "Dark Reading: ".
?
14:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your network just like a bank ATM πŸ”

A report out from Talos on the state of ATM malware contains lots of tips on protecting these machines from malware, and they're just as applicable to other industries.

πŸ“– Read

via "Security on TechRepublic".
?
15:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Caveat Emptor: Calculating the Impact of Global Attacks on Cyber Insurance πŸ•΄

The reality for business owners and CISOs looking to protect their business from a cyberattack is that cyber insurance is not a catchall for protecting against risk and loss.

πŸ“– Read

via "Dark Reading: ".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-10948

Synacor Zimbra Admin UI in Zimbra Collaboration Suite before 8.8.0 beta 2 has Persistent XSS via mail addrs.

πŸ“– Read

via "National Vulnerability Database".
?
17:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: FBI's most wanted cybercriminals, mid-priced phones, and a smarter Roomba πŸ”

Karen Roby reports on this weeks biggest tech news which includes, the FBI's most wanted cybercriminals, a look at new mid-priced phones, a smarter Roomba, and the best websites for resumes.

πŸ“– Read

via "Security on TechRepublic".
17:56
πŸ” Tech news roundup: FBI's most wanted cybercriminals, mid-priced phones, and a smarter Roomba πŸ”

Karen Roby reports on this weeks biggest tech news which includes, the FBI's most wanted cybercriminals, a look at new mid-priced phones, a smarter Roomba, and the best websites for resumes.

πŸ“– Read

via "Security on TechRepublic".
18:00
πŸ•΄ Insight Partners Acquires Recorded Future πŸ•΄

The threat intelligence company went for $780 million in a cash deal.

πŸ“– Read

via "Dark Reading: ".
?
18:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 2.3B Files Currently Exposed via Online Storage πŸ•΄

Digital Shadows researchers scanned various online file-sharing services and concluded the number of exposed files is up 50% from March of 2018.

πŸ“– Read

via "Dark Reading: ".
18:28
❌ New Linux Malware β€˜HiddenWasp’ Borrows from Mirai, Azazel ❌

HiddenWasp is unique for Linux-based malware in that it targets systems to remotely control.

πŸ“– Read

via "Threatpost".
?
19:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Android Q: Cheat sheet πŸ”

Android Q's features will transform some phones into more user-friendly, customizable, and secure environments. Here's what developers, businesses, and users need to know about Google's Android 10.0.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-7609

Synacor Zimbra Mail Client 8.6 before 8.6.0 Patch 5 has XSS via the error/warning dialog and email body content in Zimbra.

πŸ“– Read

via "National Vulnerability Database".
19:34
ATENTIONβ€Ό New - CVE-2015-2230

Synacor Zimbra Collaboration Server 8.x before 8.7.0 has Reflected XSS in admin console.

πŸ“– Read

via "National Vulnerability Database".
19:40
πŸ•΄ Vulnerability Leaves Container Images Without Passwords πŸ•΄

A old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store.

πŸ“– Read

via "Dark Reading: ".
31 May 2019
?
08:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facial recognition used to strip adult industry workers of anonymity ⚠

A name-and-shame database is supposed to "save" husbands from wives who have appeared on porn sites.

πŸ“– Read

via "Naked Security".
08:34
⚠ Foreign spies may be hiding in your VPN, warns DHS ⚠

"...nation-state actors have demonstrated intent and capability to leverage VPN services and vulnerable users for malicious purposes."

πŸ“– Read

via "Naked Security".
?
08:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Flipboard data breach – what users should do now ⚠

Hugely popular news aggregation site Flipboard - one billion app downloads from Google Play and counting - has become the latest internet company to admit it has suffered a breach.

πŸ“– Read

via "Naked Security".
08:59
⚠ Unpatched Docker bug allows read-write access to host OS ⚠

Suse developer Aleksa Sarai has uncovered a bug in the way that the container framework handles path names.

πŸ“– Read

via "Naked Security".
?
10:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Q&A: Building Infosec Communities for Women πŸ•΄

Three security experts offer a sneak peek into their upcoming Black Hat USA talk on organizing female infosec communities in Korea, Japan and Taiwan.

πŸ“– Read

via "Dark Reading: ".
?
11:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to fix slow boot times in Windows 10 when other tips have failed πŸ”

Slow boot times can be extremely frustrating, but there is a trick to improve boot times in Windows 10 that may be worth a try.

πŸ“– Read

via "Security on TechRepublic".
11:19
πŸ” How to stop your interns from getting hacked: 6 tips πŸ”

With Generation Z's huge presence on social media, they are opening up more doors for hackers to infiltrate. Here's how to keep your interns protected.

πŸ“– Read

via "Security on TechRepublic".
11:21
❌ Nvidia Fixes High-Severity Flaws in GeForce Experience for Gamers ❌

Nvidia is urging gamers to update its GeForce Experience software after patching two high-severity vulnerabilities.

πŸ“– Read

via "Threatpost".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Focusing on Endpoints: 5 Steps to Fight Cybercrime πŸ•΄

Follow these best practices to strengthen endpoint management strategies and protect company data.

πŸ“– Read

via "Dark Reading: ".
11:45
πŸ•΄ SANS Launches Security Awareness Certification πŸ•΄

The SANS Security Awareness Professional (SSAP) will be available this summer to professionals focused on measuring and mitigating human risk.

πŸ“– Read

via "Dark Reading: ".
11:50
πŸ” Friday Five: 5/31 Edition πŸ”

Incentivizing healthcare orgs to adopt cybersecurity practices, malware targeting Linux systems, and Microsoft's call for federal data privacy - catch up on the week's infosec news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ GDPR's First-Year Impact By the Numbers πŸ•΄

The latest statistics on GDPR spending, compliance rates, enforcement, and consumer attitudes on privacy protection.

πŸ“– Read

via "Dark Reading: ".
?
15:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Checkers Breach Underscores Continued POS Dangers πŸ•΄

Attacks on point-of-sale terminals garners less attention these days, but the most recent breach of the restaurant chain shows hackers have not lost focus.

πŸ“– Read

via "Dark Reading: ".
?
16:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New SOAP Attack Hits South African Home Routers πŸ•΄

A huge wave of attacks is targeting home routers in South Africa for recruitment into a Hakai-based botnet.

πŸ“– Read

via "Dark Reading: ".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 5G Networks Spark Concerns For Enterprise Risks ❌

As 5G deployments continue to increase, what are the top security risks for enterprises? We discuss with an expert during GSMA's Mobile360 conference.

πŸ“– Read

via "Threatpost".
?
17:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Researcher Exploits Microsoft’s Notepad to β€˜Pop a Shell’ ❌

Google Project Zero researcher unearths a bug in Microsoft’s Notepad Windows application.

πŸ“– Read

via "Threatpost".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Gen Z Interns and Social Media: A Perfect Security Storm ❌

A lack of security training for interns, and their obsession with sharing content on social media, could lead to a perfect storm for hackers looking to collect social engineering data.

πŸ“– Read

via "Threatpost".
2 June 2019
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-18376

An improper authorization check in the User API in TheHive before 2.13.4 and 3.x before 3.3.1 allows users with read-only or read/write access to escalate their privileges to the administrator's privileges. This affects app/controllers/UserCtrl.scala.

πŸ“– Read

via "National Vulnerability Database".
3 June 2019
?
01:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to harden your macOS systems with Lynis πŸ”

Regularly checking your macOS systems for properly configured systems, apps, and services with Lynis helps administrators harden devices by minimizing their attack surface.

πŸ“– Read

via "Security on TechRepublic".
?
07:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 5G Security Challenges: A Vendor’s POV ❌

How will 5G vendors deal with the issues of security? Nokia's head of end-to-end security solutions discusses during the GSMA Mobile 360 conference.

πŸ“– Read

via "Threatpost".
07:22
⚠ G Suite users will have β€˜confidential’ Gmail mode set to ON by default ⚠

Google announced that on 25 June 2019, Gmail's confidential mode will be switched on by default as the feature becomes generally available.

πŸ“– Read

via "Naked Security".
?
07:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 17 stories of the week ⚠

From tackling anti-robocalling in the Senate to a data breach at a license plate reader company, here are last week's top infosec stories.

πŸ“– Read

via "Naked Security".
07:47
⚠ Fake news writer: If people are stupid enough to believe this stuff… ⚠

...then maybe they deserve this drivel, says a Macedonian copy-paste/turn-it-into-clickbait-bile writer who says it's all about the money.

πŸ“– Read

via "Naked Security".
?
08:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Going to Infosec Europe this week? Want a free T-shirt? ⚠

Are you making your way to Olympia, London for Infosec Europe this week? Stop by the stand, say the Phrase That Pays and we'll give you a free T-shirt.

πŸ“– Read

via "Naked Security".
?
08:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ New controversy erupts over Chrome ad blocking plans ⚠

Changes to extensions will limit the way that Chrome lets browsers block content - unless you're an enterprise user.

πŸ“– Read

via "Naked Security".
08:37
⚠ Your phone’s sensors could be used as a cookie you can’t delete ⚠

Researchers have found that a phone's gyroscope, accelerometer and other sensors create a unique fingerprint.

πŸ“– Read

via "Naked Security".
?
09:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MacOS Zero-Day Allows Trusted Apps to Run Malicious Code ❌

Apple 0-Day allows hackers to mimic mouse-clicks to allow malicious behavior on macOS Majove, despite mitigations.

πŸ“– Read

via "Threatpost".
?
10:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Employees beware: 33% of CEOs will fire you if you cause a cybersecurity breach πŸ”

Despite the risks, 90% of business leaders said they lack the resources to defend against a cyber attack, according to a Nominent report.

πŸ“– Read

via "Security on TechRepublic".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ GandCrab Ransomware Shutters Its Operations ❌

After a year of success, its operators say they earned millions -- and are ready to retire.

πŸ“– Read

via "Threatpost".
11:34
πŸ•΄ Certifiably Distracted: The Economics of Cybersecurity πŸ•΄

Is cybersecurity worth the investment? It depends.

πŸ“– Read

via "Dark Reading: ".
?
12:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” macOS Bug Yet Again Allows for Bypass of Security Protections πŸ”

The latest in a line of ways to bypass Apple's security safeguards was disclosed at the Objective By the Sea conference over the weekend.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Smart-TV Bug Allows Rogue Broadcasts ❌

An attacker could gain remote access by chaining together an exploit for home routers with the TV flaw.

πŸ“– Read

via "Threatpost".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to install CA certificates in Ubuntu server πŸ”

Having trouble getting CA certificates installed and recognized in Ubuntu Server? Find out how it's done with a few quick commands.

πŸ“– Read

via "Security on TechRepublic".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Majority of C-Level Executives Expect a Cyber Breach πŸ•΄

Survey of executives in the US and UK shows that worries abound -- about cyberattacks and the lack of resources to defend against them.

πŸ“– Read

via "Dark Reading: ".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WWDC 2019: Apple Takes Aim at Facebook on Privacy ❌

The iPhone-maker announced the 'Sign in with Apple' API, and restrictions on location-tracking.

πŸ“– Read

via "Threatpost".
?
16:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tap β€˜n Ghost Attack Creatively Targets Android Devices ❌

Researchers use malicious NFC tags and booby-trapped physical surfaces to connect Android devices to malicious wireless networks.

πŸ“– Read

via "Threatpost".
?
17:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-14853

The Orpak SiteOmat OrCU component is vulnerable to code injection, for all versions prior to 2017-09-25, due to a search query that uses a direct shell command. By tampering with the request, an attacker is able to run shell commands and receive valid output from the device.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2017-14852

An insecure communication was found between a user and the Orpak SiteOmat management console for all known versions, due to an invalid SSL certificate. The attack allows for an eavesdropper to capture the communication and decrypt the data.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2017-14851

A SQL injection vulnerability exists in all Orpak SiteOmat versions prior to 2017-09-25. The vulnerability is in the login page, where the authentication validation process contains an insecure SELECT query. The attack allows for authentication bypass.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2017-14850

All known versions of the Orpak SiteOmat web management console is vulnerable to multiple instances of Stored Cross-site Scripting due to improper external user-input validation. An attacker with access to the web interface is able to hijack sessions or navigate victims outside of SiteOmat, to a malicious server owned by him.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2017-14728

An authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and HTTP remote authentication open to public.

πŸ“– Read

via "National Vulnerability Database".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Baltimore Ransomware Attacker Was Behind Now-Suspended Twitter Account πŸ•΄

Researchers at Armor were able to confirm the person or persons behind a Twitter account that appeared to be leaking confidential files was the actual ransomware attacker that hit the city.

πŸ“– Read

via "Dark Reading: ".
?
19:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Urges Businesses to Patch 'BlueKeep' Flaw πŸ•΄

Fearing another worm of WannaCry severity, Microsoft warns vulnerable users to apply the software update for CVE-2019-0708.

πŸ“– Read

via "Dark Reading: ".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-14854

A stack buffer overflow exists in one of the Orpak SiteOmat CGI components, allowing for remote code execution. The vulnerability affects all versions prior to 2017-09-25.

πŸ“– Read

via "National Vulnerability Database".
?
20:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Zebrocy APT Group Expands Malware Arsenal with New Backdoor Family πŸ•΄

Group's constant experimentation and malware changes are complicating efforts for defenders, Kaspersky Lab says.

πŸ“– Read

via "Dark Reading: ".
4 June 2019
?
06:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple sunsets iTunes ⚠

RIP iTunes, hello to the standalone Music, Podcasts and TV apps that are taking its place.

πŸ“– Read

via "Naked Security".
?
07:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Infosecurity Europe: Cryptojacking is Making a Comeback ❌

At Infosecurity Europe, a security expert from Guardicore discusses a new cryptomining malware campaign called Nanshou and why the cryptojacking threat is set to get worse.

πŸ“– Read

via "Threatpost".
?
07:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US visa applicants required to hand over social media info ⚠

As of Friday, it's no longer optional - the US is been asking for five years of social media information.

πŸ“– Read

via "Naked Security".
?
08:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ GandCrab ransomware service shuts up shop ⚠

The authors of the GandCrab ransomware strain are shutting their ransomware-as-a-service portal, allegedly walking away with a cool $150m.

πŸ“– Read

via "Naked Security".
?
09:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Synthetic clicks and the macOS flaw Apple can’t seem to fix ⚠

A researcher has found a way to abuse synthetic clicks in macOS "Catalina", and it hasn’t even shipped yet.

