πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Phishing: Leading targets, breaking myths, and educating users πŸ”

Vade Secure's Adrien Gendre explains why the end user is an important link in the security chain.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Security Leads at Starbucks and Microsoft Prepare for Breaches πŸ•΄

Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Threat Intelligence Gathering Can Be a Legal Minefield πŸ•΄

In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground online marketplaces.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-5951

An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-20347

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-20343

Multiple buffer overflow vulnerabilities have been found in Ken Silverman Build Engine 1. An attacker could craft a special map file to execute arbitrary code when the map file is loaded.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-19798

Fleetco Fleet Maintenance Management (FMM) 1.2 and earlier allows uploading an arbitrary ".php" file with the application/x-php Content-Type to the accidents_add.php?submit=1 URI, as demonstrated by the value_Images_1 field, which leads to remote command execution on the remote server. Any authenticated user can exploit this.

πŸ“– Read

via "National Vulnerability Database".
πŸ” CrowdStrike's 2020 Threat Report: Spammers finetune email thread hijacking πŸ”

Existing controls are often not configured properly or deployed widely, allowing bad actors to steal data.

πŸ“– Read

via "Security on TechRepublic".
⚠ XSS plugin vulnerabilities plague WordPress users ⚠

Thousands of active WordPress plugins have been hit with a swathe of XSS vulnerabilities that could give attackers complete control of the site.

πŸ“– Read

via "Naked Security".
⚠ Nvidia patches severe flaws affecting GeForce, Quadro NVS and Tesla ⚠

In all, the update covers five Windows and Linux desktop CVE vulnerabilities, including one rated as critical.

πŸ“– Read

via "Naked Security".
❌ DoppelPaymer Ransomware Used to Steal Data from Supplier to SpaceX, Tesla ❌

Cyber attack at Visser Precision, which builds custom parts for the aerospace and automotive industries, reveals sensitive company data.

πŸ“– Read

via "Threatpost".
⚠ GoodRx stops sharing personal medical data with Google, Facebook ⚠

The mobile app saves people money but was letting 20 companies know who's taking antipsychotics, erectile dysfunction and HIV meds, and more.

πŸ“– Read

via "Naked Security".
⚠ Huge flaw found in how facial features are measured from images ⚠

It has to do with optics: faces appear to flatten out as we get further away. Our brains compensate, but AI-run facial recognition doesn't.

πŸ“– Read

via "Naked Security".
πŸ•΄ How Security Leaders at Starbucks and Microsoft Prepare for Breaches πŸ•΄

Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

πŸ“– Read

via "Dark Reading: ".
⚠ Digital piggy bank sevice broken into by cybercrooks ⚠

A financial proivider that gives loans but locks them down to turn them into savings... didn't lock down its own network.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Cybercrime Pandemic Keeps Spreading πŸ•΄

The World Economic Forum says cyberattacks will be one of the top global business risks over the next 10 years.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to create a Linux user that cannot log in πŸ”

For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Chinese Nationals Charged with Laundering $100M in Cryptocurrency πŸ•΄

The two defendants allegedly laundered $100 million for the benefit of North Korean threat actors who stole the funds in 2018.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybercriminals and drug cartels are teaming up to spread malware and steal financial information across Latin America πŸ”

Drug cartels are using cryptocurrency and partnering with hackers to scam banks in Latin American banks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Data security: 5 problems and solutions πŸ”

When it comes to securing data, most enterprises are negligent and unaware, according to a Lepide report.

πŸ“– Read

via "Security on TechRepublic".
❌ Have I Been Pwned No Longer For Sale ❌

Troy Hunt said the popular HIBP will continue to be run as an independent service.

πŸ“– Read

via "Threatpost".