pgadmin4-7.8-5.fc39

Read Time:6 Second

FEDORA-2024-f04c2ec90b

Packages in this update:

pgadmin4-7.8-5.fc39

Update description:

Backport fix for CVE-2024-3116.

Read More

How to Protect Your Streaming Accounts: Lessons from Roku’s Credential Stuffing Attack

Read Time:3 Minute, 13 Second

In recent news, Roku, a leading streaming platform, reported that over 591,000 user accounts were affected by credential stuffing attacks. This incident underscores the critical importance of safeguarding your online accounts against cyber threats. Here’s what you need to know to protect yourself and your streaming accounts. 

 As a proactive security measure, Roku has reset the passwords for all affected accounts. It is also notifying customers about the data leak and is refunding or reversing charges for those with unauthorized charges made by cybercriminals. 

Understanding Credential Stuffing

Credential stuffing is a type of cyber-attack where hackers use lists of stolen usernames and passwords from other data breaches to gain unauthorized access to user accounts on various platforms. In Roku’s case, hackers exploited this method to compromise over half a million accounts. 

How Does it Happen?

Hackers obtain lists of usernames and passwords from previous data breaches or leaks. These credentials are often available for sale on the dark web. They then use automated tools to input these stolen credentials into multiple websites or services, including streaming platforms like Roku. When the stolen credentials match an existing Roku account, the hackers gain access and can potentially take control of the account. 

The Impact

When cybercriminals gain access to your streaming accounts, they can do more than just watch your favorite shows. They may sell your account credentials on the dark web, use your personal information for identity theft, or even lock you out of your own account. This not only compromises your privacy but also puts your financial information at risk if you have payment methods linked to your streaming accounts. 

How to Protect Yourself

Use Strong, Unique Passwords: Avoid using easily guessable passwords like “password123” or common phrases. Instead, use a combination of letters, numbers, and special characters. Additionally, ensure that you use different passwords for each of your accounts to minimize the impact of a potential breach.

Enable Two-Factor Authentication (2FA): Two-factor authentication adds an extra layer of security by requiring a secondary form of verification, such as a code sent to your mobile device, in addition to your password. This makes it much harder for hackers to gain unauthorized access to your accounts.

Regularly Monitor Your Accounts: Keep an eye on your account activity for any suspicious or unauthorized login attempts. Many streaming platforms offer features that allow you to review recent login activity and devices connected to your account. If you notice any unfamiliar activity, change your password immediately and report the incident to the platform’s support team.

Stay Informed About Data Breaches: Subscribe to services that notify you about data breaches and leaks. Identity monitoring services can alert you if your email address or other personal information has been compromised in a breach, allowing you to take proactive measures to protect your accounts.
Get Robust Online Protection: McAfee+ which comes with Password Manager and offers robust online security and can help you secure your accounts by generating complex passwords, storing them and auto-filling your info for faster logins across devices. It’s secure and, best of all, you only have to remember a single password.

 

The recent credential-stuffing attack on Roku serves as a stark reminder of the importance of prioritizing online protection in an increasingly digital world. By following best practices such as using strong passwords, enabling two-factor authentication, and staying vigilant about account activity, you can significantly reduce the risk of falling victim to cyber attacks. Protecting your streaming accounts isn’t just about safeguarding your entertainment preferences—it’s about safeguarding your privacy and personal information. Take the necessary steps today with McAfee+ to secure your online accounts and enjoy a safer, more secure streaming experience. 

The post How to Protect Your Streaming Accounts: Lessons from Roku’s Credential Stuffing Attack appeared first on McAfee Blog.

Read More

CVE-2024-31705

Read Time:22 Second

Posted by V3locidad on Apr 14

CVE ID: CVE-2024-31705

Title : RCE to Shell Commands” Plugin / GLPI Shell Command Management Interface

Affected Product : GLPI – 10.X.X and last version

Description: An issue in Infotel Conseil GLPI v.10.X.X and after allows a remote attacker to execute arbitrary code via
the insufficient validation of user-supplied input.

Affected Component : A remote code execution (RCE) vulnerability has been identified in the ‘Shell…

Read More

SEC Consult SA-20240411-0 :: Database Passwords in Server Response in Amazon AWS Glue

Read Time:17 Second

Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 14

SEC Consult Vulnerability Lab Security Advisory < 20240411-0 >
=======================================================================
title: Database Passwords in Server Response
product: Amazon AWS Glue
vulnerable version: until 2024-02-23
fixed version: as of 2024-02-23
CVE number: –
impact: medium
homepage: https://aws.amazon.com/glue/
found:…

Read More

chromium-123.0.6312.122-1.el9

Read Time:15 Second

FEDORA-EPEL-2024-2445965799

Packages in this update:

chromium-123.0.6312.122-1.el9

Update description:

update to 123.0.6312.122

High CVE-2024-3157: Out of bounds write in Compositing
High CVE-2024-3516: Heap buffer overflow in ANGLE
High CVE-2024-3515: Use after free in Dawn

Read More

chromium-123.0.6312.122-1.el8

Read Time:15 Second

FEDORA-EPEL-2024-762aef7cb1

Packages in this update:

chromium-123.0.6312.122-1.el8

Update description:

update to 123.0.6312.122

High CVE-2024-3157: Out of bounds write in Compositing
High CVE-2024-3516: Heap buffer overflow in ANGLE
High CVE-2024-3515: Use after free in Dawn

Read More