πŸ“– Read

via "Naked Security".
?
10:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Employees are almost as dangerous to business security as hackers and cybercriminals πŸ”

Non-malicious insiders are among the top three threat actors, according to an ISACA report.

πŸ“– Read

via "Security on TechRepublic".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your customers' personal identifiable information πŸ”

Personal identifiable information (PII) was the leading type of data breach in 2018, accounting for 97% of all breaches, according to a ForgeRock report.

πŸ“– Read

via "Security on TechRepublic".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What Cyber Skills Shortage? πŸ•΄

Employers can solve the skills gap by first recognizing that there isn't an archetypal "cybersecurity job" in the same way that there isn't an archetypal "automotive job." Here's how.

πŸ“– Read

via "Dark Reading: ".
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ A New Approach for Combating Insider Threats ❌

Threat detection tools don't take into account the emotional aspect of insider threats, a panel of experts said at Infosecurity Europe this week.

πŸ“– Read

via "Threatpost".
?
12:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Imperva Snaps Up Distil Networks for API, App Security πŸ•΄

Distil Networks' technology will be integrated into Imperva's security stack following the acquisition.

πŸ“– Read

via "Dark Reading: ".
?
13:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ AI Isn’t Good Enough When Lives Are on the Line, Experts Warn ❌

During Infosecurity Europe in London this week, cybersecurity experts sounded off on worries about artificial intelligence being used for nation state cyber weapons.

πŸ“– Read

via "Threatpost".
?
13:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Medical Debt Collector Breach Highlights Supply Chain Dangers πŸ•΄

The breach of the website of American Medical Collection Agency leaves the personal and financial information of nearly 12 million patients at risk.

πŸ“– Read

via "Dark Reading: ".
?
14:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” GandCrab Ransomware Gang Calling It Quits πŸ”

The cybercriminals are reportedly winding down operations around the ransomware after claiming to have made $2 billion in ransom payments

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why FedRAMP Matters to Non-Federal Organizations πŸ•΄

Commercial companies should explore how FedRAMP can help mitigate risk as they move to the cloud.

πŸ“– Read

via "Dark Reading: ".
15:29
πŸ” 6 questions to consider before implementing a disaster recovery plan πŸ”

DRP's are about backing up data and recovering from loss as efficiently as possible, but a plan is only as good as its weakest link.

πŸ“– Read

via "Security on TechRepublic".
?
15:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zebrocy: A Russian APT Specializing in Victim Profiling, Access ❌

The Russian-speaking APT acts as a support group for high-profile APTs like Sofacy and BlackEnergy.

πŸ“– Read

via "Threatpost".
?
16:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Today's Cybercriminals Sneak into Your Inbox πŸ•΄

The tactics and techniques most commonly used to slip past security defenses and catch employees off guard.

πŸ“– Read

via "Dark Reading: ".
?
17:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zero-Day No More: Windows Bug Gets a Fix ❌

0patch has released an interim micropatch for the dangerous LPE bug while we wait for Microsoft's official patch.

πŸ“– Read

via "Threatpost".
?
17:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Container Components That Increase a Network's Security πŸ•΄

A proof of concept at Interop19 showed just how simple a container deployment can be.

πŸ“– Read

via "Dark Reading: ".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Robbinhood: Inside the Ransomware That Slammed Baltimore πŸ•΄

Attackers appear to have used a ransomware-as-a-service platform to wage the attack.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ 2.8 Billion US Consumer Records Lost in 2018 πŸ•΄

Healthcare breaches grew 400%, study shows.

πŸ“– Read

via "Dark Reading: ".
18:38
❌ Is β€˜Sign in with Apple’ Marketing Spin or Privacy Magic? Experts Weigh In ❌

The login scheme promises it won't share data -- and will be required for all developers using third-party sign-ins.

πŸ“– Read

via "Threatpost".
?
19:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Carbanak Attack: Two Hours to Total Compromise πŸ•΄

Investigation of the cybercrime group's attack on an East European bank shows how some attackers require very little time to broaden their access and establish persistence on a network.

πŸ“– Read

via "Dark Reading: ".
19:26
ATENTIONβ€Ό New - CVE-2018-13384

A Host Header Redirection vulnerability in Fortinet FortiOS all versions below 6.0.5 under SSL VPN web portal allows a remote attacker to potentially poison HTTP cache and subsequently redirect SSL VPN web portal users to arbitrary web domains.

πŸ“– Read

via "National Vulnerability Database".
19:26
ATENTIONβ€Ό New - CVE-2018-13382

An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
19:26
ATENTIONβ€Ό New - CVE-2018-13381

A buffer overflow vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4 and below versions under SSL VPN web portal allows a non-authenticated attacker to perform a Denial-of-service attack via special craft message payloads.

πŸ“– Read

via "National Vulnerability Database".
19:26
ATENTIONβ€Ό New - CVE-2018-13380

A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4 and below versions under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters.

πŸ“– Read

via "National Vulnerability Database".
19:26
ATENTIONβ€Ό New - CVE-2018-13379

An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.

πŸ“– Read

via "National Vulnerability Database".
?
20:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Adware Hidden in Android Apps Downloaded More Than 440 Million Times πŸ•΄

The heavily obfuscated adware was found in 238 different apps on Google Play.

πŸ“– Read

via "Dark Reading: ".
5 June 2019
?
08:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple battles Facebook and Google with rival sign in service ⚠

Apple's WWDC was full of surprises including a new feature designed to make signing up for websites more private: Sign In with Apple.

πŸ“– Read

via "Naked Security".
08:07
⚠ ATM skimming crook behind bars after draining bank accounts for 2 years ⚠

A multi-state ATM card-skimming spree netted his gang over $800k from 531 people's bank accounts.

πŸ“– Read

via "Naked Security".
?
08:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple bans ads, third-party tracking in apps meant for kids ⚠

The new policy: Ditch third-party trackers in apps designed for youngsters, lest the app get booted out of the App Store.

πŸ“– Read

via "Naked Security".
08:37
⚠ Patch Android! June 2019 update fixes eight critical flaws ⚠

It's that time again. June's patches for Android are here.

πŸ“– Read

via "Naked Security".
08:38
❌ Newly-Identified BEC Cybergang Targets U.S. Enterprise Victims ❌

At Infosecurity Europe, researchers detailed a cybergang that grew from a one-man shop launching Craigslist scams to a full-on enterprise BEC group.

πŸ“– Read

via "Threatpost".
08:38
❌ Podcast: Behind-the-Scenes Look at Scattered Canary BEC Cybergang ❌

At Infosecurity Europe, Threatpost gets a behind-the-scenes look at the discovery of BEC cybergang Scattered Canary.

πŸ“– Read

via "Threatpost".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” iOS developers still failing to build end-to-end encryption into apps πŸ”

Despite a mandate from Apple, 68% of developers disable ATS globally on their apps, according to a Wandera report.

πŸ“– Read

via "Security on TechRepublic".
11:13
❌ Why Election Trust is Dwindling in a Post-Cambridge Analytica World ❌

As more data is collected, shared and sold, people are growing increasingly distrustful of technology, an expert said at Infosecurity Europe Wednesday.

πŸ“– Read

via "Threatpost".
11:18
❌ BlueKeep β€˜Mega-Worm’ Looms as Fresh PoC Shows Full System Takeover ❌

A working exploit for the critical remote code-execution flaw shows how an unauthenticated attacker can achieve full run of a victim machine in about 22 seconds.

πŸ“– Read

via "Threatpost".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISOs & CIOs: Better Together πŸ•΄

An overview of three common organizational structures illustrates how NOT to pit chief security and IT execs against each other.

πŸ“– Read

via "Dark Reading: ".
11:52
πŸ” Digital Guardian Wins Best Data Leakage Prevention (DLP) Solution at SC Awards Europe 2019 πŸ”

We're excited to share that Digital Guardian won the Best Data Leakage Prevention (DLP) Solution at the 2019 SC Awards Europe!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NSA Issues Advisory for 'BlueKeep' Vulnerability πŸ•΄

The National Security Agency joins Microsoft in urging Windows admins to patch wormable bug CVE-2019-0708.

πŸ“– Read

via "Dark Reading: ".
13:43
❌ Infosecurity Europe: Easing the Clash Between IT and OT ❌

Experts at Infosecurity Europe shed light on how IT and operational technology teams can better collaborate as industrial IoT takes hold.

πŸ“– Read

via "Threatpost".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-7122

A remote disclosure of information vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.

πŸ“– Read

via "National Vulnerability Database".
14:36
ATENTIONβ€Ό New - CVE-2018-7121

A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.

πŸ“– Read

via "National Vulnerability Database".
14:36
ATENTIONβ€Ό New - CVE-2018-18571

An Incorrect Access Control vulnerability has been identified in Citrix XenMobile Server 10.8.0 before Rolling Patch 6 and 10.9.0 before Rolling Patch 3. An attacker can impersonate and take actions on behalf of any Mobile Application Management (MAM) enrolled device.

πŸ“– Read

via "National Vulnerability Database".
14:36
ATENTIONβ€Ό New - CVE-2017-6261

NVIDIA?s Vibrante Linux version 1.1, 2.0, and 2.2 contains a vulnerability in the user space driver in which protection mechanisms are insufficient, may lead to denial of service or information disclosure

πŸ“– Read

via "National Vulnerability Database".
?
15:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Get the Most Benefits from Biometrics πŸ•΄

Providing an easy-to-use, uniform authentication experience without passwords is simpler than you may think.

πŸ“– Read

via "Dark Reading: ".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: WWDC, dangerous employees and prescriptive analytics πŸ”

This weeks TechRepublic and ZDNet news stories, include highlights from WWDC, a warning to employers regarding employee security and what you need to know about prescriptive analytics.

πŸ“– Read

via "Security on TechRepublic".
16:39
πŸ” Salesforce's Parker Harris on managing complex IT integrations and handing the inevitable crisis πŸ”

At Salesforce TrailheaDX 2019, Parker Harris shared his advice for tech leaders on everything from multiplatform integration to managing a crisis.

πŸ“– Read

via "Security on TechRepublic".
16:39
πŸ” Salesforce's Parker Harris offers CXO insights for managing complex IT integrations and handing the inevitable crisis πŸ”

At Salesforce TrailheaDX 2019, Parker Harris shared his advice for tech leaders on everything from multiplatform integration to managing a crisis.

πŸ“– Read

via "Security on TechRepublic".
16:49
πŸ” Tech news roundup: WWDC, dangerous employees, and prescriptive analytics πŸ”

This weeks TechRepublic and ZDNet news stories, include highlights from WWDC, a warning to employers regarding employee security and what you need to know about prescriptive analytics.

πŸ“– Read

via "Security on TechRepublic".
16:53
❌ Mozilla and Google Browsers Get Security, Anti-Tracking Boosts ❌

Both FireFox and Chrome have received updates to better guard users against privacy and security threats, such as tracking by Facebook.

πŸ“– Read

via "Threatpost".
16:59
πŸ•΄ SentinelOne Raises $120M in Series D Funding πŸ•΄

The endpoint security company already has specific plans for the new funds.

πŸ“– Read

via "Dark Reading: ".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 440 Million Android Users Plagued By Extremely Obnoxious Pop-Ups ❌

The mobile ad plugin, found in hundreds of Google Play apps, uses well-honed techniques from malware development to hide itself.

πŸ“– Read

via "Threatpost".
?
18:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Buggy Phishing Kits Allow Criminals to Cannibalize Their Own ❌

The vulnerable kits also offer a point of entry to compromise legitimate website servers.

πŸ“– Read

via "Threatpost".
?
19:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Finds Thousands of iOS Apps Ignoring Security πŸ•΄

A critical data encryption tool, included by default in iOS, is being turned off in more than two-thirds of popular apps.

πŸ“– Read

via "Dark Reading: ".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Healthcare Breach Expands to 19.6 Million Patient Accounts πŸ•΄

LabCorp says its third-party debt-collection provider, AMCA, notified the company that information on 7.7 million patients had leaked. Expect more healthcare companies to come forward.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Vietnam Rises as Cyberthreat πŸ•΄

The country's rapid economic growth and other factors are driving an increase in cybercrime and cyber espionage activity.

πŸ“– Read

via "Dark Reading: ".
?
20:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why open sourcerors might want to ditch Android for iOS πŸ”

Apple has long been the proprietary bad guy, but Google’s privacy-sucking ways in Android should give open source freedom fighters reason to consider switching.

πŸ“– Read

via "Security on TechRepublic".
?
21:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-10171

Kromtech MacKeeper 3.20.4 suffers from a root privilege escalation vulnerability through its `com.mackeeper.AdwareAnalyzer.AdwareAnalyzerPrivilegedHelper` component. The AdwareAnalzyerPrivilegedHelper tool implements an XPC service that allows an unprivileged application to connect and execute shell scripts as the root user.

πŸ“– Read

via "National Vulnerability Database".
6 June 2019
?
02:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-2028

IBM Maximo Asset Management 7.6 could allow a an authenticated user to replace a target page with a phishing site which could allow the attacker to obtain highly sensitive information. IBM X-Force ID: 155554.

πŸ“– Read

via "National Vulnerability Database".
?
08:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Gang charged with $19 million iPhone scam ⚠

It was a well-oiled business, with Top Dogs fencing devices, forgers cooking up fake IDs with stolen PII, and runners ripping off phones.

πŸ“– Read

via "Naked Security".
08:13
⚠ YouTube bans kids’ live-streaming without an adult present ⚠

In another step to scrape pedophiles off the bottom of its shoe YouTubeΒ is banning youngsters from live-streaming without adult supervision.

πŸ“– Read

via "Naked Security".
?
09:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft dismisses new Windows RDP β€˜bug’ as a feature ⚠

Researchers have found an unexpected behavior in a Windows feature designed to protect remote sessions.

πŸ“– Read

via "Naked Security".
09:13
⚠ Firefox aims at Google with Enhanced Tracking Prevention ⚠

The latest version of Firefox, 67.0.1, features a fully-fledged version of Mozilla’s Enhanced Tracking Protection (ETP) privacy system.

πŸ“– Read

via "Naked Security".
?
09:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization against modular malware πŸ”

Modular malware attacks have surged since the start of 2019, according to Barracuda Networks.

πŸ“– Read

via "Security on TechRepublic".
09:48
❌ IoT Security Regulation is on the Horizon ❌

Ken Munro of Pen Test Partners hopes to see regulation for connected-device security in 2020.

