πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Zoom Bombing Attack Hits U.S. Government Meeting ❌

A recent U.S. House Oversight Committee meeting was the latest victim of Zoom bombing, according to an internal letter.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybersecurity Home-School: The Robot Project πŸ•΄

This fun project can teach your home-bound children and teens about cybersecurity (and keep them occupied for at least a little while).

πŸ“– Read

via "Dark Reading: ".
πŸ›  Falco 0.22.1 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2019-12002

A remote session reuse vulnerability leading to access restriction bypass was discovered in HPE MSA 2040 SAN Storage; HPE MSA 1040 SAN Storage; HPE MSA 1050 SAN Storage; HPE MSA 2042 SAN Storage; HPE MSA 2050 SAN Storage; HPE MSA 2052 SAN Storage version(s): GL225P001 and earlier; GL225P001 and earlier; VE270R001-01 and earlier; GL225P001 and earlier; VL270R001-01 and earlier; VL270R001-01 and earlier.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12001

A remote session reuse vulnerability leading to access restriction bypass was discovered in HPE MSA 2040 SAN Storage; HPE MSA 1040 SAN Storage; HPE MSA 1050 SAN Storage; HPE MSA 2042 SAN Storage; HPE MSA 2050 SAN Storage; HPE MSA 2052 SAN Storage version(s): GL225P001 and earlier; GL225P001 and earlier; VE270R001-01 and earlier; GL225P001 and earlier; VL270R001-01 and earlier; VL270R001-01 and earlier.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Microsoft: Our new machine learning model spots critical security bugs 97% of the time πŸ”

Microsoft claims a machine learning models its built for software developers can distinguish between security and non-security bugs 99% of the time.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Friday Five: 4/17 Edition πŸ”

San Francisco International Airport was hacked, Pentagon networks are at risk, and a TikTok hack circulates Coronavirus consipiracy theories. Catch up on the news of the week with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ Critical bug in Google Chrome – get your update now ⚠

Here's the short version: Google just issued a Chrome update with a note that says, "This update includes 1 critical security fix."

πŸ“– Read

via "Naked Security".
❌ Attacks on Linksys Routers Trigger Mass Password Reset ❌

Linksys Smart Wi-Fi users were forced to reset their passwords after researchers discovered a router hack.

πŸ“– Read

via "Threatpost".
πŸ•΄ Researchers Explore Details of Critical VMware Vulnerability πŸ•΄

The vCenter vulnerability, patched on April 9, could give an intruder access to administrative credentials in three steps.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ COVID-Themed Phishing Messages Fill Phishing Filters on Gmail πŸ•΄

In the past week, Google says it identified more than 18 million daily phishing messages featuring coronavirus themes.

πŸ“– Read

via "Dark Reading: ".
❌ DHS Urges Pulse Secure VPN Users To Update Passwords ❌

The DHS urged organizations to update their passwords and make sure that a critical Pulse Secure VPN flaw has been patched, as attackers continue to exploit the flaw.

πŸ“– Read

via "Threatpost".
πŸ” Zoom: A cheat sheet about the video conferencing solution πŸ”

Zoom has become a household name because lots of people are working from home and using the video conferencing software. Here is your guide to Zoom basics, including its security vulnerabilities.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Pen-Test Results Hint at Improvements in Enterprise Security πŸ•΄

Though many problems remain, organizations are making attackers work harder.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – the hot 13 stories of the week ⚠

From the critical bug in Google Chrome to Signal's fears over the EARN Act, get yourself up to date with everything we've written in the last week.

πŸ“– Read

via "Naked Security".
⚠ Bot creates millions of fake eyeballs to rip off smart-TV advertisers ⚠

The massive ICEBUCKET scheme has, so far, impersonated more than 2m people in 30+ countries, defrauding more than 300 brands of ad dollars.

πŸ“– Read

via "Naked Security".
πŸ” Scammers exploiting stimulus payments with phishing attacks and malicious domains πŸ”

Since January, more than 4,000 domains related to coronavirus stimulus packages have been registered, many of them malicious or suspicious, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
⚠ New sextortion scam: β€œHigh level of risk. Your account has been hacked.” ⚠

The latest sextortion emails try to fool you with technical terms they hope you won't understand.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2017-18852

Certain NETGEAR devices are affected by CSRF and authentication bypass. This affects R7300DST before 1.0.0.54, R8300 before 1.0.2.100_1.0.82, R8500 before 1.0.2.100_1.0.82, and WNDR3400v3 before 1.0.1.14.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18851

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D8500 through 1.0.3.28, R6400 through 1.0.1.22, R6400v2 through 1.0.2.18, R8300 through 1.0.2.94, R8500 through 1.0.2.94, and R6100 through 1.0.1.12.

πŸ“– Read

via "National Vulnerability Database".
⚠ Fan vibrations can be used transmit data from air-gapped machines ⚠

The scientists known for finding ways to transmit software from non-networked computers, have figured out a way to do it using computer fan vibrations.

πŸ“– Read

via "Naked Security".