๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
26K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ” How to sync Firefox containers across devices ๐Ÿ”

If you make use of the Firefox Multi-Container Account add-on, it now includes the ability to sync your customizations across your Firefox account.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How to enable 2FA for groups in Nextcloud ๐Ÿ”

Nextcloud allows you to enforce groups to use two-factor authentication. Let's find out how to create a group and then add them to 2FA enforcement.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ FBI Threatens โ€˜Zoom Bombingโ€™ Trolls With Jail Time โŒ

The FBI is cracking down on the practice of Zoom bombing, saying the hijacking of web conferences can be punishable by jail time.

๐Ÿ“– Read

via "Threatpost".
โŒ A Brisk Private Trade in Zero-Days Widens Their Use โŒ

More zero-day exploits coming up for sale by NSO Group and others is democratizing the attack vector and placing them within reach of less sophisticated attackers.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ” 5 ways to prevent Zoom bombing ๐Ÿ”

Learn how to prevent internet trolls from crashing your Zoom video conferences and flooding them with inappropriate content.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Microsoft: Emotet Attack Shut Down an Entire Business Network ๐Ÿ•ด

The infection started with a phishing email and spread throughout the organization, overheating all machines and flooding its Internet connection.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Misconfigured Containers Again Targeted by Cryptominer Malware ๐Ÿ•ด

An attack group is searching for insecure containers exposing the Docker API and then installing a program that attempts to mine cryptocurrency. It's not the first time.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด More Attackers Have Begun Using Zero-Day Exploits ๐Ÿ•ด

Vendors of offensive cyber tools have made it easy for any threat group with the right funds to leverage unpatched bugs, FireEye says.

๐Ÿ“– Read

via "Dark Reading: ".
โš  Thousands of Android apps contain undocumented backdoors, study finds โš 

A study has found that thousands of legitimate Android apps are taking liberties or installing with capabilities that users wouldnโ€™t expect to exist.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด 9 Security Podcasts Worth Tuning In To ๐Ÿ•ด

Recommendations for podcasts discussing news, trends, guidance, and stories across the cybersecurity industry.

๐Ÿ“– Read

via "Dark Reading: ".
โš  Two schoolkids sue Google for collecting biometrics โš 

The suit is about biometrics and children's privacy in Google's education apps, which are suddenly, wildly popular now due to COVID-19.

๐Ÿ“– Read

via "Naked Security".
โš  Twitter warns users โ€“ Firefox might hold on to private messages โš 

Whose fault was it - Twitter or Firefox? (It's fixed now, to be clear.)

๐Ÿ“– Read

via "Naked Security".
๐Ÿ” BlackBerry: Chinese cybercriminals target high-value Linux servers with weak defenses ๐Ÿ”

Five APT groups have been using remote access trojans to take advantage of a network component that doesn't get much attention from security teams.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” Cybercriminals increasingly using SSL certificates to spread malware ๐Ÿ”

Enterprises that don't perform adequate SSL inspections are now at a much higher risk to be breached or attacked, according to a Menlo Security report.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” Zoom's security flaws: Has it done enough to fix them? ๐Ÿ”

As millions have flooded Zoom because of COVID-19, the site became a prime target for hackers. Here is how the company responded, and whether security experts think it's adequate.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ Official Government COVID-19 Mobile Apps Hide a Raft of Threats โŒ

Android apps launched for citizens in Iran, Colombia and Italy offer cyberattackers new attack vectors.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Using Application Telemetry to Reveal Insider & Evasive Threats ๐Ÿ•ด

Data from application processes and other systems leave a trail of threat crumbs that can be used to detect and shut down attacks.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2016-11053

An issue was discovered on Samsung mobile devices with software through 2015-11-11 (supporting FRP/RL). There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2015-5131 (January 2016).

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2016-11052

An issue was discovered on Samsung mobile devices with L(5.0/5.1) software. je_free in libQjpeg.so in Qjpeg in Qt 5.5 allows memory corruption via a malformed JPEG file. The Samsung ID is SVE-2015-5110 (January 2016).

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2016-11051

An issue was discovered on Samsung mobile devices with J(4.2) (Qualcomm Wi-Fi chipsets) software. There is a buffer overflow in the Qualcomm WLAN Driver. The Samsung ID is SVE-2016-5326 (February 2016).

๐Ÿ“– Read

via "National Vulnerability Database".