πŸ“– Read

via "Threatpost".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Pitfalls to Data Discovery and Classification πŸ”

20 Data Scientists & Security Pros Reveal the Most Common Pitfalls to Data Discovery and Classification

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 2019 State of DevOps πŸ•΄

DevOps is needed in today's business environment, where improved application security is essential and users demand more applications, services, and features - fast. We sought to see where DevOps adoption and deployment stand, this report summarizes our survey findings. Find out what the survey revealed today.

πŸ“– Read

via "Dark Reading: ".
11:09
πŸ” 5 security problems that annoy CIOs and CISOs the most πŸ”

CIOs and CISOs continue battling with security issues in the enterprise, but improving staff tech skills isn't the only solution, according to Exabeam.

πŸ“– Read

via "Security on TechRepublic".
?
11:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Streaming Video Fans Open to TV Hijacking ❌

Critical bugs impact a widely deployed streaming platform, common in the U.S. and elsewhere.

πŸ“– Read

via "Threatpost".
11:39
πŸ•΄ When Security Goes Off the Rails πŸ•΄

Cyber can learn a lot from the highly regulated world of rail travel. The most important lesson: the value of impartial analysis.

πŸ“– Read

via "Dark Reading: ".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hackers take aim at Fortune 500 companies on the Dark Web πŸ”

Dark Web listings with the potential to harm the enterprise are up 20% since 2016, according to Bromium.

πŸ“– Read

via "Security on TechRepublic".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Windows 10 passwords won't expire: Why Microsoft says this will make your account safer πŸ”

Changing passwords frequently is not only a pain, but also unsafe, according to Microsoft. Here's why the company's decision to remove password expirations is a good one.

πŸ“– Read

via "Security on TechRepublic".
?
14:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Inside the Criminal Businesses Built to Target Enterprises πŸ•΄

Researchers witness an increase in buying and selling targeted hacking services, custom malware, and corporate network access on the Dark Web.

πŸ“– Read

via "Dark Reading: ".
?
14:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ High-Severity Bug in Cisco Industrial Enterprise Tool Allows RCE ❌

Bug allows for a remote attacker to execute arbitrary code on industrial, enterprise tools.

πŸ“– Read

via "Threatpost".
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyber Talent Gap? Don't Think Like Tinder! πŸ•΄

If your company truly is a great place to work, make sure your help-wanted ads steer clear of these common job-listing cliches.

πŸ“– Read

via "Dark Reading: ".
15:04
πŸ•΄ 6 Security Scams Set to Sweep This Summer πŸ•΄

Experts share the cybersecurity threats to watch for and advice to stay protected.

πŸ“– Read

via "Dark Reading: ".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ AMCA Healthcare Hack Widens Again, Reaching 20.1M Victims ❌

OPKO subsidiary BioReference joins Quest and LabCorp in the supply-chain incident.

πŸ“– Read

via "Threatpost".
?
17:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-9839

An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the 'm_id' parameter), any user with REPORTER access or above is able to view any private issue's details (summary, description, steps to reproduce, additional information) when cloning it. By checking the 'Copy issue notes' and 'Copy attachments' checkboxes and completing the clone operation, this data also becomes public (except private notes).

πŸ“– Read

via "National Vulnerability Database".
17:28
ATENTIONβ€Ό New - CVE-2018-8047

vtiger CRM 7.0.1 is affected by one reflected Cross-Site Scripting (XSS) vulnerability affecting version 7.0.1 and probably prior versions. This vulnerability could allow remote unauthenticated attackers to inject arbitrary web script or HTML via index.php?module=Contacts&view=List (app parameter).

πŸ“– Read

via "National Vulnerability Database".
?
18:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ADT Teams Up with SonicWall for SMB Security Services πŸ•΄

More than half of all SMBs plan to rely on third party providers for their security tools and services, according to IDC.

πŸ“– Read

via "Dark Reading: ".
?
18:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Senior Executives More Involved with SOC Operations, Report Finds πŸ•΄

But they are still subject to the same alert fatigue and false-positive issues their junior employees face.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Feds Make New Arrest in Darkode Case πŸ•΄

Another American was arrested and charged alongside three international suspects who remain at large, according to newly unsealed indictment.

πŸ“– Read

via "Dark Reading: ".
?
19:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cisco Buys Sentryo πŸ•΄

Cisco is adding the French company's network visibility products to its IoT network lineup.

πŸ“– Read

via "Dark Reading: ".
7 June 2019
?
05:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ The FBI is sitting on more than 641m photos of people’s faces ⚠

Its already massive facial recognition databases have ballooned, and government watchdog GAO found that the FBI isn't checking accuracy.

πŸ“– Read

via "Naked Security".
?
06:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers eavesdrop on smartphone finger taps ⚠

Researchers have been experimenting with a novel way to eavesdrop on what you're typing on your smartphone - by listening to the taps of your fingers.

πŸ“– Read

via "Naked Security".
?
09:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Minefield of Corporate Email πŸ•΄

Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.

πŸ“– Read

via "Dark Reading: ".
09:23
⚠ What’s the best approach to patching vulnerabilities? ⚠

Researchers ask: with only 1 in 20 vulnerabilities exploited, what's the best approach to patching?

πŸ“– Read

via "Naked Security".
09:28
⚠ Action required! Exim mail servers need urgent patching ⚠

Researchers have discovered another dangerous security hole hiding in recent, unpatched versions of the internet’s most popular mail server, Exim.

πŸ“– Read

via "Naked Security".
?
09:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 6/7 Edition πŸ”

The latest trade secret case, a more strict privacy bill for New York State, and the European Data Protection Supervisor's warning - catch up on the week's news with this recap!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Learn the Latest Hacking Techniques at Black Hat Trainings Virginia πŸ•΄

At Black Hat's upcoming Trainings-only October event you'll have opportunities to get up to speed on the newest hacking tricks for operating systems and cloud providers.

πŸ“– Read

via "Dark Reading: ".
10:18
❌ Troy Hunt: β€˜Messy’ Password Problem Isn’t Getting Better ❌

Poor password hygiene continues to plague the security industry, Troy Hunt said during Infosecurity Europe.

πŸ“– Read

via "Threatpost".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Threatlist: Targeted Espionage-as-a-Service Takes Hold on the Dark Web ❌

One in four underground merchants offer advanced hacking services, once reserved for APTs and well-funded organized crime gangs.

πŸ“– Read

via "Threatpost".
11:09
πŸ•΄ End User Lockdown: Dark Reading Caption Contest Winners πŸ•΄

Phishing, cybersecurity training, biometrics and casual Fridays. And the winners are ...

πŸ“– Read

via "Dark Reading: ".
?
11:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: Infosecurity Europe Highlights and BlueKeep Anxiety ❌

The Threatpost editors discuss the highlights from Infosecurity Europe, which took place in London this week.

πŸ“– Read

via "Threatpost".
?
12:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Autonomous versus automated: What each means and why it matters πŸ”

The terms autonomous and automated often get mixed up. When designing security strategies, knowing the distinctions between the two has its perks.

πŸ“– Read

via "Security on TechRepublic".
?
12:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ SandboxEscaper Debuts ByeBear Windows Patch Bypass ❌

SandboxEscaper is back, with a second bypass for the recent CVE-2019-0841 Windows patch.

πŸ“– Read

via "Threatpost".
?
14:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Forget BlueKeep: Beware the GoldBrute ❌

A botnet has appeared that has attempted to brute-force 1.5 million RDP connections to Windows systems in the last few days β€” and counting.

πŸ“– Read

via "Threatpost".
14:33
ATENTIONβ€Ό New - CVE-2018-6185

In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.

πŸ“– Read

via "National Vulnerability Database".
14:33
ATENTIONβ€Ό New - CVE-2018-5798

This CVE relates to an unspecified cross site scripting vulnerability in Cloudera Manager.

πŸ“– Read

via "National Vulnerability Database".
14:33
ATENTIONβ€Ό New - CVE-2018-5265

Ubiquiti EdgeOS 1.9.1 on EdgeRouter Lite devices allows remote attackers to execute arbitrary code with admin credentials, because /opt/vyatta/share/vyatta-cfg/templates/system/static-host-mapping/host-name/node.def does not sanitize the 'alias' or 'ips' parameter for shell metacharacters.

πŸ“– Read

via "National Vulnerability Database".
?
15:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-20135

Samsung Galaxy Apps before 4.4.01.7 allows modification of the hostname used for load balancing on installations of applications through a man-in-the-middle attack. An attacker may trick Galaxy Apps into using an arbitrary hostname for which the attacker can provide a valid SSL certificate, and emulate the API of the app store to modify existing apps at installation time. The specific flaw involves an HTTP method to obtain the load-balanced hostname that enforces SSL only after obtaining a hostname from the load balancer, and a missing app signature validation in the application XML. An attacker can exploit this vulnerability to achieve Remote Code Execution on the device. The Samsung ID is SVE-2018-12071.

πŸ“– Read

via "National Vulnerability Database".
15:38
ATENTIONβ€Ό New - CVE-2018-20091

An SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs.

πŸ“– Read

via "National Vulnerability Database".
15:49
πŸ•΄ Massive Changes to Tech and Platforms, But Cybercrime? Not So Much πŸ•΄

The still-relevant recommendation is to invest more in law enforcement, concludes an economic study of cybercrime.

πŸ“– Read

via "Dark Reading: ".
16:03
ATENTIONβ€Ό New - CVE-2018-20014

In UrBackup 2.2.6, an attacker can send a malformed request to the client over the network, and trigger a fileservplugin/CClientThread.cpp CClientThread::GetFileHashAndMetadata NULL pointer dereference, leading to shutting down the client application.

πŸ“– Read

via "National Vulnerability Database".
16:03
ATENTIONβ€Ό New - CVE-2018-19999

The local management interface in SolarWinds Serv-U FTP Server 15.1.6.25 has incorrect access controls that permit local users to bypass authentication in the application and execute code in the context of the Windows SYSTEM account, leading to privilege escalation. To exploit this vulnerability, an attacker must have local access the the host running Serv-U, and a Serv-U administrator have an active management console session.

πŸ“– Read

via "National Vulnerability Database".
16:03
ATENTIONβ€Ό New - CVE-2018-19860

Broadcom firmware before summer 2014 on Nexus 5 BCM4335C0 2012-12-11, Raspberry Pi 3 BCM43438A1 2014-06-02, and unspecifed other devices does not properly restrict LMP commnds and executes certain memory contents upon receiving an LMP command, as demonstrated by executing an HCI command.

πŸ“– Read

via "National Vulnerability Database".
16:03
ATENTIONβ€Ό New - CVE-2018-19802

aubio v0.4.0 to v0.4.8 has a Buffer Overflow (issue 2 of 3).

πŸ“– Read

via "National Vulnerability Database".
16:03
ATENTIONβ€Ό New - CVE-2018-19801

aubio v0.4.0 to v0.4.8 has a NULL pointer dereference (issue 1 of 6).

πŸ“– Read

via "National Vulnerability Database".
16:13
ATENTIONβ€Ό New - CVE-2018-19800

aubio v0.4.0 to v0.4.8 has a Buffer Overflow (issue 1 of 3).

πŸ“– Read

via "National Vulnerability Database".
16:13
ATENTIONβ€Ό New - CVE-2018-19465

Maccms through 8.0 allows XSS via the site_keywords field to index.php?m=system-config because of tpl/module/system.php and tpl/html/system_config.html, related to template/paody/html/vod_index.html.

πŸ“– Read

via "National Vulnerability Database".
16:13
ATENTIONβ€Ό New - CVE-2018-19462

admin\db\DoSql.php in EmpireCMS through 7.5 allows remote attackers to execute arbitrary PHP code via SQL injection that uses a .php filename in a SELECT INTO OUTFILE statement to admin/admin.php.

πŸ“– Read

via "National Vulnerability Database".
16:13
ATENTIONβ€Ό New - CVE-2018-19461

admin\db\DoSql.php in EmpireCMS through 7.5 allows XSS via crafted SQL syntax to admin/admin.php.

πŸ“– Read

via "National Vulnerability Database".
16:18
ATENTIONβ€Ό New - CVE-2018-19452

A use after free in the TextBox field Mouse Enter action in IReader_ContentProvider can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031. An attacker can leverage this to gain remote code execution. Relative to CVE-2018-19444, this has a different free location and requires different JavaScript code for exploitation.

πŸ“– Read

via "National Vulnerability Database".
16:23
ATENTIONβ€Ό New - CVE-2018-19451

A command injection can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031 when using the Open File action on a Field. An attacker can leverage this to gain remote code execution.

πŸ“– Read

via "National Vulnerability Database".
?
16:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5 reasons why you should use a password manager πŸ”

Need a reason to use a password manager? How about five?

πŸ“– Read

via "Security on TechRepublic".
?
17:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Vulnerability Found in Millions of Email Systems πŸ•΄

The vuln could allow remote execution of code with root privilege in more than 4.1 million systems.

πŸ“– Read

via "Dark Reading: ".
?
19:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Flaws in Amcrest HDSeries Camera Allow Complete Takeover ❌

Time's up on public disclosure of six serious bugs impacting the vendor’s IPM-721S model security camera.

πŸ“– Read

via "Threatpost".
?
19:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Dark Web Becomes a Haven for Targeted Hits πŸ•΄

Malware on the Dark Web is increasingly being customized to target specific organizations and executives.

