πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Infrared AI cameras at polling places could spot voters with a fever to detect potential coronavirus carriers πŸ”

Security company is using thermal imaging and AI to identify people with a temperature of 100 degrees.

πŸ“– Read

via "Security on TechRepublic".
❌ Coronavirus Poll: Cyberattacks Ramp Up as Work from Home Takes Hold ❌

A poll of Threatpost readers shows that security preparedness is uneven as organizations make an unprecedented transition to remote working.

πŸ“– Read

via "Threatpost".
πŸ•΄ Misconfigured Elasticsearch Instance Exposes More Than 5 Billion Records πŸ•΄

The collections contained information collected by a UK research firm on data breaches from the years 2012 to 2019.

πŸ“– Read

via "Dark Reading: ".
⚠ β€˜Dirty little secret’ extortion email threatens to give your family coronavirus ⚠

...And it's got your password as "proof".

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2018-20335

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can trigger a DoS of the httpd service via the /APP_Installation.asp?= URI.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-20334

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-20333

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can request /update_applist.asp to see if a USB device is attached to the router and if there are apps installed on the router.

πŸ“– Read

via "National Vulnerability Database".
⚠ Location-tracking wristbands required on all incoming travelers to Hong Kong ⚠

The government says the wristband isn't privacy-invading because it won't track your location, per se; just if you wander from COVID-19 quarantine.

πŸ“– Read

via "Naked Security".
⚠ COVID-19 disruption delays release of Chrome version 81 ⚠

It’s the COVID-19 shortage nobody expected - not toilet rolls, tinned goods or headache pills this time but Google software engineers.

πŸ“– Read

via "Naked Security".
❌ New Mirai Variant β€˜Mukashi’ Targets Zyxel NAS Devices ❌

The botnet exploits a vulnerability discovered last month that can allow threat actors to remotely compromise and control devices.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attack Surface, Vulnerabilities Increase as Orgs Respond to COVID-19 Crisis πŸ•΄

In typical fashion, attackers are gearing up to take advantage of the surge in teleworking prompted by the pandemic.

πŸ“– Read

via "Dark Reading: ".
❌ Covid-19 Spurs Facial Recognition Tracking, Privacy Fears ❌

The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues need to be top of mind, tech experts warn.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 3/20 Edition πŸ”

Hackers take advantage of the COVID-19 pandemic, Magecart group targets NutriBullet, and many countries at risk for violating data privacy laws - catch up on the week's infosec news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Security Ratings Are a Dangerous Fantasy πŸ•΄

They don't predict breaches, and they don't help people make valuable business decisions or make users any safer.

πŸ“– Read

via "Dark Reading: ".
⚠ Exchange rate service’s customer details hacked via AWS ⚠

Online exchange rate data provider Open Exchange Rates has exposed an undisclosed amount of user data via an Amazon database.

πŸ“– Read

via "Naked Security".
πŸ” TrickBot and Emotet strains make process injection most prevalent attack technique πŸ”

A Red Canary study analyzed six million leads to determine threats and found that worms had the most significant impact in 2019.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Network address-based security: How to implement better controls πŸ”

Traditional network address-based security controls aren't as effective for the cloud or internal networks. Here's what to do about these security issues.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-10221

A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server. This flaw is caused by missing sanitization of the GET URL parameters. An attacker could abuse this flaw to trick an authenticated user into clicking a specially crafted link which can execute arbitrary code when viewed in a browser.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-10179

A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to create a Kubernetes security policy πŸ”

If you're looking to take your Kubernetes security to the next level, you'll want to start working with pod security policies. Here's a quick introduction to this feature.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Proof of Concept Released for kr00k Wi-Fi Vulnerability πŸ•΄

The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.

πŸ“– Read

via "Dark Reading: ".