πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ DDoS attack on US Health agency part of coordinated campaign ⚠

It coincided with a disinformation campaign carried out via SMS, email and social media claiming that national quarantine was imminent.

πŸ“– Read

via "Naked Security".
⚠ Uber to file federal suit against LA over users’ real-time location data ⚠

Real-time, in-trip geolocation data isn't good for traffic/bike lane planning, a draft of the suit says. What it's good for is surveillance.

πŸ“– Read

via "Naked Security".
⚠ VMware patches virtualisation bugs ⚠

Virtualisation company VMware patched two bugs this week that affected a large proportion of its client-side virtual machines.

πŸ“– Read

via "Naked Security".
❌ Authorities Eye Using Mobile Phone Tracking COVID-19’s Spread ❌

Privacy advocates advise caution when tracking the movements of patients or those infected with the new coronavirus, as an effort to minimize the pandemic’s effect.

πŸ“– Read

via "Threatpost".
❌ Adobe Discloses Dozens of Critical Photoshop, Acrobat Reader Flaws ❌

An out-of-band Adobe security update addressed critical flaws in Photoshop, Acrobat Reader and other products.

πŸ“– Read

via "Threatpost".
πŸ•΄ What the Battle of Britain Can Teach Us About Cybersecurity's Human Element πŸ•΄

During WWII, the British leveraged both technology and human intelligence to help win the war. Security leaders must learn the lessons of history and consider how the human element can make their machine-based systems more effective.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect yourself from coronavirus-themed malware πŸ”

Attackers are using phishing emails, ransomware, and malicious apps to target people curious about the virus, says security firm Cybereason.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to control what personal information people see in Android πŸ”

Do you know what information you share within the Google ecosystem? You can easily control what is visible or hidden, from with your Android device. Find out how.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Trend Micro Patches Two Zero-Days Under Attack πŸ•΄

Businesses are urged to update the Apex One and OfficeScan XG enterprise security products as soon as possible.

πŸ“– Read

via "Dark Reading: ".
πŸ›  OpenSSL Toolkit 1.1.1e πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Falco 0.21.0 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2019-11689

An issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl fail to properly validate server responses and pass unsanitized text to the system shell, resulting in code execution as root.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-11688

An issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl accept any certificate for asustornasapi.asustor.com. In other words, there is Missing SSL Certificate Validation.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-10682

django-nopassword before 5.0.0 stores cleartext secrets in the database.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-10146

A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser.

πŸ“– Read

via "National Vulnerability Database".
❌ TrickBot Trojan Adds RDP Brute-Forcing to Its Arsenal ❌

A fresh module aims to compromise remote desktop accounts to access corporate resources.

πŸ“– Read

via "Threatpost".
πŸ” Ransomware: A security expert explains what makes us vulnerable and how to prevent it πŸ”

Ransomware attacks are still happening, and more employees need to be trained on how to prevent them.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Ransomware: A security expert explains what makes us vulnerable and how to prevent it πŸ”

Ransomware attacks are still happening, and more employees need to be trained on how to prevent them.

πŸ“– Read

via "Security on TechRepublic".
❌ Trend Micro Fixes Critical Flaws Under Attack ❌

Fixes are now available for five critical and high-severity Trend Micro flaws, two of which are being actively targeted by attackers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Facebook Got Tagged, but not Hard Enough πŸ•΄

Ensuring that our valuable biometric information is protected is worth more than a $550 million settlement.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-10178

It was found that the Token Processing Service (TPS) did not properly sanitize the Token IDs from the "Activity" page, enabling a Stored Cross Site Scripting (XSS) vulnerability. An unauthenticated attacker could trick an authenticated victim into creating a specially crafted activity, which would execute arbitrary JavaScript code when viewed in a browser. All versions of pki-core are believed to be vulnerable.

πŸ“– Read

via "National Vulnerability Database".