πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Tokyo Olympics Postponed, But 5G Security Lessons Shine ❌

Threatpost Senior Editor Tara Seals is joined by Russ Mohr, engineer and Apple evangelist at MobileIron along with Jerry Ray, COO at SecureAge, for a discussion about the now postponed Tokyo Games and its use of 5G and the myriad of security concerns Japan is preparing for.

πŸ“– Read

via "Threatpost".
πŸ” 5 things SMB IT departments should do to survive the impact of COVID-19 πŸ”

The overnight transformation to telecommuting means security risks are even higher than during normal business times.

πŸ“– Read

via "Security on TechRepublic".
πŸ” What is Microsoft Azure Sphere? Everything you need to know πŸ”

Microsoft locks down the Internet of Things with its own Linux.

πŸ“– Read

via "Security on TechRepublic".
⚠ Hijacked Twitter accounts used to advertise face masks ⚠

The accounts were used to advertise a site selling products made scarce by COVID-19: face masks, forehead thermometers and toilet paper.

πŸ“– Read

via "Naked Security".
⚠ Adobe issues emergency fix for file-munching bug ⚠

Adobe has released another security patch outside of its usual routine, to deal with a bug that allows attackers to delete victims' files.

πŸ“– Read

via "Naked Security".
πŸ•΄ China-Based Threat Group Launches Widespread Malicious Campaign πŸ•΄

The motives behind the attacks remain unclear, but likely triggers include the ongoing trade war between the US and China and the unfolding COVID-19 pandemic.

πŸ“– Read

via "Dark Reading: ".
⚠ Apple iOS 13.4 offers fixes for 30 vulnerabilities ⚠

Apple has just announced its latest something for everyone security and feature updates for iOS, iPadOS, macOS, watchOS, and tvOS.

πŸ“– Read

via "Naked Security".
❌ Responding to the New Normal: How to Prevent Added Risk in Your Business ❌

With more employees than ever working remotely, there are numerous potential threats that organizations must be aware of.

πŸ“– Read

via "Threatpost".
πŸ” How 4G and 5G networks are vulnerable to Denial-of-Service attacks πŸ”

Existing 4G and early 5G networks use Diameter signaling protocol, which contains certain security holes that can lead to a range of attacks, says enterprise security provider Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
⚠ Apple Safari now blocks all third-party cookies by default ⚠

Starting in 13.1, advertisers and analytics firms can't track us through browser cookies. Apple says this also kills login fingerprinting.

πŸ“– Read

via "Naked Security".
πŸ•΄ Introducing Zero-Trust Access πŸ•΄

It's too early to tell whether ZTA will be a VPN killer or not, but major players are ramping up products in this new class of security technology that focuses on the cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ” How hackers are using COVID-19 fears to push new scams and malware πŸ”

Cybercriminals may be staying home, but they're not taking a break from phishing attempts and password hacking during the coronavirus outbreak.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-15796

Python-apt doesn't check if hashes are signed in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py or in `_fetch_archives()` of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn't be allowed and has been fixed in verisions 1.9.5, 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

πŸ“– Read

via "National Vulnerability Database".
❌ Hackers Hijack Routers to Spread Malware Via Coronavirus Apps ❌

The router DNS hijacking attacks have targeted more than a thousand victims with the Oski info-stealing malware.

πŸ“– Read

via "Threatpost".
πŸ›  nullscan 1.0.0 πŸ› 

nullscan is a modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs corresponding modules and their nullscan-tools afterwards. It can also take hosts and start nmap first in order to perform a basic portscan and run the modules afterwards. Also, nullscan can parse a given nmap logfile for open tcp and udp ports and again run the modules afterwards. All results will be logged in specified directories with a clean structure and an HTML report can subsequently be generated.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Watch out! Scummy scammers target home deliveries ⚠

Anxiously waiting for a home delivery? Don't be tricked by a message that says there's a problem with your address...

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2019-15795

python-apt only checks the MD5 sums of downloaded files in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py in version 1.9.0ubuntu1 and earlier. This allows a man-in-the-middle attack which could potentially be used to install altered packages and has been fixed in versions 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Technology Empowers Pandemic Response, But Privacy Worries Remain πŸ•΄

As technology companies and the medical community work to find ways to track and test for the virus, privacy might fall by the wayside.

πŸ“– Read

via "Dark Reading: ".
❌ As Zoom Booms Incidents of β€˜ZoomBombing’ Become a Growing Nuisance ❌

Numerous instances of online conferences being disrupted by pornographic images, hate speech or even threats can be mitigated using some platform tools.

πŸ“– Read

via "Threatpost".