πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Trial for accused CIA leaker ends in hung jury ⚠

The US is expected to press for a retrial in the high-stakes trial of Joshua Schulte, suspected of raiding the CIA's cyber arsenal.

πŸ“– Read

via "Naked Security".
⚠ FBI arrests alleged owner of Deer.io, top market for stolen accounts ⚠

Started around 2013, the site claims to host over 24,000 active shops doing brisk business in stolen PII and hacking services.

πŸ“– Read

via "Naked Security".
❌ Necurs Botnet in Crosshairs of Global Takedown Offensive ❌

The tech giant will take control of the U.S.-based infrastructure used by the criminals behind the world’s most prolific botnet used to distribute malware and infect victim computers.

πŸ“– Read

via "Threatpost".
πŸ” Local governments: Don't pay ransoms to hackers πŸ”

A Deloitte survey about ransomware also recommends that local governments use air-gapped system backups.

πŸ“– Read

via "Security on TechRepublic".
❌ The Ultimate Security Budget Excel Template – The Easiest Way to Plan and Monitor Your Security Spending ❌

The Ultimate Security Budget Plan & Track Excel template provides security executives with a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that security needs are addressed while maintaining the budgetary frame.

πŸ“– Read

via "Threatpost".
πŸ•΄ Why CSP Isn't Enough to Stop Magecart-Like Attacks πŸ•΄

As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it.

πŸ“– Read

via "Dark Reading: ".
❌ More Than Half of IoT Devices Vulnerable to Severe Attacks ❌

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

πŸ“– Read

via "Threatpost".
πŸ” Media and e-commerce brands are top targets for phishing attacks πŸ”

Some 84% of phishing URLs seen by content delivery network Akamai were abusing media and e-commerce companies.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Trend Micro VP talks cloud security, IoT risks, and ransomware πŸ”

In an interview at RSA 2020, Greg Young, the vice present of cybersecurity at Trend Micro, said that companies need to focus on cloud security posture management to make sure all cloud instances are configured correctly and securely.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Hackers are working harder to make phishing and malware look legitimate πŸ”

A Trend Micro report finds that spammers are using public and hosted cloud infrastructure to slip malicious emails past security defenses.

πŸ“– Read

via "Security on TechRepublic".
❌ New TrickBot Variant Updates Anti-Analysis Tricks ❌

A new TrickBot variant shows that the malware is continuing to swap out new anti-analysis and persistence tactics.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2012-1101

systemd 37-1 does not properly handle non-existent services, which causes a denial of service (failure of login procedure).

πŸ“– Read

via "National Vulnerability Database".
⚠ S2 Ep30: Let’s Encrypt, ULTRASOUND attacks, backups for ransom – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals πŸ•΄

Visibility into phishing attacks by content delivery networks and security firms shows many domains fail to be classified as malicious.

πŸ“– Read

via "Dark Reading: ".
❌ Wormable, Unpatched Microsoft Bug Threatens Corporate LANs ❌

CVE-2020-0796 affects version 3.1.1 of Microsoft’s SMB file-sharing system and was not included in Patch Tuesday.

πŸ“– Read

via "Threatpost".
⚠ Microsoft leaves critical bug unpatched on Patch Tuesday ⚠

Microsoft fixed bugs across a range of products on patch Tuesday, issuing patches for 115 distinct CVEs, with 26 rated critical.

πŸ“– Read

via "Naked Security".
πŸ•΄ Gender Equality in Cybersecurity Could Drive Economic Boost πŸ•΄

If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.

πŸ“– Read

via "Dark Reading: ".
⚠ TRRespass research reveals rowhammering is alive and well ⚠

"TRRespass" is a new trick for rowhammering - an attack where you write to a memory chip by reading it over and over (and over) again.

πŸ“– Read

via "Naked Security".
πŸ•΄ How the Rise of IoT Is Changing the CISO Role πŸ•΄

Prepare for the future by adopting a risk-based approach. Following these five steps can help.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-1753

The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-2487

The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.

πŸ“– Read

via "National Vulnerability Database".