πŸ“– Read

via "Dark Reading: ".
19:28
ATENTIONβ€Ό New - CVE-2018-10703

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_serverip" is susceptible to buffer overflow. By crafting a packet that contains a string of 480 characters, it is possible for an attacker to execute the attack.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10702

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to command injection via shell metacharacters.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10701

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10700

An issue was discovered on Moxa AWK-3121 1.19 devices. It provides functionality so that an administrator can change the name of the device. However, the same functionality allows an attacker to execute XSS by injecting an XSS payload. The POST parameter "iw_board_deviceName" is susceptible to this injection.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10699

An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides certfile upload functionality so that an administrator can upload a certificate file used for connecting to the wireless network. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_privatePass" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10698

An issue was discovered on Moxa AWK-3121 1.14 devices. The device enables an unencrypted TELNET service by default. This allows an attacker who has been able to gain an MITM position to easily sniff the traffic between the device and the user. Also an attacker can easily connect to the TELNET daemon using the default credentials if they have not been changed by the user.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10697

An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10696

An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a web interface to allow an administrator to manage the device. However, this interface is not protected against CSRF attacks, which allows an attacker to trick an administrator into executing actions without his/her knowledge, as demonstrated by the forms/iw_webSetParameters and forms/webSetMainRestart URIs.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10695

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an administrator can send emails to his/her account when there are changes to the device's network. However, the same functionality allows an attacker to execute commands on the device. The POST parameters "to1,to2,to3,to4" are all susceptible to buffer overflow. By crafting a packet that contains a string of 678 characters, it is possible for an attacker to execute the attack.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10694

An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default. An administrator who uses the open wireless connection to set up the device can allow an attacker to sniff the traffic passing between the user's computer and the device. This can allow an attacker to steal the credentials passing over the HTTP connection as well as TELNET traffic. Also an attacker can MITM the response and infect a user's computer very easily as well.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10693

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to a buffer overflow. By crafting a packet that contains a string of 516 characters, it is possible for an attacker to execute the attack.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10692

An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not have an HttpOnly flag. This allows an attacker who is able to execute a cross-site scripting attack to steal the cookie very easily.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10691

An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can download /systemlog.log (the system log). However, the same functionality allows an attacker to download the file without any authentication or authorization.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2018-10690

An issue was discovered on Moxa AWK-3121 1.14 devices. The device by default allows HTTP traffic thus providing an insecure communication mechanism for a user connecting to the web server. This allows an attacker to sniff the traffic easily and allows an attacker to compromise sensitive data such as credentials.

πŸ“– Read

via "National Vulnerability Database".
10 June 2019
?
01:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Seriously, stop using qwerty as a password--enlist these password strategies instead πŸ”

Users understand that their passwords or security protocols are weak, but they may not understand the consequences until it's too late.

πŸ“– Read

via "Security on TechRepublic".
?
05:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 21 stories of the week ⚠

From the vulnerable Windows RDS 'feature' to the privacy of US visa applicants - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
07:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Online shops fear 2FA at checkout will increase abandoned carts ⚠

A report says the EU will lose $64b per year once new 2FA rules go into effect, but we support Strong Customer Authentication (SCA) wholeheartedly.

πŸ“– Read

via "Naked Security".
?
07:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Laptops used in 2016 NC poll to be examined by Feds – after 2.5 years ⚠

The e-voting vendor in North Carolina was spearphished days before the election but still went ahead and used remote access software.

πŸ“– Read

via "Naked Security".
07:40
⚠ Cryptocurrency attack thwarted by npm team ⚠

Cryptocurrency users narrowly escaped losing all their funds last week after an attacker poisoned a digital wallet with malicious code that stole their blockchain access details.

πŸ“– Read

via "Naked Security".
?
08:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ The GoldBrute botnet is trying to crack open 1.5 million RDP servers ⚠

Even its most optimistic users would have to concede that it’s been a bracing few weeks for anyone who relies on Microsoft’s Remote Desktop Protocol (RDP).

πŸ“– Read

via "Naked Security".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat USA Offers Fresh Perspectives on Enterprise Cybersecurity πŸ•΄

Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.

πŸ“– Read

via "Dark Reading: ".
?
11:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Unmixed Messages: Bringing Security & Privacy Awareness Together πŸ•΄

Security and privacy share the same basic goals, so it just makes sense to combine efforts in those two areas. But that can be easier said than done.

πŸ“– Read

via "Dark Reading: ".
?
11:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft warns of time-travelling equation exploit – are you safe? ⚠

An Office bug that was squashed back in 2017 is still in widespread use - make sure your computer hasn't slipped through the patch cracks!

πŸ“– Read

via "Naked Security".
11:56
❌ VLC Player Gets Patched for Two High-Severity Bugs ❌

Popular media player receives 33 security bug fixes, two of which are rated high severity.

πŸ“– Read

via "Threatpost".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Headline Test πŸ•΄

Security Headline Test

πŸ“– Read

via "Dark Reading: ".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Lone Wolf' Scammer Built a Multifaceted BEC Cybercrime Operation πŸ•΄

A one-man 419 scam evolved into a lucrative social-engineering syndicate over the past decade that conducts a combination of business email compromise, romance, and financial fraud.

πŸ“– Read

via "Dark Reading: ".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Headline Test πŸ•΄

Security Headline Test

πŸ“– Read

via "Dark Reading: ".
12:59
πŸ” How to integrate Spamassassin with Postfix Mail Server πŸ”

The task of preventing the never-ending flow of spam gets a bit simpler with Spamassassin and Postfix.

πŸ“– Read

via "Security on TechRepublic".
12:59
πŸ” Want less spam? Learn how to integrate Spamassassin with Postfix Mail Server πŸ”

The task of preventing the never-ending flow of spam gets a bit simpler with Spamassassin and Postfix.

πŸ“– Read

via "Security on TechRepublic".
?
13:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Warns of Email Attacks Executing Code Using an Old Bug ❌

The flaw affected all versions of Microsoft Office, Microsoft Windows and architecture types dating back to 2000, and was patched in November 2017.

πŸ“– Read

via "Threatpost".
?
14:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ How to Model Risk in an Apex Predator Cyber-World ❌

Large-scale existential threats exist everywhere and can annihilate us with only trivial effort. Should we all throw everything we can at them?

πŸ“– Read

via "Threatpost".
14:54
πŸ” Stop ignoring hybrid cloud security risks πŸ”

Karen Roby talks with a security expert about safeguarding the enterprise in a hybrid IT world.

πŸ“– Read

via "Security on TechRepublic".
?
15:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Breaking Down LGPD, Brazil’s New Data Protection Law πŸ”

Brazil's GDPR-like data protection law, LGPD, owes a lot to the EU regulation but has several key differences that organizations that do business in the country should be familiar with.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ GoldBrute Botnet Brute-Forcing 1.5M RDP Servers πŸ•΄

Botnets are scanning the Internet for servers exposing RDP and using weak, reused passwords to obtain access.

πŸ“– Read

via "Dark Reading: ".
?
17:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Photos: Cisco Live 2019 keynote and highlights πŸ”

TechRepublic's Teena Maddox attended Cisco's premier education and training event for IT professionals in San Diego, CA.

πŸ“– Read

via "Security on TechRepublic".
?
18:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WordPress Sites Worldwide Hit with β€˜Call-Girl’ Search-Engine Pollution ❌

A web spam campaign targeting Koreans is affecting non-hacked websites worldwide.

πŸ“– Read

via "Threatpost".
18:26
❌ Mozilla Confirms Premium Firefox Browser With Security Features ❌

A future premium Firefox browser could come with security features like VPN and secure cloud solutions.

πŸ“– Read

via "Threatpost".
?
18:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Stop ignoring hybrid cloud security risks πŸ”

Karen Roby talks with Ping Identity security expert about safeguarding the enterprise in a hybrid IT world.

πŸ“– Read

via "Security on TechRepublic".
?
19:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Voting Machine Vendor Shifts Gears & Pushes for Backup Paper Ballots πŸ•΄

Election Systems & Software will 'no longer sell paperless voting machines,' CEO said.

πŸ“– Read

via "Dark Reading: ".
19:23
πŸ•΄ Cognitive Bias Can Help Shape Security Decisions πŸ•΄

A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.

πŸ“– Read

via "Dark Reading: ".
?
19:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Huawei Represents Massive Supply Chain Risk: Report πŸ•΄

The Chinese technology giant's enormous product and service footprint gives it access to more data than almost any other single organization, Recorded Future says.

πŸ“– Read

via "Dark Reading: ".
?
20:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Federal Photos Filched in Contractor Breach πŸ•΄

Data should never have been on subcontractor's servers, says Customs and Border Protection.

πŸ“– Read

via "Dark Reading: ".
?
20:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cognitive Bias Can Hamper Security Decisions πŸ•΄

A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.

πŸ“– Read

via "Dark Reading: ".
?
21:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-13718

The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. Also, since the device's server sets the Access-Control-Allow-Origin header to "*", an attacker can easily interact with the JSON payload returned by the device and steal sensitive information about the device.

πŸ“– Read

via "National Vulnerability Database".
21:31
ATENTIONβ€Ό New - CVE-2017-13717

Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily.

πŸ“– Read

via "National Vulnerability Database".
11 June 2019
?
07:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
07:51
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
07:55
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
07:55
⚠ It’s a SCAM: Send Bitcoin or your company’s reputation is TOAST! ⚠

"I will insult people. And everyone will not care that it's not you." But it's social-disaster baloney!

πŸ“– Read

via "Naked Security".
08:05
⚠ iOS 13 will map the apps that are tracking you ⚠

A map will display the snail-slime trails that we all leave behind in our daily travels and through which background tracking apps follow us.

πŸ“– Read

via "Naked Security".
08:20
⚠ Critical flaws found in Amcrest security cameras ⚠

The Amcrest 721 family of security cameras features six security flaws discovered back in 2017 by a researcher at security outfit Synopsys.

πŸ“– Read

via "Naked Security".
?
10:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Data Breach Exposes 100K U.S. Traveler Photos, License Plates ❌

A recent breach of U.S. Customs and Border Protection traveler photo and license plate data has led experts to condemn the collection and storage of facial recognition data.

πŸ“– Read

via "Threatpost".
?
11:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” More than 3B fake emails sent daily as phishing attacks persist πŸ”

Some 140,000 more domains are using DMARC records since the start of 2019, though DMARC-based enforcement remains complex to implement.

πŸ“– Read

via "Security on TechRepublic".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Getting Up to Speed on Magecart πŸ•΄

Greater awareness of how Magecart works will give your company a leg up on the growing threat from this online credit card skimmer. Here are four places to start.

πŸ“– Read

via "Dark Reading: ".
?
12:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Troy Hunt Looks to Sell Have I Been Pwned ❌

"Project Svalbard" has commenced, as Hunt looks for the right company to take over the password-focused service.

πŸ“– Read

via "Threatpost".
?
13:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Adobe Flash, ColdFusion Vulnerabilities Patched ❌

Adobe issued patches for 11 vulnerabilities overall across its Flash, ColdFusion and Campaign products.

πŸ“– Read

via "Threatpost".
13:06
❌ Linux Command-Line Editors Vulnerable to High-Severity Bug ❌

A bug impacting editors Vim and Neovim could allow a trojan code to escape sandbox mitigations.

πŸ“– Read

via "Threatpost".
13:06
❌ Near-Ubiquitous Critical Microsoft RCE Bugs Affect All Versions of Windows ❌

The two CVEs allow bypasses to get around NTLM relay attack mitigations.

πŸ“– Read

via "Threatpost".
?
13:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Warns of Dangers in 'Safe' Websites πŸ•΄

Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

πŸ“– Read

via "Dark Reading: ".
?
14:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your network against security flaws in Microsoft's NTLM protocol πŸ”

Vulnerabilities in NTLM recently discovered by security provider Preempt could allow attackers to remotely execute malicious code on any Windows machine or authenticate to any web server that supports Windows Integrated Authentication.

πŸ“– Read

via "Security on TechRepublic".
?
15:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What 3 Powerful GoT Women Teach Us about Cybersecurity πŸ•΄

Imagine Game of Thrones' Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security.

πŸ“– Read

via "Dark Reading: ".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Calendar Attacks Target Unwitting Mobile Users ❌

Automatic invite notifications are spreading malicious links.

πŸ“– Read

via "Threatpost".
15:26
ATENTIONβ€Ό New - CVE-2018-11801

SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on a m_center data related table.

πŸ“– Read

via "National Vulnerability Database".
15:26
ATENTIONβ€Ό New - CVE-2018-11800

SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on the GroupSummaryCounts related table.

πŸ“– Read

via "National Vulnerability Database".
?
15:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Adobe Updates Fix Critical Vulnerabilities in ColdFusion, Campaign, and Flash Player πŸ”

Adobe is urging users to patch 10 vulnerabilities, five of them critical, in three different products this week.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:54
πŸ•΄ 'Have I Been Pwned' Is Up for Sale πŸ•΄

Troy Hunt, who has been running HIBP solo for six years, launched "Project Svalbard" so the site can evolve with more resources, funding, and support.

πŸ“– Read

via "Dark Reading: ".
?
17:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Patches Four Publicly-Known Vulnerabilities ❌

In total, 88 unique vulnerabilities were patched as part of Microsoft’s June Patch Tuesday security bulletin.

πŸ“– Read

via "Threatpost".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Issues Fixes for 88 Vulnerabilities πŸ•΄

Four of the flaws are publicly known but none have been listed as under active attack.

πŸ“– Read

via "Dark Reading: ".
?
19:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-18378

In NETGEAR ReadyNAS Surveillance before 1.4.3-17 x86 and before 1.1.4-7 ARM, $_GET['uploaddir'] is not escaped and is passed to system() through $tmp_upload_dir, leading to upgrade_handle.php?cmd=writeuploaddir remote command execution.

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2017-18377

An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi?svr=192.168.1.1&port=21&user=ftp URI.

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2016-10760

On Seowon Intech routers, there is a Command Injection vulnerability in diagnostic.cgi via shell metacharacters in the ping_ipaddr parameter.

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2013-7471

An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request.

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2010-5330

On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2009-5157

On Linksys WAG54G2 1.00.10 devices, there is authenticated command injection via shell metacharacters in the setup.cgi c4_ping_ipaddr variable.

πŸ“– Read

via "National Vulnerability Database".
19:35
ATENTIONβ€Ό New - CVE-2009-5156

An issue was discovered on ASMAX AR-804gu 66.34.1 devices. There is Command Injection via the cgi-bin/script query string.

πŸ“– Read

via "National Vulnerability Database".
?
20:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cross-Site Scripting Errors Continue to Be Most Common Web App Flaw πŸ•΄

In vulnerability disclosure programs, organizations are paying more in total for XSS issues than any other vulnerability type, HackerOne says.

πŸ“– Read

via "Dark Reading: ".
?
21:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Suppliers Spotlighted After Breach of Border Agency Subcontractor πŸ•΄

Attackers increasingly use third-party service providers to bypass organizations' security. The theft of images from US Customs and Border Protection underscores the weakness suppliers can create.

πŸ“– Read

via "Dark Reading: ".
12 June 2019
?
06:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hackers stole photos of travelers and license plates from subcontractor ⚠

Critics say if the US can't protect such data - which was improperly stored by a subcontractor - it shouldn't collect it.

