πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ TikTok users beware: Hackers could swap your videos with their own ⚠

TikTok doesn't use HTTPS for its images and videos - so crooks could swap out the videos you see and you would never know.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2019-11480

The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16

πŸ“– Read

via "National Vulnerability Database".
❌ Malware Risks Triple on WFH Networks: Experts Offer Advice ❌

New research found that almost half of companies had malware on their corporate-associated home networks - in comparison to malware being found on only 13 percent of corporate networks.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 Ways COVID-19 Has Changed Our Online Lives πŸ•΄

The pandemic has driven more of our personal and work lives online - and for the bad guys, business is booming. Here's how you can protect yourself.

πŸ“– Read

via "Dark Reading: ".
❌ TikTok Flaw Allows Threat Actors to Plant Forged Videos in User Feeds ❌

The popular video-sharing apps’s use of HTTP to download media content instead of a secure protocol could lead to the spread of misinformation on the platform.

πŸ“– Read

via "Threatpost".
❌ Safe Remote Access to Critical Infrastructure Networks in a Time of Global Crisis ❌

As operators struggle to balance the recommendations of social distancing with the need to keep vital services functioning, there is no getting around the fact that conventional remote connections into industrial control networks are a very bad idea.

πŸ“– Read

via "Threatpost".
πŸ•΄ Web Pioneers Launch Identity Startup That Ditches Passwords πŸ•΄

Legendary founders of Netscape and @Home Network roll out a new cloud-based identity management firm that makes the user his or her own certificate authority.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ You're One Misconfiguration Away from a Cloud-Based Data Breach πŸ•΄

Don't assume that cyberattacks are all you have to worry about. Misconfigurations should also be a top cause of concern.

πŸ“– Read

via "Dark Reading: ".
πŸ” Going phishing: The most imitated big name brands πŸ”

Criminals are using familiar company names to steal user information and payment credentials, Check Point found.

πŸ“– Read

via "Security on TechRepublic".
❌ Cyberattacks Target Healthcare Orgs on Coronavirus Frontlines ❌

Cybercriminals aren't sparing medical professionals, hospitals and healthcare orgs on the frontlines of the coronavirus pandemic when it comes to cyberattacks, ransomware attacks and malware.

πŸ“– Read

via "Threatpost".
πŸ•΄ Apple Is Top Pick for Brand Phishing Attempts πŸ•΄

Ten percent of all brand phishing attempts in the first quarter of 2020 tried to deceive victims by imitating the Apple brand.

πŸ“– Read

via "Dark Reading: ".
❌ TA505 Crime Gang Deploys SDBbot for Corporate Network Takeover ❌

The custom RAT offers persistent access, data exfiltration and lateral network movement.

πŸ“– Read

via "Threatpost".
πŸ” Balancing public safety and privacy during COVID-19: The rise of mass surveillance πŸ”

One tech company is harnessing artificial intelligence, thermal imaging, and real-time surveillance data to mitigate the spread of the coronavirus. However, serious privacy questions remain.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Company Cultures Dictated Work-from-Home Readiness πŸ•΄

Companies large and small are discovering just how prepared they were for all employees to work remotely

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-10383

An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated remote code execution in the com_mb24sysapi module.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10382

An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an authenticated remote code execution in the backup-scheduler.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10381

An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated SQL injection in DATA24, allowing attackers to discover database and table names.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-16879

The Synergy Systems & Solutions (SSS) HUSKY RTU 6049-E70, with firmware Versions 5.0 and prior, has a Missing Authentication for Critical Function (CWE-306) vulnerability. The affected product does not require authentication for TELNET access, which may allow an attacker to change configuration or perform other malicious activities.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Now That The SHIELD Act Is In Effect, Does Your Company Comply? πŸ”

The data security requirements of New York's Stop Hacks and Improve Electronic Data Security Act, or SHIELD Act, went into effect last month.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Adobe Fixes β€˜Important’ Flaws in ColdFusion, After Effects and Digital Editions ❌

While Adobe's regularly scheduled security updates were light this month, they fixed "important" severity vulnerabilities.

πŸ“– Read

via "Threatpost".
πŸ•΄ TikTok Vulnerability Leaves Users Open to Fake News πŸ•΄

A vulnerability in the way TikTok requests and receives video content could leave users streaming video from bogus servers.

πŸ“– Read

via "Dark Reading: ".