πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How US cities are hacked by other countries πŸ”

Dragos, Inc., Founder & CEO Robert Lee talks to Dan Patterson about the risks of IoT as well as the capabilities of Russian hackers.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the government should regulate cybersecurity πŸ”

Dragos, Inc., Founder & CEO speaks with Dan Patterson about current methods of securing the US infrastructure and ways IoT can be regulated.

πŸ“– Read

via "Security on TechRepublic".
⚠ Will Apple’s β€œmicrophone switch” stop your iPad getting bugged? ⚠

A microphone switch! What will they think of next?

πŸ“– Read

via "Naked Security".
πŸ” VPN: 5 reasons business pros should always use one πŸ”

You need to protect your web traffic, and a VPN will do that and more.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Mozilla Patches Two Critical Zero-Days in Firefox πŸ•΄

The latest release of Firefox brings fixes for two Critical vulnerabilities already seen exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
❌ Government VPN Servers Targeted in Zero-Day Attack ❌

The attacks are being carried out against Chinese government interests worldwide, according to Qihoo 360.

πŸ“– Read

via "Threatpost".
πŸ•΄ Why Humans Are Phishing's Weakest Link πŸ•΄

And it's not just because they click when they shouldn't... they also leave a trail of clues and details that make them easy to spoof

πŸ“– Read

via "Dark Reading: ".
πŸ” Quantum encryption: How it works πŸ”

Futurist Isaac Arthur explains how to stay safe from quantum encryption hacking.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Quantum encryption: How it works πŸ”

Futurist Isaac Arthur explains how to stay safe from quantum encryption hacking.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-19699

There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Senators Question Apple About New COVID-19 App Privacy πŸ”

Senators, just like they did when Google announced plans to use its technology to screen for COVID-19, have some privacy questions for Apple, which recently said it will do the same, via a website and app.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Apple Safari Flaws Enable One-Click Webcam Access ❌

The white hat hacker who discovered the vulnerabilities received a $75,000 from Apple's bug-bounty program.

πŸ“– Read

via "Threatpost".
πŸ•΄ FBI Warns of BEC Dangers πŸ•΄

A new PSA warns of attacks launched against users of two popular cloud-based email systems.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to sync Firefox containers across devices πŸ”

If you make use of the Firefox Multi-Container Account add-on, it now includes the ability to sync your customizations across your Firefox account.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable 2FA for groups in Nextcloud πŸ”

Nextcloud allows you to enforce groups to use two-factor authentication. Let's find out how to create a group and then add them to 2FA enforcement.

πŸ“– Read

via "Security on TechRepublic".
❌ FBI Threatens β€˜Zoom Bombing’ Trolls With Jail Time ❌

The FBI is cracking down on the practice of Zoom bombing, saying the hijacking of web conferences can be punishable by jail time.

πŸ“– Read

via "Threatpost".
❌ A Brisk Private Trade in Zero-Days Widens Their Use ❌

More zero-day exploits coming up for sale by NSO Group and others is democratizing the attack vector and placing them within reach of less sophisticated attackers.

πŸ“– Read

via "Threatpost".
πŸ” 5 ways to prevent Zoom bombing πŸ”

Learn how to prevent internet trolls from crashing your Zoom video conferences and flooding them with inappropriate content.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft: Emotet Attack Shut Down an Entire Business Network πŸ•΄

The infection started with a phishing email and spread throughout the organization, overheating all machines and flooding its Internet connection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Misconfigured Containers Again Targeted by Cryptominer Malware πŸ•΄

An attack group is searching for insecure containers exposing the Docker API and then installing a program that attempts to mine cryptocurrency. It's not the first time.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ More Attackers Have Begun Using Zero-Day Exploits πŸ•΄

Vendors of offensive cyber tools have made it easy for any threat group with the right funds to leverage unpatched bugs, FireEye says.

πŸ“– Read

via "Dark Reading: ".