πŸ“– Read

via "Naked Security".
06:58
⚠ Radiohead releases β€˜OK Computer’ sessions that hacker tried to ransom ⚠

The band shrugged off the threat and released the files on Bandcamp. They're long and not very interesting, they said.

πŸ“– Read

via "Naked Security".
?
08:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FBI warns users to be wary of phishing sites abusing HTTPS ⚠

Why you shouldn't trust a website simply because it's secured using HTTPS and backed by the green padlock symbol.

πŸ“– Read

via "Naked Security".
09:03
❌ Full Insight into the Internal Environment with Cynet Free Visibility ❌

The Cynet 360 platform Free Visibility Offering is focused on IT and security professionals who know a lack of visibility is a main challenge in their daily responsibilities as end-users and service providers.Β 

πŸ“– Read

via "Threatpost".
09:08
❌ Full Insight into the Internal Environment with Cynet Free Visibility ❌

The Cynet 360 platform Free Visibility Offering is focused on IT and security professionals who know a lack of visibility is a main challenge in their daily responsibilities as end-users and service providers.Β 

πŸ“– Read

via "Threatpost".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New FormBook Dropper Harbors Obfuscation, Persistence ❌

Never-before-seen dropper found in FormBook samples that has increased persistence and obfuscation capabilities.

πŸ“– Read

via "Threatpost".
10:12
πŸ” 84% of US employees have never heard of GDPR πŸ”

A survey of corporate employees by insider threat management company ObserveIT reveals a greater understanding of privacy laws in the UK than in the US.

πŸ“– Read

via "Security on TechRepublic".
10:27
πŸ” Evernote Chrome extension vulnerability allowed attackers to steal 4.7M users' data πŸ”

A cross-site scripting vulnerability was discovered popular note-taking application Evernote, though the company patched it in under a week.

πŸ“– Read

via "Security on TechRepublic".
10:33
❌ Intel NUC Firmware Open to Privilege Escalation, DoS and Information Disclosure ❌

Intel has patched seven high-severity vulnerabilities in its mini PC NUC kit firmware.

πŸ“– Read

via "Threatpost".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Predicting Vulnerability Weaponization πŸ•΄

Advances in data science are making it possible to shift vulnerability management from a reactive to a proactive discipline.

πŸ“– Read

via "Dark Reading: ".
?
12:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Critical Adobe Flash player bug and more in June’s Patch Tuesday ⚠

June patch Tuesday features fixes from Adobe and Microsoft for critical flaws including a remote code vulnerability in Adobe Flash Player.

πŸ“– Read

via "Naked Security".
12:42
πŸ” How to secure your LinkedIn profile πŸ”

LinkedIn offers many privacy and security options that professionals may not be aware of. Here's what you need to know to stay safe on the networking platform.

πŸ“– Read

via "Security on TechRepublic".
12:42
πŸ” LaLiga facing €250k fine for GDPR violations in app used to spy on users πŸ”

The official app of the Spanish soccer league used the microphone and GPS in an attempt to curb restaurants from broadcasting the game.

πŸ“– Read

via "Security on TechRepublic".
12:53
❌ RAMBleed Side-Channel Attack Exposes Privileged Memory ❌

An attacker can use Rowhammer attacker to induce bit flips, thereby leaking the victim's secret data via a side channel.

πŸ“– Read

via "Threatpost".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-15123

A flaw was found in the CloudForms web interface, versions 5.8 - 5.10, where the RSS feed URLs are not properly restricted to authenticated users only. An attacker could use this flaw to view potentially sensitive information from CloudForms including data such as newly created virtual machines.

πŸ“– Read

via "National Vulnerability Database".
13:32
πŸ” Cisco Live 2019: CEO Chuck Robbins pushes multi-cloud connectivity πŸ”

Karen Roby interviewed Teena Maddox, who was reporting from Cisco Live 2019. During the opening keynote, Cisco CEO Chuck Robbins discussed multi-cloud connectivity, security, and how tech has changed in the past 30 years.

πŸ“– Read

via "Security on TechRepublic".
?
15:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Tomorrow's Cybersecurity Analyst Is Not Who You Think πŸ•΄

Organizations can't just rely on diverse and cutting-edge technologies to fight adversaries. They will also need people with diverse expertise and backgrounds.

πŸ“– Read

via "Dark Reading: ".
?
15:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Funding Values KnowBe4 at $1 Billion πŸ•΄

The $300 million investment is being led by KKR.

πŸ“– Read

via "Dark Reading: ".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CrowdStrike Prices IPO Above Range at $34 πŸ•΄

The endpoint security firm raised $612 million ahead of today's public debut.

πŸ“– Read

via "Dark Reading: ".
?
16:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Data Breach Disclosed by Online Invitation Firm Evite ❌

Evite's data breach, stemming from an β€œinactive data storage file," is only one of many breaches to be disclosed this week.

πŸ“– Read

via "Threatpost".
16:59
πŸ” Tracking The Latest Amendments to the California Consumer Privacy Act πŸ”

As we inch towards 2020, the California Consumer Privacy Act's (CCPA) go-live date, California legislators continue to refine and amend the law.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: Cisco Live, Samsung A-series, and Salesforce acquires Tableau πŸ”

This week's TechRepublic and ZDNet news stories include a look at the current state of 5G deployment, the severity of fake emails, and Cisco's quest for multi-cloud connectivity.

πŸ“– Read

via "Security on TechRepublic".
17:22
πŸ” Tech news roundup: Cisco Live, Samsung A-series, and Salesforce acquires Tableau πŸ”

This week's TechRepublic and ZDNet news stories include a look at the current state of 5G deployment, the severity of fake emails, and Cisco's quest for multi-cloud connectivity.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DNS Observatory Offers Researchers New Insight into Global DNS Activity πŸ•΄

Among its early findings, 60% of the DNS transactions captured \were handled by just 1,000 name servers.

πŸ“– Read

via "Dark Reading: ".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Apple Pledges Privacy, Beefs Up Security at Developer Confab πŸ•΄

The company hits back at the data economy - and fellow tech giants Facebook and Google - by announcing its own single sign-on service. A host of other iterative security improvements are on their way as well.

πŸ“– Read

via "Dark Reading: ".
19:58
❌ Fishwrap Campaign Sways Social Media Users with Old News ❌

215 accounts use the same family of special URL shorteners to track the effectiveness of the operation.

πŸ“– Read

via "Threatpost".
?
20:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Apple Pledges Privacy, Beefs Up Security at Developer Confab πŸ•΄

The company hits back at the data economy - and fellow tech giants Facebook and Google - by announcing its own single sign-on service. A host of other iterative security improvements are on their way as well.

πŸ“– Read

via "Dark Reading: ".
13 June 2019
?
09:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft’s battle with SandboxEscaper zero days turns into grim Groundhog Day ⚠

Why is SandboxEscaper releasing vulnerabilities in such an irresponsible way? It matters not - Microsoft must patch what’s in front of it whatever the backstory.

πŸ“– Read

via "Naked Security".
09:04
πŸ•΄ SQL Injection Attacks Represent Two-Third of All Web App Attacks πŸ•΄

When Local File Inclusion attacks are counted, nearly nine in 10 attacks are related to input validation failures, Akamai report shows.

πŸ“– Read

via "Dark Reading: ".
?
09:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Blockchain for drugs: IBM, Walmart pilot prescription medication tracking πŸ”

KPMG and Merck are among the companies that will collaborate in an FDA program to evaluate using blockchain to protect pharmaceutical products.

πŸ“– Read

via "Security on TechRepublic".
?
09:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Blockchain projects: 7 mistakes to avoid πŸ”

Successful blockchain projects require CIOs to be aware of the technology's capabilities and limitations, according to Gartner.

πŸ“– Read

via "Security on TechRepublic".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Q&A: Defending Against Cheaper, Accessible 'Deepfake' Tech πŸ•΄

ZeroFox's Matt and Mike Price discuss their work researching cybersecurity responses to the rising tide of 'deepfake' videos.

πŸ“– Read

via "Dark Reading: ".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ High-Severity Cisco Flaw in IOS XE Enables Device Takeover ❌

A high-severity flaw could give attackers full control of Cisco routers or switches.

πŸ“– Read

via "Threatpost".
11:13
⚠ Vim devs fix system-pwning text editor bug ⚠

Diehard text editor users everywhere breathed a sigh of relief this week as the open source community fixed a bug in one of the most venerable *nix programs: Vim.

πŸ“– Read

via "Naked Security".
11:27
πŸ” Ransomware rebounding in popularity as cryptojacking loses steam πŸ”

Hackers are going back to the tried-and-true method of simply demanding ransoms be paid in cryptocurrencies, rather than trying to covertly mine them.

πŸ“– Read

via "Security on TechRepublic".
11:33
⚠ Backpacker claims to find a network of hidden webcams in farm stay ⚠

In the bug repellent gizmo, in the shower, in the little birds glued to the footboardβ€”all hiding webcams, alleges the Dutch backpacker.

πŸ“– Read

via "Naked Security".
11:43
⚠ Facebook keeps deepfake of Mark Zuckerberg ⚠

"Whoever controls the data, controls the future," says the evil Zuck, who, according to the platform's current policy, won't be taken down.

πŸ“– Read

via "Naked Security".
11:44
πŸ•΄ The Rise of "Purple Teaming" πŸ•΄

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

πŸ“– Read

via "Dark Reading: ".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Telegram CEO Fingers China State Actors for DDoS Attack ❌

Durov took to Twitter to hint that Beijing tried to take Telegram offline to disrupt the Hong Kong protests.

πŸ“– Read

via "Threatpost".
?
12:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Rise of "Purple Teaming" πŸ•΄

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

πŸ“– Read

via "Dark Reading: ".
?
13:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Magecart attack: What it is, how it works, and how to prevent it πŸ”

Learn how to combat this web-based card skimming attack.

πŸ“– Read

via "Security on TechRepublic".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Adds Two-Factor Authentication For Its Apps on iOS πŸ•΄

Android-based two-factor authentication now works for Google applications on iPad and iPhone.

πŸ“– Read

via "Dark Reading: ".
?
14:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Truths About BEC Scams πŸ•΄

Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.

πŸ“– Read

via "Dark Reading: ".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The CISO's Drive to Consolidation πŸ•΄

Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.

πŸ“– Read

via "Dark Reading: ".
?
15:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-12147

Insufficient input validation in HECI subsystem in Intel(R) CSME before version 11.21.55, Intel? Server Platform Services before version 4.0 and Intel? Trusted Execution Engine Firmware before version 3.1.55 may allow a privileged user to potentially enable escalation of privileges via local access.

πŸ“– Read

via "National Vulnerability Database".
15:37
πŸ” Hospital medical equipment contains potentially lethal vulnerability πŸ”

A vulnerability in the Windows CE-powered Alaris Gateway Workstation allows attackers to modify dosage rates for infusion pumps, which can have lethal results.

πŸ“– Read

via "Security on TechRepublic".
15:43
❌ Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk ❌

The critical bug in a connected medical device can allow an attacker to remotely manipulate hospital pumps, either to withhold meds or dispense too much.

πŸ“– Read

via "Threatpost".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Evernote Critical Flaw Opened Personal Data of Millions to Attack ❌

Evernote's web clipper extension for Chrome is vulnerable to a critical flaw that could have exposed the data of more than 4.6 million users.

πŸ“– Read

via "Threatpost".
?
17:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New IoT Security Bill Passes Another Hurdle πŸ”

A bill to help strengthen the Wild West of the Internet world - the internet of things (IoT) - advanced this week.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:24
πŸ•΄ Congress Gives 'Hack Back' Legislation Another Try πŸ•΄

Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks.

πŸ“– Read

via "Dark Reading: ".
17:30
ATENTIONβ€Ό New - CVE-2018-10947

An issue was discovered in versions earlier than 1.3.2 for Polycom RealPresence Debut where the admin cookie is reset only after a Debut is rebooted.

πŸ“– Read

via "National Vulnerability Database".
17:35
ATENTIONβ€Ό New - CVE-2018-10946

An issue was discovered in versions earlier than 1.3.0-66872 for Polycom RealPresence Debut that allows attackers to arbitrarily read the admin user's password via the admin web UI.

πŸ“– Read

via "National Vulnerability Database".
?
18:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyberattack Hits Aircraft Parts Manufacturer πŸ•΄

Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.

πŸ“– Read

via "Dark Reading: ".
?
21:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DNS Firewalls Could Save Companies Billions πŸ•΄

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.

πŸ“– Read

via "Dark Reading: ".
14 June 2019
?
07:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cop arrested following explicit chat with bogus 16yo girl ⚠

A male college student Snapchat-filtered himself into a young girl and went out to catch a predator. The first one he caught was a Californian cop.

πŸ“– Read

via "Naked Security".
?
07:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook got 187,000 users’ data with snoopy VPN app ⚠

According to a letter it sent to Sen. Richard Blumenthal, that's 31,000 US users, with the rest in India.

πŸ“– Read

via "Naked Security".
07:53
⚠ Android phones can now be security keys for iOS devices ⚠

Hey, iOS users. Got a spare Android phone lying around? Now, you can use it as a secure access key for online services.

πŸ“– Read

via "Naked Security".
?
08:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DNS Firewalls Could Save Companies Billions πŸ•΄

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.

πŸ“– Read

via "Dark Reading: ".
08:48
⚠ Critical flaw found in Evernote Web Clipper for Chrome ⚠

Anyone using it in its unpatched state is at risk not only of a compromise of their Evernote account but, potentially, of third-party accounts too.

πŸ“– Read

via "Naked Security".
?
09:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hackers Favor Weekdays for Attacks, Share Resources Often ❌

Traffic analysis sheds light on weekday habits of attackers such as the most likely day for attacks and how malicious infrastructure is shared.

πŸ“– Read

via "Threatpost".
?
09:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ BlueKeep RDP Vulnerability a Ticking Time Bomb πŸ•΄

One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing.

πŸ“– Read

via "Dark Reading: ".
?
10:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Triton Attackers Seen Scanning US Power Grid Networks πŸ•΄

The development follows speculation and concern among security experts that the attack group would expand its scope to the power grid.

πŸ“– Read

via "Dark Reading: ".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Privacy improvements in Chrome 76 will make it easier to bypass paywalls πŸ”

Future improvements to Chrome will fix a gap in Incognito Mode, preventing publishers from blocking users from using incognito mode to jump over soft paywalls.

