πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Researchers Develop New Side-Channel Attacks on Intel CPUs πŸ•΄

Load Value Injection (LVI) takes advantage of speculative execution processes just like Meltdown and Spectre, say security researchers from Bitdefender and several universities.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Zeek 3.1.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Microsoft Patches 26 Critical Bugs in Big March Update ❌

March security updates include 115 CVEs patching everything from Windows, Office and Microsoft’s new Chromium-based Edge web browser.

πŸ“– Read

via "Threatpost".
❌ Critical Bugs in Rockwell, Johnson Controls ICS Gear ❌

Bugs affecting programmable logic controllers (PLC) and physical access-control systems for facilities are rated 9.8 in severity.

πŸ“– Read

via "Threatpost".
πŸ” Two attendees at RSA tech conference in San Francisco stricken with COVID-19 πŸ”

The organizers of the popular security conference, RSA, which drew over 36,000 people to San Francisco in February, confirmed that at least two people who attended have tested positive for COVID-19.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Closing the cybersecurity gender gap would boost the US economy by $30B πŸ”

82% of women in cybersecurity jobs agree the industry has a gender bias problem. Fixing it would not only improve morale and confidence, but also result in an economic boost to the cybersecurity industry.

πŸ“– Read

via "Security on TechRepublic".
⚠ Brave browser to block web fingerprinting with randomisation ⚠

Brave is testing a new defence against fingerprinting: confusing algorithms by randomising some of the data they collect.

πŸ“– Read

via "Naked Security".
⚠ Trial for accused CIA leaker ends in hung jury ⚠

The US is expected to press for a retrial in the high-stakes trial of Joshua Schulte, suspected of raiding the CIA's cyber arsenal.

πŸ“– Read

via "Naked Security".
⚠ FBI arrests alleged owner of Deer.io, top market for stolen accounts ⚠

Started around 2013, the site claims to host over 24,000 active shops doing brisk business in stolen PII and hacking services.

πŸ“– Read

via "Naked Security".
❌ Necurs Botnet in Crosshairs of Global Takedown Offensive ❌

The tech giant will take control of the U.S.-based infrastructure used by the criminals behind the world’s most prolific botnet used to distribute malware and infect victim computers.

πŸ“– Read

via "Threatpost".
πŸ” Local governments: Don't pay ransoms to hackers πŸ”

A Deloitte survey about ransomware also recommends that local governments use air-gapped system backups.

πŸ“– Read

via "Security on TechRepublic".
❌ The Ultimate Security Budget Excel Template – The Easiest Way to Plan and Monitor Your Security Spending ❌

The Ultimate Security Budget Plan & Track Excel template provides security executives with a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that security needs are addressed while maintaining the budgetary frame.

πŸ“– Read

via "Threatpost".
πŸ•΄ Why CSP Isn't Enough to Stop Magecart-Like Attacks πŸ•΄

As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it.

πŸ“– Read

via "Dark Reading: ".
❌ More Than Half of IoT Devices Vulnerable to Severe Attacks ❌

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

πŸ“– Read

via "Threatpost".
πŸ” Media and e-commerce brands are top targets for phishing attacks πŸ”

Some 84% of phishing URLs seen by content delivery network Akamai were abusing media and e-commerce companies.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Trend Micro VP talks cloud security, IoT risks, and ransomware πŸ”

In an interview at RSA 2020, Greg Young, the vice present of cybersecurity at Trend Micro, said that companies need to focus on cloud security posture management to make sure all cloud instances are configured correctly and securely.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Hackers are working harder to make phishing and malware look legitimate πŸ”

A Trend Micro report finds that spammers are using public and hosted cloud infrastructure to slip malicious emails past security defenses.

πŸ“– Read

via "Security on TechRepublic".
❌ New TrickBot Variant Updates Anti-Analysis Tricks ❌

A new TrickBot variant shows that the malware is continuing to swap out new anti-analysis and persistence tactics.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2012-1101

systemd 37-1 does not properly handle non-existent services, which causes a denial of service (failure of login procedure).

πŸ“– Read

via "National Vulnerability Database".
⚠ S2 Ep30: Let’s Encrypt, ULTRASOUND attacks, backups for ransom – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals πŸ•΄

Visibility into phishing attacks by content delivery networks and security firms shows many domains fail to be classified as malicious.

πŸ“– Read

via "Dark Reading: ".