πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Checkmarx Acquires Custodela πŸ•΄

The purchase adds DevSecOps capabilities to a software license compliance platform.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Crytpocurrency Exchange Targeted Via Attack on Web Traffic Analysis Firm πŸ•΄

"Island-hopping" attackers breached StatCounter so they could get to users of gate.io.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Finding Gold in the Threat Intelligence Rush πŸ•΄

Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Side-Channel Attacks Target Graphics Processing Units πŸ•΄

A trio of new attacks bypass CPUs to wring data from vulnerable GPUs.

πŸ“– Read

via "Dark Reading: ".
⚠ Phone companies slammed for lousy robocall efforts ⚠

By this time next year, says Chairman Ajit Pai, the FCC wants to see an anti-robocall system on consumers' phones - or else.

πŸ“– Read

via "Naked Security".
⚠ Google warning: Fix your dodgy ads within 30 days or get banned ⚠

Having taken what it thought was a decisive swipe at the problem of β€œabusive” advertising a year ago, Google now says next month’s Chrome 71 will unleash an even tougher crackdown.

πŸ“– Read

via "Naked Security".
⚠ Closed doors are no match for a Wi‑Fi peeping tom and a smartphone ⚠

Researchers have found that a smartphone and some smart number crunching can track people moving in their homes as they reflect radio waves.

πŸ“– Read

via "Naked Security".
❌ Apple Modernizes Its Hardware Security with T2 ❌

Apple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing?

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Ranting researcher publishes VM-busting zero-day without warning ⚠

A security researcher has published a zero-day flaw in a commonly-used virtual machine management system without notifying the vendor, justifying it with a scathing critique of the infosecurity industry.

πŸ“– Read

via "Naked Security".
❌ Podcast: Troy Hunt Talks Bad Passwords – and Who’s to Blame for Them ❌

Troy Hunt sounds off on how both consumers and services have a joint role in creating and enforcing strong passwords.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ The Executive Summit Returns to Black Hat Europe 2018 πŸ•΄

This day-long event for CISOs and execs will show you the way to next-level skills, strategies, and techniques that will bolster your relevance and wow the board.

πŸ“– Read

via "Dark Reading: ".
❌ DJI Patches Forum Bug That Allowed Drone Account Takeovers ❌

Bug opened door for malicious link attack, giving hacker access to stored DJI drone data of commercial and consumer customers.

πŸ“– Read

via "The first stop for security news | Threatpost".
πŸ” Watch out for bogus warnings to downgrade Windows 10 πŸ”

Windows 10 users running genuine copies of the Pro edition are being told to swap to Windows 10 Home after what appears to be an issue with Microsoft's activation servers.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-11777

In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 5 Things the Most Secure Software Companies Do (and How You Can Be Like Them) πŸ•΄

What sets apart the largest and most innovative software engineering organizations? These five approaches are a good way to start, and they won't break the bank.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to disable simultaneous multithreading on Lenovo ThinkPads πŸ”

Major side-channel exploits demonstrated the feasibility of programs extracting data from a program in an adjacent thread in the same core. Here's how and why to protect your ThinkPad.

πŸ“– Read

via "Security on TechRepublic".
❌ β€˜DerpTroll’ Faces 10 Years in Prison for DDoSing Gaming Sites as a Teen ❌

He admitted to taking Steam, EA Origin and Sony Online Entertainment offline in 2013 and 2014, causing at least $95,000 in damages.

πŸ“– Read

via "Threatpost | The first stop for security news".
ATENTIONβ€Ό New - CVE-2018-0284

A vulnerability in the local status page functionality of the Cisco Meraki MR, MS, MX, Z1, and Z3 product lines could allow an authenticated, remote attacker to modify device configuration files. The vulnerability occurs when handling requests to the local status page. An exploit could allow the attacker to establish an interactive session to the device with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device that is being exploited.

πŸ“– Read

via "National Vulnerability Database".
❌ Cisco Accidentally Released Dirty Cow Exploit Code in Software ❌

Cisco revealed that it had "inadvertently" shipped an in-house exploit code that was used in test scripts as part of  its TelePresence Video Communication Server and Expressway Series software.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Apple 0, JosΓ© 3 – Man versus Megacorp! [PODCAST] ⚠

Here's the latest Naked Security Podcast - enjoy!

πŸ“– Read

via "Naked Security".
πŸ•΄ Banking Malware Takes Aim at Brazilians πŸ•΄

Two malware distribution campaigns are sending banking Trojans to customers of financial institutions in Brazil.

πŸ“– Read

via "Dark Reading: ".