πŸ“– Read

via "Security on TechRepublic".
11:13
❌ Millions of Linux Servers Under Worm Attack Via Exim Flaw ❌

Attackers are exploiting a Linux Exim critical flaw to execute remote commands, download crypto miners and sniff out other vulnerable servers.

πŸ“– Read

via "Threatpost".
11:17
πŸ” Why your business should consider paying a ransom to hackers πŸ”

Ransomware attacks can disrupt business and lead to massive costs, according to Forrester. Here's why you should consider paying along with other incident response plans.

πŸ“– Read

via "Security on TechRepublic".
?
11:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Sensory Overload: Filtering Out Cybersecurity's Noise πŸ•΄

No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.

πŸ“– Read

via "Dark Reading: ".
11:54
πŸ” Friday Five: 6/14 Edition πŸ”

A food bank hit by ransomware, advice on cybersecurity training, and a university data breach - catch up on the week's news with this recap!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
12:03
❌ Amazon Alexa Secretly Records Children, Lawsuits Allege ❌

Two lawsuits are seeking class-action status, alleging that Amazon records children and stores their voiceprints indefinitely.

πŸ“– Read

via "Threatpost".
?
14:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TRISIS Group, Known for Physical Destruction, Targets U.S. Electric Companies ❌

XENOTIME, a destructive APT linked to Russia, has broadened its target set beyond Middle East oil and gas.

πŸ“– Read

via "Threatpost".
14:44
πŸ•΄ Better Cybersecurity Research Requires More Data Sharing πŸ•΄

Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.

πŸ“– Read

via "Dark Reading: ".
14:58
❌ News Wrap: Amazon Privacy and Telegram DDoS Attack ❌

Threatpost editors Tara Seals and Lindsey O'Donnell discuss a recent lawsuit against Amazon for its privacy policies, a Telegram DDoS attack and more.

πŸ“– Read

via "Threatpost".
?
15:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-8252

Kernel can inject faults in computations during the execution of TrustZone leading to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SM7150, Snapdragon_High_Med_2016, SXR1130

πŸ“– Read

via "National Vulnerability Database".
?
15:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ThreatList: Ransomware Trojans Picking Up Steam in 2019 ❌

Attackers continue to push the boundaries with modular trojans and ransomware attacks, a new report found.

πŸ“– Read

via "Threatpost".
?
16:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Common Hacker Tool Hit with Hackable Vulnerability πŸ•΄

A researcher has found a significant exploit in one of the most frequently used text editors.

πŸ“– Read

via "Dark Reading: ".
?
17:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware: A Persistent Scourge Requiring Corporate Action Now ❌

ASCO is the latest headline-making organization to be hit by ransomware, prompting many companies to consider what to do to minimize their risk.

πŸ“– Read

via "Threatpost".
15 June 2019
?
09:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 10 Notable Security Acquisitions of 2019 (So Far) πŸ•΄

In a year when security companies have been snapped up left and right, these deals stand out from the chaos.

πŸ“– Read

via "Dark Reading: ".
?
21:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-7472

The "Count per Day" plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter.

πŸ“– Read

via "National Vulnerability Database".
17 June 2019
?
06:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 21 stories of the week ⚠

From the GoldBrute botnet to Microsoft's battle with irresponsibly disclosed bugs - and everything in between. It's your weekly roundup.

πŸ“– Read

via "Naked Security".
?
07:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Widely used medical infusion pump can be remotely hijacked ⚠

These vulnerable infusion pumps can be remotely hacked to alter the delivery of IV fluids and medications such as painkillers or insulin.

πŸ“– Read

via "Naked Security".
?
07:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ I’d like to add you to my professional network of people to spy on ⚠

A deepfake was reportedly spotted in the wild: LinkedIn's well-connected, young, attractive Eurasia/Russia expert "Katie Jones."

πŸ“– Read

via "Naked Security".
?
08:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Privacy foul for soccer league app that eavesdropped on users ⚠

The LaLiga app used phones' GPS and microphones to sniff out bars that were broadcasting soccer matches illegally.

πŸ“– Read

via "Naked Security".
08:42
⚠ Yubico recalls FIPS Yubikey tokens after flaw found ⚠

Security token maker Yubico has issued an important advisory affecting high-end versions of its YubiKey authentication key.

πŸ“– Read

via "Naked Security".
?
10:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Find Your Next Favorite Cybersecurity Tool at the Black Hat USA Arsenal πŸ•΄

Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.

πŸ“– Read

via "Dark Reading: ".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Life-Changing Magic of Tidying Up the Cloud πŸ•΄

Most companies' cloud security operations would benefit significantly from clean-up, alignment, and organization.

πŸ“– Read

via "Dark Reading: ".
?
11:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers πŸ•΄

The attackers behind the Triton, or Xenotime, intrusions into critical infrastructure (CI) safety systems are testing their skills against electric power companies. Options for defense are still limited, however.

πŸ“– Read

via "Dark Reading: ".
11:58
ATENTIONβ€Ό New - CVE-2009-5157 (wag54g2_firmware)

On Linksys WAG54G2 1.00.10 devices, there is authenticated command injection via shell metacharacters in the setup.cgi c4_ping_ipaddr variable.

πŸ“– Read

via "National Vulnerability Database".
12:07
❌ Microsoft Pushes Azure Users to Patch Linux Systems ❌

Microsoft is urging users to patch every Exim installation in their organization and make sure that they are updated to the most recent version, Exim version 4.92.

πŸ“– Read

via "Threatpost".
12:18
πŸ” Business travelers, beware: Hackers looking over your shoulder can cause data breaches πŸ”

Some 80% of business travelers say visual hacking is a threat, according to a 3M report.

πŸ“– Read

via "Security on TechRepublic".
?
13:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-10239

A privilege escalation vulnerability in the "support access" feature on Infoblox NIOS 6.8 through 8.4.1 could allow a locally authenticated administrator to temporarily gain additional privileges on an affected device and perform actions within the super user scope. The vulnerability is due to a weakness in the "support access" password generation algorithm. A locally authenticated administrative user may be able to exploit this vulnerability if the "support access" feature is enabled, they know the support access code for the current session, and they know the algorithm to generate the support access password from the support access code. "Support access" is disabled by default. When enabled, the access will be automatically disabled (and support access code will expire) after the 24 hours.

πŸ“– Read

via "National Vulnerability Database".
?
14:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ A Spate of University Breaches Highlight Email Threats in Higher Ed ❌

Students at Oregon State University, Graceland University and Southern Missouri State have all been impacted by email attacks against school employees.

πŸ“– Read

via "Threatpost".
?
15:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-9388

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device firmware file contains a file known as proxy.sh which allows the device to proxy a specific request to and from from another website. This is primarily used as a method of communication between the device and Vera website when the user is logged in to the https://home.getvera.com and allows the device to communicate between the device and website. One of the parameters retrieved by this specific script is "url". This parameter is not sanitized by the script correctly and is passed in a call to "eval" to execute "curl" functionality. This allows an attacker to escape from the executed command and then execute any commands of his/her choice.

πŸ“– Read

via "National Vulnerability Database".
?
15:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create an administrator IAM user and group in AWS πŸ”

AWS best practices dictate that you should not use root user credentials for everyday admin tasks. Proper data security requires the use of special administrator account.

πŸ“– Read

via "Security on TechRepublic".
16:05
πŸ” Nevada Beats California With New Privacy Law πŸ”

Nevada's new law, which will require website operators to honor opt-out procedures, goes into effect on October 1, three months before the CCPA's compliance deadline, January 1, 2010.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Decryptor Unlocks Latest Versions of Gandcrab πŸ•΄

The decryptor neutralizes GandCrab versions 5.0 through 5.2 and lets victims unlock their files for free.

πŸ“– Read

via "Dark Reading: ".
17:11
❌ 5,000 Twitter Accounts Linked to Disinformation Campaigns ❌

The social platform has suspended six sets of accounts across four jurisdictions for running alleged influence campaigns, including Iran.

πŸ“– Read

via "Threatpost".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-9384

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device firmware file contains a file known as relay.sh which allows the device to create relay ports and connect the device to Vera servers. This is primarily used as a method of communication between the device and Vera servers so the devices can be communicated with even when the user is not at home. One of the parameters retrieved by this specific script is "remote_host". This parameter is not sanitized by the script correctly and is passed in a call to "eval" to execute another script where remote_host is concatenated to be passed a parameter to the second script. This allows an attacker to escape from the executed command and then execute any commands of his/her choice.

πŸ“– Read

via "National Vulnerability Database".
17:32
ATENTIONβ€Ό New - CVE-2017-9381

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a user with the capability of installing or deleting apps on the device using the web management interface. It seems that the device does not implement any cross-site request forgery protection mechanism which allows an attacker to trick a user who navigates to an attacker controlled page to install or delete an application on the device. Note: The cross-site request forgery is a systemic issue across all other functionalities of the device.

πŸ“– Read

via "National Vulnerability Database".
17:39
πŸ•΄ Power Outage Hits Millions in South America πŸ•΄

The outage, which is not (so far) seen as the result of a cyberattack, still had a significant impact on network and server availability.

πŸ“– Read

via "Dark Reading: ".
?
19:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Irked Researcher Discloses Facebook WordPress Plugin Flaws ❌

Researchers at Plugin Vulnerabilities cite grudge and irresponsibly disclose bugs in two WordPress plugins from Facebook.

πŸ“– Read

via "Threatpost".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DHS Tests Remote Exploit for BlueKeep RDP Vulnerability πŸ•΄

Agency urges organizations with vulnerable systems to apply mitigations immediately.

πŸ“– Read

via "Dark Reading: ".
19:36
ATENTIONβ€Ό New - CVE-2017-9392

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "request_image" as one of the service actions for a normal user to retrieve an image from a camera that is controlled by the controller. It seems that the "res" (resolution) parameter passed in the query string is not sanitized and is stored on the stack which allows an attacker to overflow the buffer. The function "LU::Generic_IP_Camera_Manager::REQ_Image" is activated when the lu_request_image is passed as the "id" parameter in the query string. This function then calls "LU::Generic_IP_Camera_Manager::GetUrlFromArguments". This function retrieves all the parameters passed in the query string including "res" and then uses the value passed in it to fill up buffer using the sprintf function. However, the function in this case lacks a simple length check and as a result an attacker who is able to send more than 184 characters can easily overflow the values stored on the stack including the $RA value and thus execute code on the device.

πŸ“– Read

via "National Vulnerability Database".
19:36
ATENTIONβ€Ό New - CVE-2017-9391

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "request_image" as one of the service actions for a normal user to retrieve an image from a camera that is controlled by the controller. It seems that the "URL" parameter passed in the query string is not sanitized and is stored on the stack which allows an attacker to overflow the buffer. The function "LU::Generic_IP_Camera_Manager::REQ_Image" is activated when the lu_request_image is passed as the "id" parameter in query string. This function then calls "LU::Generic_IP_Camera_Manager::GetUrlFromArguments" and passes a "pointer" to the function where it will be allowed to store the value from the URL parameter. This pointer is passed as the second parameter $a2 to the function "LU::Generic_IP_Camera_Manager::GetUrlFromArguments". However, neither the callee or the caller in this case performs a simple length check and as a result an attacker who is able to send more than 1336 characters can easily overflow the values stored on the stack including the $RA value and thus execute code on the device.

πŸ“– Read

via "National Vulnerability Database".
19:36
ATENTIONβ€Ό New - CVE-2017-9390

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a shell script called connect.sh which is supposed to return a specific cookie for the user when the user is authenticated to https://home.getvera.com. One of the parameters retrieved by this script is "RedirectURL". However, the application lacks strict input validation of this parameter and this allows an attacker to execute the client-side code on this application.

πŸ“– Read

via "National Vulnerability Database".
19:36
ATENTIONβ€Ό New - CVE-2017-9389

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device allows a user to install applications written in the Lua programming language. Also the interface allows any user to write his/her application in the Lua language. However, this functionality is not protected by authentication and this allows an attacker to run arbitrary Lua code on the device. The POST request is forwarded to LuaUPNP daemon on the device. This binary handles the received Lua code in the function "LU::JobHandler_LuaUPnP::RunLua(LU::JobHandler_LuaUPnP *__hidden this, LU::UPnPActionWrapper *)". The value in the "code" parameter is then passed to the function "LU::LuaInterface::RunCode(char const*)" which actually loads the Lua engine and runs the code.

πŸ“– Read

via "National Vulnerability Database".
19:41
ATENTIONβ€Ό New - CVE-2017-9387

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a shell script called relay.sh which is used for creating new SSH relays for the device so that the device connects to Vera servers. All the parameters passed in this specific script are logged to a log file called log.relay in the /tmp folder. The user can also read all the log files from the device using a script called log.sh. However, when the script loads the log files it displays them with content-type text/html and passes all the logs through the ansi2html binary which converts all the character text including HTML meta-characters correctly to be displayed in the browser. This allows an attacker to use the log files as a storing mechanism for the XSS payload and thus whenever a user navigates to that log.sh script, it enables the XSS payload and allows an attacker to execute his malicious payload on the user's browser.

πŸ“– Read

via "National Vulnerability Database".
19:41
ATENTIONβ€Ό New - CVE-2017-9386

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a script file called "get_file.sh" which allows a user to retrieve any file stored in the "cmh-ext" folder on the device. However, the "filename" parameter is not validated correctly and this allows an attacker to directory traverse outside the /cmh-ext folder and read any file on the device. It is necessary to create the folder "cmh-ext" on the device which can be executed by an attacker first in an unauthenticated fashion and then execute a directory traversal attack.

πŸ“– Read

via "National Vulnerability Database".
19:41
ATENTIONβ€Ό New - CVE-2017-9385

An issue was discovered on Vera Veralite 1.7.481 devices. The device has an additional OpenWRT interface in addition to the standard web interface which allows the highest privileges a user can obtain on the device. This web interface uses root as the username and the password in the /etc/cmh/cmh.conf file which can be extracted by an attacker using a directory traversal attack, and then log in to the device with the highest privileges.

πŸ“– Read

via "National Vulnerability Database".
19:46
ATENTIONβ€Ό New - CVE-2017-9383

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "wget" as one of the service actions for a normal user to connect the device to an external website. It retrieves the parameter "URL" from the query string and then passes it to an internal function that uses the curl module on the device to retrieve the contents of the website.

