πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Apple Modernizes Its Hardware Security with T2 ❌

Apple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing?

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Ranting researcher publishes VM-busting zero-day without warning ⚠

A security researcher has published a zero-day flaw in a commonly-used virtual machine management system without notifying the vendor, justifying it with a scathing critique of the infosecurity industry.

πŸ“– Read

via "Naked Security".
❌ Podcast: Troy Hunt Talks Bad Passwords – and Who’s to Blame for Them ❌

Troy Hunt sounds off on how both consumers and services have a joint role in creating and enforcing strong passwords.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ The Executive Summit Returns to Black Hat Europe 2018 πŸ•΄

This day-long event for CISOs and execs will show you the way to next-level skills, strategies, and techniques that will bolster your relevance and wow the board.

πŸ“– Read

via "Dark Reading: ".
❌ DJI Patches Forum Bug That Allowed Drone Account Takeovers ❌

Bug opened door for malicious link attack, giving hacker access to stored DJI drone data of commercial and consumer customers.

πŸ“– Read

via "The first stop for security news | Threatpost".
πŸ” Watch out for bogus warnings to downgrade Windows 10 πŸ”

Windows 10 users running genuine copies of the Pro edition are being told to swap to Windows 10 Home after what appears to be an issue with Microsoft's activation servers.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-11777

In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 5 Things the Most Secure Software Companies Do (and How You Can Be Like Them) πŸ•΄

What sets apart the largest and most innovative software engineering organizations? These five approaches are a good way to start, and they won't break the bank.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to disable simultaneous multithreading on Lenovo ThinkPads πŸ”

Major side-channel exploits demonstrated the feasibility of programs extracting data from a program in an adjacent thread in the same core. Here's how and why to protect your ThinkPad.

πŸ“– Read

via "Security on TechRepublic".
❌ β€˜DerpTroll’ Faces 10 Years in Prison for DDoSing Gaming Sites as a Teen ❌

He admitted to taking Steam, EA Origin and Sony Online Entertainment offline in 2013 and 2014, causing at least $95,000 in damages.

πŸ“– Read

via "Threatpost | The first stop for security news".
ATENTIONβ€Ό New - CVE-2018-0284

A vulnerability in the local status page functionality of the Cisco Meraki MR, MS, MX, Z1, and Z3 product lines could allow an authenticated, remote attacker to modify device configuration files. The vulnerability occurs when handling requests to the local status page. An exploit could allow the attacker to establish an interactive session to the device with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device that is being exploited.

πŸ“– Read

via "National Vulnerability Database".
❌ Cisco Accidentally Released Dirty Cow Exploit Code in Software ❌

Cisco revealed that it had "inadvertently" shipped an in-house exploit code that was used in test scripts as part of  its TelePresence Video Communication Server and Expressway Series software.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Apple 0, JosΓ© 3 – Man versus Megacorp! [PODCAST] ⚠

Here's the latest Naked Security Podcast - enjoy!

πŸ“– Read

via "Naked Security".
πŸ•΄ Banking Malware Takes Aim at Brazilians πŸ•΄

Two malware distribution campaigns are sending banking Trojans to customers of financial institutions in Brazil.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ User Behavior Analytics Could Find a Home in the OT World of the IIoT πŸ•΄

The technology never really took off in IT, but it could be very helpful in the industrial world.

πŸ“– Read

via "Dark Reading: ".
❌ Pentagon Draws Back the Veil on APT Malware with Sudden Embrace of VirusTotal ❌

Two samples have already been added to the malware zoo, indicating a new openness from the federal government when it comes to cyber.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Microsoft President: Governments Must Cooperate on Cybersecurity πŸ•΄

Microsoft's Brad Smith calls on nations and businesses to work toward "digital peace" and acknowledge the effects of cybercrime.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Symantec Uncovers North Korean Group's ATM Attack Malware πŸ•΄

Lazarus Group has been using FastCash Trojan on obsolete AIX servers to empty tens of millions of dollars from ATMs.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-1119

IBM Marketing Operations 9.1.0, 9.1.2, and 10.1 could allow a remote attacker to obtain sensitive information. An attacker could send a specially-crafted request to cause an error message to be returned containing the full root path. An attacker could use this information to launch further attacks against the affected system. IBM X-Force ID: 121171.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-9749

IBM Campaign 9.1.0, 9.1.2, 10.0, and 10.1 could allow an authenticated user with access to the local network to bypass security due to lack of input validation. IBM X-Force ID: 120206.

πŸ“– Read

via "National Vulnerability Database".
⚠ DerpTrolling game server DDoS attacker pleads guilty ⚠

Austin Thompson pleaded guilty on November 6 in a San Diego Federal court to knowingly causing damage to third-party computers.

πŸ“– Read

via "Naked Security".