πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Gender Equality in Cybersecurity Could Drive Economic Boost πŸ•΄

If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.

πŸ“– Read

via "Dark Reading: ".
⚠ TRRespass research reveals rowhammering is alive and well ⚠

"TRRespass" is a new trick for rowhammering - an attack where you write to a memory chip by reading it over and over (and over) again.

πŸ“– Read

via "Naked Security".
πŸ•΄ How the Rise of IoT Is Changing the CISO Role πŸ•΄

Prepare for the future by adopting a risk-based approach. Following these five steps can help.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-1753

The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-2487

The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Black Hat Europe πŸ•΄

ExCel London, UK

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat Asia πŸ•΄

Singapore

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know? πŸ•΄

Should you happen to be in a meeting with an ICS vendor, here are some terms you will need to know so as to not be laughed out of the room.

πŸ“– Read

via "Dark Reading: ".
❌ Phishing Attack Skirts Detection With YouTube ❌

Attackers are using YouTube redirect links, whitelisted by various security defense mechanisms, to evade detection.

πŸ“– Read

via "Threatpost".
πŸ” Sweeping Federal Cybersecurity Upgrades Needed to Defend US πŸ”

A new report says the federal government and the private sector needs to better defend the United States in cyberspace.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” February sees huge jump in exploits designed to spread Mirai botnet πŸ”

The Mirai botnet is known for targeting Internet of Things devices and conducting massive DDoS attacks, as described by cyberthreat researcher Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity pros are using artificial intelligence but still prefer the human touch πŸ”

More than half of organizations have adopted AI for security efforts, but a majority are more confident in results verified by humans, according to WhiteHat Security.

πŸ“– Read

via "Security on TechRepublic".
❌ Flaws Riddle Zyxel’s Network Management Software ❌

Over 16 security flaws, including multiple backdoors and hardcoded SSH server keys, plague the software.

πŸ“– Read

via "Threatpost".
πŸ•΄ COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready? πŸ•΄

A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Discloses New Remote Execution Flaw in SMBv3 πŸ•΄

A patch for the flaw is not yet available, but there are no known exploits -- so far.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Increasingly Targeting Small Governments πŸ•΄

To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyberspace Solarium Commission Slams US Cybersecurity Readiness πŸ•΄

The federal commission outlined more than 60 recommendations to remedy major security problems.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-1000111

Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

πŸ“– Read

via "National Vulnerability Database".
⚠ Necurs zombie botnet disrupted by Microsoft ⚠

Necurs, one of the world's biggest botnets, infected over 9 million computers worldwide.

πŸ“– Read

via "Naked Security".
⚠ Analytics firm’s VPN and ad-blocking apps are secretly grabbing user data ⚠

Both Google and Apple have removed at least some of the apps from the company, Sensor Tower.

πŸ“– Read

via "Naked Security".