πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Infrastructure cyberattacks biggest concern for global IT security leaders πŸ”

A study on industrial cybersecurity focused on the biggest security threats for the enterprise.

πŸ“– Read

via "Security on TechRepublic".
⚠ Battling the global COVID-19 scammers and fake news hawkers ⚠

Europol seized 34K fake surgical masks, while the office of NY's AG wants registrars to explain how they're battling the sale of lies.

πŸ“– Read

via "Naked Security".
⚠ Hackers target WHO in phishing attack ⚠

A cyberattack that targeted the World Health Organization is probably just the tip of the iceberg according to experts reacting to the news this week.

πŸ“– Read

via "Naked Security".
⚠ Your unused computer can help find a COVID-19 cure ⚠

Put it to work for the Folding@Home distributed computing project to uncover how the virus's spikes latch on and how they can be blocked.

πŸ“– Read

via "Naked Security".
⚠ Windows has a zero-day that won’t be patched for weeks ⚠

Cybercriminals are exploiting two unpatched zero-day flaws affecting all supported versions of Windows, Microsoft has warned.

πŸ“– Read

via "Naked Security".
❌ Apple Safari Blocks Ad-Targeting Cookie Support ❌

The move follows Google’s announcement last May that it would do the same in Chrome by 2022.

πŸ“– Read

via "Threatpost".
❌ TrickBot App Bypasses Non-SMS Banking 2FA ❌

TrickBot victims are being fooled into downloading an app that records their screens - stealing non-SMS 2FA passcodes for banking websites.

πŸ“– Read

via "Threatpost".
πŸ” Boost security defenses against Kwampirs RAT malware with new list of IOCs πŸ”

ReversingLabs did a forensic analysis of attacks from the remote access trojan to understand the malware control structure.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ COVID-19: Getting Ready for the Next Business Continuity Challenge πŸ•΄

What comes after you've empowered your remote workforce in the wake of the coronavirus pandemic? Dealing with a large portion of that workforce getting sick at the same time.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI Shutters Russian-Based Hacker Platform, Makes Arrest πŸ•΄

The Deer.io platform let cybercriminals buy access to virtual storefronts where they could sell illicit products and services.

πŸ“– Read

via "Dark Reading: ".
❌ GE Employees Lit Up with Sensitive Doc Breach ❌

Marriage, divorce and death certificates, beneficiary info, passports and more were all caught up in an email takeover hack.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2019-19127

An authentication bypass vulnerability is present in the standalone SITS:Vision 9.7.0 component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This occurs because the Uniface TLS Driver is not enabled by default. This vulnerability allows attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does.

πŸ“– Read

via "National Vulnerability Database".
❌ Chinese Hackers Exploit Cisco, Citrix Flaws in Massive Espionage Campaign ❌

Researchers say that APT41's exploits are part of one of the broadest espionage campaigns they've seen from a Chinese-linked actor "in recent years."

πŸ“– Read

via "Threatpost".
πŸ” Organizations are moving their security to the cloud, but concerns remain πŸ”

Businesses see advantages in migrating to cloud-based security tools but are worried about such issues as data privacy and unauthorized access, says Exabeam.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Do DevOps Teams Need a Company Attorney on Speed Dial? πŸ•΄

In today's regulatory and legislative environment, companies and individuals are exposed to lawsuits over security breaches, resulting in significant fines and ending careers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What Should I Do If My Company Is Being Impersonated in a Phishing Campaign? πŸ•΄

Two security awareness advocates from KnowBe4 provide some solid suggestions.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-18626

Harris Ormed Self Service before 2019.1.4 allows an authenticated user to view W-2 forms belonging to other users via an arbitrary empNo value to the ORMEDMIS/Data/PY/T4W2Service.svc/RetrieveW2EntriesForEmployee URI, thus exposing sensitive information including employee tax information, social security numbers, home addresses, and more.

πŸ“– Read

via "National Vulnerability Database".
❌ Apple Update Fixes WebKit Flaws in iOS, Safari ❌

Apple's security update included a slew of vulnerabilities in various components of iOS, macOS and Safari - the most severe of which could enable remote code execution.

πŸ“– Read

via "Threatpost".
πŸ•΄ Tupperware Hit By Card Skimmer Attack πŸ•΄

Malicious code was found hidden inside graphics files on the storage container maker's e-commerce website.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Missing Patches, Misconfiguration Top Technical Breach Causes πŸ•΄

Less than half of businesses surveyed can patch critical vulnerabilities within 72 hours. Why does the process take so long?

πŸ“– Read

via "Dark Reading: ".
πŸ” DoD's Data Access Program Needs Oversight, Evaluation πŸ”

The Department of Defense and its research facilities could be taking more steps to ensure steps around data protection are taken when sharing sensitive data, a federal audit revealed.

πŸ“– Read

via "Subscriber Blog RSS Feed ".