πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Deloitte highlights top 9 challenges for enterprises during COVID-19 crisis πŸ”

Now's the time for organizations large and small to return to the basics with cyber hygiene protocols, the firm's cyber risk services leader says.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Govt Outlines Federal Agency Telework Policies πŸ”

The federal government on Wednesday released guidance designed to inform agencies how to best support secure teleworking.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to secure a Kubernetes cluster by preventing unwanted modules from loading πŸ”

The road to secure containers is long and winding. One stop you should take on that journey is unloading unnecessary kernel modules in your Linux containers.

πŸ“– Read

via "Security on TechRepublic".
❌ Cloudflare Axes Google reCAPTCHA Due to Privacy, Price ❌

Cloudflare's CEO said it is replacing Google's reCAPTCHA tool with hCaptcha due to pricing, privacy and availability concerns.

πŸ“– Read

via "Threatpost".
πŸ•΄ Zscaler to Buy Cloudneeti πŸ•΄

The security service provider adds cloud security "posture" management with the deal.

πŸ“– Read

via "Dark Reading: ".
❌ Compromised Zoom Credentials Swapped in Underground Forums ❌

Thousands of compromised Zoom credentials were discovered in underground forums as cybercriminals look to tap into the burgeoning remote workforce.

πŸ“– Read

via "Threatpost".
πŸ•΄ 8 Phishing Lures Preying on Pandemic Panic πŸ•΄

Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.

πŸ“– Read

via "Dark Reading: ".
❌ Travelex Pays $2.3M in Bitcoin to Hackers Who Hijacked Network in January ❌

The payout stems from a system-wide attack that knocked global networks offline on New Year’s Eve and reflects a shift in thinking about ransom payouts

πŸ“– Read

via "Threatpost".
πŸ•΄ 10 Ways to Spot a Security Fraud πŸ•΄

There is no shortage of people presenting themselves as security experts. Some of them truly are. The others...

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 4/10 πŸ”

Financial companies leave database exposed, Maze Ransomware targets Oil Giant, and Facebook releases location data to help the fight against Covid-19 - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Criminals Selling Videoconferencing Credentials on Dark Web πŸ•΄

Two security firms find thousands of usernames and passwords for Zoom accounts for sale and warn that the shift to remote work is changing attackers' targets.

πŸ“– Read

via "Dark Reading: ".
πŸ” 35% of Zoom users fear data leaks amid the platform's security issues πŸ”

12% of users have reportedly stopped using Zoom altogether, the social platform Blind found.

πŸ“– Read

via "Security on TechRepublic".
❌ Apple App Store Riddled With Money-Sucking Fleeceware Apps ❌

Researchers warn that apps that market themselves as "free" are tricking users to subscribe to services that rack up as much as $500 in charges yearly.

πŸ“– Read

via "Threatpost".
πŸ•΄ When All Behavior is Abnormal, How Do We Detect Anomalies? πŸ•΄

Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects of life, is it possible to build baselines and measure normal patterns when nothing at all seems normal?

πŸ“– Read

via "Dark Reading: ".
πŸ” Strengthen your IT security posture with policies to defend your network, data, and users πŸ”

Policies make it easy to set a training plan for end users and improve risk management strategies.

πŸ“– Read

via "Security on TechRepublic".
❌ Critical VMware Bug Opens Up Corporate Treasure to Hackers ❌

The bug -- rated 10 in severity -- potentially affects large numbers of corporate VMs and hosts.

πŸ“– Read

via "Threatpost".
πŸ•΄ Only 40% of Small Business Owners Have a Cybersecurity Policy πŸ•΄

Small business owners are concerned about cyberattacks targeting remote workers but lack the resources to invest in security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9547

An issue was discovered on Samsung mobile devices with JBP(4.3) and KK(4.4.2) software. Because the READ_LOGS permission is mishandled, sensitive information is disclosed in a world-readable copy of the log file if the error message is "Unhandled exception in Dalvik VM," "Application not responding ANR event," or "Crash on an application's native code." The Samsung ID is SVE-2015-2885 (October 2015).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-9546

An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-06-16. In some cases, HTTP is used for an Inputmethod, rather than HTTPS. A man-in-the-middle attacker can modify the client-server data stream to insert directory traversal sequences into an extracted file path. The Samsung ID is SVE-2015-4363 (November 2015).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-8546

An issue was discovered on Samsung mobile devices with software through 2015-11-12, affecting the Galaxy S6/S6 Edge, Galaxy S6 Edge+, and Galaxy Note5 with the Shannon333 chipset. There is a stack-based buffer overflow in the baseband process that is exploitable for remote code execution via a fake base station. The Samsung ID is SVE-2015-5123 (December 2015).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5524

An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-05-13. There is a buffer overflow in datablock_write because the amount of received data is not validated. The Samsung ID is SVE-2015-4018 (December 2015).

πŸ“– Read

via "National Vulnerability Database".