πŸ“– Read

via "National Vulnerability Database".
19:46
ATENTIONβ€Ό New - CVE-2017-9382

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "file" as one of the service actions for a normal user to read a file that is stored under the /etc/cmh-lu folder. It retrieves the value from the "parameters" query string variable and then passes it to an internal function "FileUtils::ReadFileIntoBuffer" which is a library function that does not perform any sanitization on the value submitted and this allows an attacker to use directory traversal characters "../" and read files from other folders within the device.

πŸ“– Read

via "National Vulnerability Database".
?
21:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-10724

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. The firmware contains binary uvc_stream that is the UDP daemon which is responsible for handling all the UDP requests that the device receives. The client application sends a UDP request to change the Wi-Fi name which contains the following format: "SETCMD0001+0002+[2 byte length of wifipassword]+[Wifipassword]. This request is handled by "control_Dev_thread" function which at address "0x00409AE4" compares the incoming request and determines if the 10th byte is 02 and if it is then it redirects to 0x0040A7D8, which calls the function "setwifipassword". The function "setwifipassword" uses a memcpy function but uses the length of the payload obtained by using strlen function as the third parameter which is the number of bytes to copy and this allows an attacker to overflow the function and control the $PC value.

πŸ“– Read

via "National Vulnerability Database".
21:31
ATENTIONβ€Ό New - CVE-2017-10723

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. The firmware contains binary uvc_stream that is the UDP daemon which is responsible for handling all the UDP requests that the device receives. The client application sends a UDP request to change the Wi-Fi name which contains the following format: "SETCMD0001+0001+[2 byte length of wifiname]+[Wifiname]. This request is handled by "control_Dev_thread" function which at address "0x00409AE0" compares the incoming request and determines if the 10th byte is 01 and if it is then it redirects to 0x0040A74C which calls the function "setwifiname". The function "setwifiname" uses a memcpy function but uses the length of the payload obtained by using strlen function as the third parameter which is the number of bytes to copy and this allows an attacker to overflow the function and control the $PC value.

πŸ“– Read

via "National Vulnerability Database".
21:31
ATENTIONβ€Ό New - CVE-2017-10722

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi password. This application is installed on the device and an attacker who can provide the right payload can execute code on the user's system directly. Any breach of this system can allow an attacker to get access to all the data that the user has access too. The application uses a dynamic link library(DLL) called "avilib.dll" which is used by the application to send binary packets to the device that allow to control the device. One such action that the DLL provides is change password in the function "sendchangepass" which allows a user to change the Wi-Fi password on the device. This function calls a sub function "sub_75876EA0" at address 0x7587857C. The function determines which action to execute based on the parameters sent to it. The "sendchangepass" passes the datastring as the second argument which is the password we enter in the textbox and integer 2 as first argument. The rest of the 3 arguments are set to 0. The function "sub_75876EA0" at address 0x75876F19 uses the first argument received and to determine which block to jump to. Since the argument passed is 2, it jumps to 0x7587718C and proceeds from there to address 0x758771C2 which calculates the length of the data string passed as the first parameter.This length and the first argument are then passed to the address 0x7587726F which calls a memmove function which uses a stack address as the destination where the password typed by us is passed as the source and length calculated above is passed as the number of bytes to copy which leads to a stack overflow.

πŸ“– Read

via "National Vulnerability Database".
21:31
ATENTIONβ€Ό New - CVE-2017-10721

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has Telnet functionality enabled by default. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.

πŸ“– Read

via "National Vulnerability Database".
21:31
ATENTIONβ€Ό New - CVE-2017-10720

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi name. This application is installed on the device and an attacker who can provide the right payload can execute code on the user's system directly. Any breach of this system can allow an attacker to get access to all the data that the user has access too. The application uses a dynamic link library(DLL) called "avilib.dll" which is used by the application to send binary packets to the device that allow to control the device. One such action that the DLL provides is change password in the function "sendchangename" which allows a user to change the Wi-Fi name on the device. This function calls a sub function "sub_75876EA0" at address 0x758784F8. The function determines which action to execute based on the parameters sent to it. The "sendchangename" passes the datastring as the second argument which is the name we enter in the textbox and integer 1 as first argument. The rest of the 3 arguments are set to 0. The function "sub_75876EA0" at address 0x75876F19 uses the first argument received and to determine which block to jump to. Since the argument passed is 1, it jumps to 0x75876F20 and proceeds from there to address 0x75876F56 which calculates the length of the data string passed as the first parameter. This length and the first argument are then passed to the address 0x75877001 which calls the memmove function which uses a stack address as the destination where the password typed by us is passed as the source and length calculated above is passed as the number of bytes to copy which leads to a stack overflow.

πŸ“– Read

via "National Vulnerability Database".
21:31
ATENTIONβ€Ό New - CVE-2017-10719

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has default Wi-Fi credentials that are exactly the same for every device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.

πŸ“– Read

via "National Vulnerability Database".
21:36
ATENTIONβ€Ό New - CVE-2017-10718

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that any malicious user connecting to the device can change the default SSID and password thereby denying the owner an access to his/her own device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.

πŸ“– Read

via "National Vulnerability Database".
18 June 2019
?
01:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How fraudulent domain names are powering phishing attacks πŸ”

Bargain basement gTLDs and glyph attacks using IDNs are powering phishing attacks, with fraudulent registrations on the rise. Worse yet, phishing sites are increasingly getting security certificates.

πŸ“– Read

via "Security on TechRepublic".
?
01:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Fraudulent Domains 'Hide in Plain Sight' πŸ•΄

Cybercriminals use new types of top-level domains, topical keywords, and targeted emails to trick victims into clicking malicious links.

πŸ“– Read

via "Dark Reading: ".
?
07:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phishing attack lures victims with encrypted message alert ⚠

Why are phishing emails so enduringly popular with the bad guys? A new approach may suggest that curiosity is at play.

πŸ“– Read

via "Naked Security".
07:30
⚠ The US is reportedly seeding Russia’s power grid with malware ⚠

The US is alleged to have been quietly planting malware throughout Russia's energy networks in response to years of Russian attacks on its own power grid.

πŸ“– Read

via "Naked Security".
?
07:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Bella Thorne steals hacker’s thunder, publishes nude photos herself ⚠

Sheesh! At this rate, extortionists are going to have to seek alternate employment.

πŸ“– Read

via "Naked Security".
08:10
⚠ 90% off Ray-Bans? It’s a 100% Instagram SCAM! ⚠

The ads look like they're been shared by friends, but they're really pod people who've hijacked accounts.

πŸ“– Read

via "Naked Security".
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How organizations can better defend against DNS attacks πŸ”

DNS has become a primary target for cyberattacks, causing downtime and financial loss for many businesses, according to a new report from EfficientIP.

πŸ“– Read

via "Security on TechRepublic".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Working BlueKeep Exploit Developed by DHS ❌

The Department of Homeland Security urged system administrators to update their Windows machines after testing a working BlueKeep exploit for Windows 2000.

πŸ“– Read

via "Threatpost".
11:04
πŸ•΄ Can Your Patching Strategy Keep Up with the Demands of Open Source? πŸ•΄

It's time to reassess your open source management policies and processes.

πŸ“– Read

via "Dark Reading: ".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Management Console Bugs Allow Windows Takeover ❌

Multiple cross-site scripting (XSS) bugs and an XML external entity (XXE) problem opens the door to takeover of admin desktops.

πŸ“– Read

via "Threatpost".
12:14
πŸ” Security breaches: 4 business impacts πŸ”

The average cost of a cyberattack is approximately $4.6 million, according to a Radware report.

πŸ“– Read

via "Security on TechRepublic".
12:20
πŸ” How small businesses can deal with getting regulated πŸ”

Even SMBs have to deal with big regulations thanks to GDPR and more. One startup has an answer for how to manage compliance and security.

πŸ“– Read

via "Security on TechRepublic".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How HackerOne open sources security--one hacker at a time πŸ”

MΓ₯rten Mickos says hacker-powered security is where open source was 15 years ago, but it's moving much faster than open source did.

πŸ“– Read

via "Security on TechRepublic".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Targets Deceptive Sites with New Chrome Tools πŸ•΄

A new extension and browser alert aim to help users report deceptive sites and prevent them from encountering fraud.

πŸ“– Read

via "Dark Reading: ".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Evolution of Identity πŸ•΄

How data and technology can help businesses make the right fraud decisions, protect people's identities, and create an improved customer experience.

πŸ“– Read

via "Dark Reading: ".
?
15:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Advertising Alliance Plans Protocols to Reduce Dangerous Content πŸ•΄

The Global Alliance for Responsible Media will seek ways to clamp down on dangerous and fake content.

πŸ“– Read

via "Dark Reading: ".
15:51
❌ Linux Kernel Bug Knocks PCs, IoT Gadgets and More Offline ❌

Four vulnerabilities could "SACK" connected devices with denial-of-service exploits.

πŸ“– Read

via "Threatpost".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Guide Addresses Software Security in SDLC Models πŸ”

A new white paper, published by NIST, recommends a core set of high life secure sotware development practices that can be added to SDLC implementation.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Consumers Urged to Junk Insecure IoT Devices ❌

A security researcher who disclosed flaws impacting 2 million IoT devices in April - and has yet to see a patch or even hear back from the manufacturers contacted - is sounding off on the dire state of IoT security.

πŸ“– Read

via "Threatpost".
?
17:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-8336

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of adding new routes to the device. It seems that the POST parameters passed in this request to set up routes on the device can be set in such a way that would result in overflowing the stack set up and allow an attacker to control the $ra register stored on the stack. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that recieves the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_00420F38 in IDA pro is identified to be receiving the values sent in the POST request. The POST parameter "gateway" allows to overflow the stack and control the $ra register after 1546 characters. The value from this post parameter is then copied on the stack at address 0x00421348 as shown below. This allows an attacker to provide the payload of his/her choice and finally take control of the device.

πŸ“– Read

via "National Vulnerability Database".
17:33
ATENTIONβ€Ό New - CVE-2017-8335

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of setting name for wireless network. These values are stored by the device in NVRAM (Non-volatile RAM). It seems that the POST parameters passed in this request to set up names on the device do not have a string length check on them. This allows an attacker to send a large payload in the "mssid_1" POST parameter. The device also allows a user to view the name of the Wifi Network set by the user. While processing this request, the device calls a function named "getCfgToHTML" at address 0x004268A8 which retrieves the value set earlier by "mssid_1" parameter as SSID2 and this value then results in overflowing the stack set up for this function and allows an attacker to control $ra register value on the stack which allows an attacker to control the device by executing a payload of an attacker's choice. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that recieves the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_00420F38 in IDA pro is identified to be receiving the values sent in the POST parameter "mssid_1" at address 0x0042BA00 and then sets in the NVRAM at address 0x0042C314. The value is later retrieved in the function "getCfgToHTML" at address 0x00426924 and this results in overflowing the buffer due to "strcat" function that is utilized by this function.

πŸ“– Read

via "National Vulnerability Database".
17:33
ATENTIONβ€Ό New - CVE-2012-6711

A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().

πŸ“– Read

via "National Vulnerability Database".
?
19:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ As Cloud Adoption Grows, DLP Remains Key Challenge πŸ•΄

As businesses use the cloud to fuel growth, many fail to enforce data loss prevention or control how people share data.

πŸ“– Read

via "Dark Reading: ".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-8337

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of executing various actions on the web management interface. It seems that the device does not implement any Origin header check which allows an attacker who can trick a user to navigate to an attacker's webpage to exploit this issue and brute force the password for the web management interface. It also allows an attacker to then execute any other actions which include management if rules, sensors attached to the devices using the websocket requests.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2017-8334

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of blocking IP addresses using the web management interface. It seems that the device does not implement any cross-site scripting forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a cross-site scripting payload on the user's browser and execute any action on the device provided by the web management interface.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2017-8333

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of adding new routes to the device. It seems that the POST parameters passed in this request to set up routes on the device can be set in such a way that would result in passing commands to a "popen" API in the function and thus result in command injection on the device. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_00420F38 in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "dest" is extracted at address 0x00420FC4. The POST parameter "dest is concatenated in a route add command and this is passed to a "popen" function at address 0x00421220. This allows an attacker to provide the payload of his/her choice and finally take control of the device.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2017-8332

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of blocking key words passing in the web traffic to prevent kids from watching content that might be deemed unsafe using the web management interface. It seems that the device does not implement any cross-site scripting protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a stored cross-site scripting payload on the user's browser and execute any action on the device provided by the web management interface.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2017-8331

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of adding new port forwarding rules to the device. It seems that the POST parameters passed in this request to set up routes on the device can be set in such a way that would result in passing commands to a "system" API in the function and thus result in command injection on the device. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that recieves the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_43C280in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "ip_address" is extracted at address 0x0043C2F0. The POST parameter "ipaddress" is concatenated at address 0x0043C958 and this is passed to a "system" function at address 0x00437284. This allows an attacker to provide the payload of his/her choice and finally take control of the device.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2017-8330

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a UPnP functionality for devices to interface with the router and interact with the device. It seems that the "NewInMessage" SOAP parameter passed with a huge payload results in crashing the process. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "miniupnpd" is the one that has the vulnerable function that receives the values sent by the SOAP request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function WscDevPutMessage at address 0x0041DBB8 in IDA pro is identified to be receiving the values sent in the SOAP request. The SOAP parameter "NewInMesage" received at address 0x0041DC30 causes the miniupnpd process to finally crash when a second request is sent to the same process.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2017-8329

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of setting a name for the wireless network. These values are stored by the device in NVRAM (Non-volatile RAM). It seems that the POST parameters passed in this request to set up names on the device do not have a string length check on them. This allows an attacker to send a large payload in the "mssid_1" POST parameter. The device also allows a user to view the name of the Wifi Network set by the user. While processing this request, the device calls a function at address 0x00412CE4 (routerSummary) in the binary "webServer" located in Almond folder, which retrieves the value set earlier by "mssid_1" parameter as SSID2 and this value then results in overflowing the stack set up for this function and allows an attacker to control $ra register value on the stack which allows an attacker to control the device by executing a payload of an attacker's choice. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_00420F38 in IDA pro is identified to be receiving the values sent in the POST parameter "mssid_1" at address 0x0042BA00 and then sets in the NVRAM at address 0x0042C314. The value is later retrieved in the function at address 0x00412EAC and this results in overflowing the buffer as the function copies the value directly on the stack.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2017-8328

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross site request forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface to change a user's password. Also this is a systemic issue.

πŸ“– Read

via "National Vulnerability Database".
19 June 2019
?
07:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Millions of Venmo transactions scraped (again) ⚠

Not much has changed since a year ago, when a bot was tweeting out publicly visible Venmo "drug" deals from the public-by-default company.

πŸ“– Read

via "Naked Security".
?
07:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hospitals are being suffocated by robocalls ⚠

Some pretend to be hospitals to get patients' payment data. Others pose as the goverment and try to get confidential data from hospitals.

πŸ“– Read

via "Naked Security".
?
09:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Insecure Home IoT Devices a Clear and Present Danger to Corporate Security πŸ•΄

Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
?
09:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Pass the salt! Popular CMSs aren’t securing passwords properly ⚠

A group of researchers has discovered that many of the web's most popular content management systems are using obsolete algorithms to protect their users' passwords.

πŸ“– Read

via "Naked Security".
09:31
⚠ Netflix researcher spots TCP SACK flaws in Linux and FreeBSD ⚠

Three vulnerabilities in the FreeBSD and Linux kernels could allow attackers to induce a denial-of-service by clogging networking I/O.

πŸ“– Read

via "Naked Security".
?
10:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mozilla Patches Firefox Critical Flaw Under Active Attack ❌

Mozilla released a new update for Firefox after discovering a critical flaw under active attack.

πŸ“– Read

via "Threatpost".
10:14
πŸ•΄ Come to Black Hat USA for the Latest Hardware Hacks πŸ•΄

Cars. Vending machines. Hotel suites. Security experts will share the tools and techniques they've used to break into all these things and more at Black Hat USA in October.

πŸ“– Read

via "Dark Reading: ".
10:14
πŸ” How to prepare for and navigate a technology disaster πŸ”

Technology emergencies can be the most stressful moments of an IT professional's career. But they don't have to if you plan ahead.

πŸ“– Read

via "Security on TechRepublic".
?
10:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ EatStreet Hackers Chow Down on Diner Data ❌

Gnosticplayers have reportedly taken credit for the breach, which they say consists of 6 million records.

πŸ“– Read

via "Threatpost".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Hackers Emptied Church Coffers with a Simple Phishing Scam πŸ•΄

Cyber thieves aren't bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.

πŸ“– Read

via "Dark Reading: ".
11:14
πŸ” How to prevent Android from displaying passwords πŸ”

Don't let bystanders see your Android passwords as you type them. Find out how to disable this feature.

πŸ“– Read

via "Security on TechRepublic".
11:14
πŸ” 76% of mobile apps have flaws allowing hackers to steal passwords, money, and texts πŸ”

Android apps have more critical vulnerabilities than iOS apps do, according to a Positive Technologies report.

πŸ“– Read

via "Security on TechRepublic".
11:14
πŸ” How to prevent Android from displaying passwords πŸ”

Don't let bystanders see your Android passwords as you type them. Find out how to disable this feature.

πŸ“– Read

via "Security on TechRepublic".
?
12:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: HPE Discover 2019, Facebook's Libra cryptocurrency, and Google Cloud's debacle πŸ”

This week's TechRepublic and ZDNet news stories include a look at the companies that hire the most data scientists, four significant impacts of a security breach, and a first-hand account of a major hack job.

πŸ“– Read

via "Security on TechRepublic".
12:04
πŸ” How AI-enhanced malware poses a threat to your organization πŸ”

Malware controlled by artificial intelligence could create more convincing spam, avoid security detection, and better adapt itself to each target, says a new report from Malwarebytes.

πŸ“– Read

via "Security on TechRepublic".
12:04
πŸ” Tech news roundup: HPE Discover 2019, Facebook's Libra cryptocurrency, and Google Cloud's debacle πŸ”

This week's TechRepublic and ZDNet news stories include a look at the companies that hire the most data scientists, four significant impacts of a security breach, and a first-hand account of a major hack job.

πŸ“– Read

via "Security on TechRepublic".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Security Tips That'll Keep the Summer Fun πŸ•΄

Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready.

πŸ“– Read

via "Dark Reading: ".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to solve the dreaded Wordpress site maintenance error πŸ”

If your Wordpress site is stuck in maintenance mode, there's a simple fix.

πŸ“– Read

via "Security on TechRepublic".
12:59
πŸ” How to install an FTP server and secure it with TLS πŸ”

Gain more security with your open source FTP server with the help of OpenSSL and TLS.

πŸ“– Read

via "Security on TechRepublic".
13:10
πŸ•΄ Cost per Cyberattack Jumps to $4.6M in 2019 πŸ•΄

From 2018 to 2019, the percentage of cyberattacks costing $10 million or more nearly doubled, hitting 13%.

πŸ“– Read

via "Dark Reading: ".
?
13:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Oracle Warns of New Actively-Exploited WebLogic Flaw ❌

Oracle is urging users to update after a critical WebLogic Server Flaw was found being actively exploited in the wild.

πŸ“– Read

via "Threatpost".
13:32
ATENTIONβ€Ό New - CVE-2017-1107

IBM Marketing Platform 9.1.0, 9.1.2, 10.0, and 10.1 exposes sensitive information in the headers that could be used by an authenticated attacker in further attacks against the system. IBM X-Force ID: 120906.

πŸ“– Read

via "National Vulnerability Database".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Serverless Computing from the Inside Out πŸ•΄

The biggest 'serverless' risks don't stem from the technonology itself. They occur when organizations respond to the adoption from the outside in.

πŸ“– Read

via "Dark Reading: ".
15:19
πŸ•΄ Verizon Media, Uber, PayPal Top List of Companies Paying Bug Bounties πŸ•΄

A new report from HackerOne lists the top five companies running bug-hunting programs on the ethical hacking platform.

πŸ“– Read

via "Dark Reading: ".
?
16:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Medical Debt Collector Poised to Shutter Following 2018 Breach πŸ”

A data breach and mounting cybersecurity consulting costs, legal requirements, and regulatory obligations, proved too much for this company to come back from.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Releases Open Source Tool For Computational Privacy ❌

Google's new multi-party computation tool allows companies to work together with confidential data sets.

πŸ“– Read

via "Threatpost".
?
17:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Critical Firefox Vuln Used in Targeted Attacks πŸ•΄

Mozilla has released patches for the bug reported by Coinbase.

πŸ“– Read

via "Dark Reading: ".
?
18:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ With GDPR's 'Right of Access,' Who Really Has Access? πŸ•΄

How a security researcher learned organizations willingly hand over sensitive data with little to no identity verification.

πŸ“– Read

via "Dark Reading: ".
18:07
❌ Feds: Cyberattack on NASA’s JPL Threatened Mission-Control Data ❌

Rampant security-operations bungling allowed cyberattackers to infiltrate JPL's network, which carries human mission data.

πŸ“– Read

via "Threatpost".
?
21:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-14395

Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user's browser via reflected XSS.

πŸ“– Read

via "National Vulnerability Database".
21:32
ATENTIONβ€Ό New - CVE-2017-14394

OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect.

πŸ“– Read

via "National Vulnerability Database".
20 June 2019
?
09:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Inside the FBI's Fight Against Cybercrime πŸ•΄

Heavily outnumbered and outpaced by their targets, small FBI cybersquads have been quietly notching up major wins against online criminals operating out of home and abroad.

πŸ“– Read

via "Dark Reading: ".
09:45
⚠ β€œDeeply personal medical” records exposed online ⚠

The Facebook ad agency xSocialMedia exposed 150K medical histories, along with identifying information for the people involved.

πŸ“– Read

via "Naked Security".
?
11:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook’s Libra cryptocurrency is big news but will it be secure? ⚠

Unless you’ve been under a rock, you’ll know that earlier this week Facebook announced plans for a new global cryptocurrency for absolutely everyone called Libra.

πŸ“– Read

via "Naked Security".
11:14
πŸ•΄ The Hunt for Vulnerabilities πŸ•΄

A road map for improving the update process will help reduce the risks from vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
11:29
πŸ” Why tech was key to the KGB being good at espionage πŸ”

The KGB Espionage Museum's Agne Urbaityte explains various technologies and methods of eavesdropping used by the intelligence service, including Deadly Kiss and cameras in rings.

πŸ“– Read

via "Security on TechRepublic".
11:34
πŸ•΄ Cybersecurity Accountability Spread Thin in the C-Suite πŸ•΄

While cybersecurity discussions have permeated board meetings, the democratization of accountability has a long way to go.

πŸ“– Read

via "Dark Reading: ".
11:39
πŸ” How to respond to phishing emails: 6 steps for G Suite admins πŸ”

Here are steps G Suite administrators should take when a phishing email gets through to an account.

πŸ“– Read

via "Security on TechRepublic".
11:39
πŸ” How KGB agents were invisible spies πŸ”

Dan Patterson interviews the KGB Espionage Museum's Agne Urbaityte about how agents in the field would blend in with their environment in order to spy.

πŸ“– Read

via "Security on TechRepublic".
?
11:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google launches new Chrome protection from bad URLs ⚠

The "Suspicious Site Reporter" extension lets users easily report dubious sites, while a new warning flags potential typosquatting pages.

πŸ“– Read

via "Naked Security".
12:01
⚠ Update Firefox now! Zero-day found in the wild ⚠

Mozilla has fixed a critical zero-day bug in the latest point releases of the Firefox web browser.

πŸ“– Read

via "Naked Security".
12:05
πŸ” KGB agents' wearables: Watches, cufflinks, shoes, and more πŸ”

The KGB Espionage Museum's curator Agne Urbaityte describes how agents concealed spying devices in what they wore when working in the field.

πŸ“– Read

via "Security on TechRepublic".
12:16
❌ Cisco DNA Center Critical Flaw Opens Access to Internal Servers ❌

Cisco has patched a slew of critical and high-severity flaws in its DNA Center and SD-WAN.

πŸ“– Read

via "Threatpost".
12:19
πŸ” The KGB's eavesdropping and spying devices in everyday items πŸ”

The KGB Espionage Museum's curator Agne Urbaityte explains why and how plates and ashtrays were used as eavesdropping and spying devices.

πŸ“– Read

via "Security on TechRepublic".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why tech was key to the KGB being good at espionage πŸ”

The KGB Espionage Museum's Agne Urbaityte explains various technologies and methods of eavesdropping used by the intelligence service, including Deadly Kiss and cameras in rings.

πŸ“– Read

via "Security on TechRepublic".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tor Browser Issues Update for Critical System Takeover Flaw ❌

The update patches critical flaw (CVE-2019-11707), a type confusion vulnerability in the Mozilla Firefox code that Tor uses.

πŸ“– Read

via "Threatpost".
?
13:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 2019 Security Venture Fund Deals You Should Know πŸ•΄

2019 has, so far, been a busy year for venture capitalists in the security industry. Here are 7 funding rounds important because of the technologies or market trends they represent.

πŸ“– Read

via "Dark Reading: ".
13:29
πŸ•΄ Machine Learning Boosts Defenses, But Security Pros Worry Over Attack Potential πŸ•΄

As defenders increasingly use machine learning to remove spam, catch fraud, and block malware, concerns persist that attackers will find ways to use AI technology to their advantage.

πŸ“– Read

via "Dark Reading: ".
13:32
ATENTIONβ€Ό New - CVE-2017-17944

The ASUS Vivobaby application before 1.1.09 for Android has Missing SSL Certificate Validation.

πŸ“– Read

via "National Vulnerability Database".
13:44
πŸ•΄ Small Businesses May Not Be Security's Weak Link πŸ•΄

Organizations with 250 or fewer employees often employ a higher percentage of security pros than their larger counterparts.

πŸ“– Read

via "Dark Reading: ".
?
14:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DanaBot Adds Ransomware to its Arsenal ❌

Malware adds ransomware to its malicious bag of tricks.

πŸ“– Read

via "Threatpost".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Democratizing' Machine Learning for Fraud Prevention & Payments Intelligence πŸ•΄

How fraud experts can fight cybercrime by 'downloading' their knowledge and experience into computer models.

πŸ“– Read

via "Dark Reading: ".
?
15:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Firefox Users Urged to Patch Zero Day Following Attack πŸ”

The zero day - which was actually two zero days chained together - was used in attacks against a popular cryptocurrency exchange on Monday.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:35
πŸ” How KGB agents were invisible spies πŸ”

Dan Patterson interviews the KGB Espionage Museum's Agne Urbaityte about how agents in the field would blend in with their environment in order to spy.

πŸ“– Read

via "Security on TechRepublic".
?
16:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Florida City Ransom Payment Could Open Door to More Attacks πŸ•΄

Riviera Beach's decision to pay ransom to criminals might get files back, but it almost guarantees greater attacks against other governments.

πŸ“– Read

via "Dark Reading: ".
?
17:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Florida Town Pays $600K to Ransomware Operators πŸ•΄

Riviera Beach's decision to pay ransom to criminals might get files back, but it almost guarantees greater attacks against other governments.

πŸ“– Read

via "Dark Reading: ".
17:02
❌ LoudMiner Cryptominer Uses Linux Image and Virtual Machines ❌

A Tiny Core Linux 9.0 image configured to run XMRig runs on a VM, rather than victim machines hosting the malware locally.

πŸ“– Read

via "Threatpost".
?
17:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Post-Ransomware Attack, Florida City Pays $600K ❌

Riviera Beach, a Florida city, is coughing up $600,000 to hackers after a ransomware attack brought down its computer systems.

πŸ“– Read

via "Threatpost".
?
18:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Match, Tinder Swipe Right For Privacy Red Flags, Say Experts ❌

Analysts at ProPrivacy say the dating apps collect everything from chat content to financial data on their users -- and then they share it.

πŸ“– Read

via "Threatpost".
?
19:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Exploit MSP's Tools to Distribute Ransomware πŸ•΄

Early information suggests threat actors gained access to the managed service provider's remote monitoring and management tools and used them to attack the firm's clients.

πŸ“– Read

via "Dark Reading: ".
21 June 2019
?
06:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Government is exposing identities of child abuse victims ⚠

DHS and FBI investigators are using Facebook profile IDs in court records - IDs that are easily used to look up their profile pages.

πŸ“– Read

via "Naked Security".
?
07:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Florida city will pay over $600,000 to ransomware attackers ⚠

Riviera Beach, Florida, has agreed to pay attackers over $600,000 three weeks after its systems were crippled by ransomware.

πŸ“– Read

via "Naked Security".