πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Now More Than Ever? Securing the Software Life Cycle πŸ•΄

The more things change, the more they stay the same. That's true for software security, even in these turbulent times.

πŸ“– Read

via "Dark Reading: ".
❌ Cisco Fixes High-Severity Flaws In Firepower Security Software, ASA ❌

Cisco has fixed 12 high-severity flaws in its Adaptive Security Appliance software and Firepower Threat Defense software.

πŸ“– Read

via "Threatpost".
πŸ•΄ Mac RAT Rides 2FA App Onto Systems πŸ•΄

The new macOS remote access Trojan from the Lazarus Group uses a two-factor authentication app as its delivery mechanism.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to properly secure sysctl on Linux πŸ”

Protecting your Linux servers against SYN attacks and IP spoofing isn't nearly as hard you think. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-19164

dext5.ocx ActiveX Control in Dext5 Upload 5.0.0.112 and earlier versions contains a vulnerability that could allow remote files to be executed by setting the arguments to the activex method. A remote attacker could induce a user to access a crafted web page, causing damage such as malicious code infection.

πŸ“– Read

via "National Vulnerability Database".
❌ Blue Mockingbird Monero-Mining Campaign Exploits Web Apps ❌

The cybercriminals are using a deserialization vulnerability, CVE-2019-18935, to achieve remote code execution before moving laterally through the enterprise.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Identity VP Shares How and Why to Ditch Passwords πŸ•΄

Passwords are on their way out, says Joy Chik, who offers guidance for businesses hoping to shift away from them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Malicious Bots Infiltrate Online Food Delivery πŸ•΄

With grocery delivery in higher demand than ever, new add-ons have emerged to secure slots for consumers, presenting a new pathway for bad bots to wreak havoc.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyber Subterfuge and Curious Sharks Threaten the World's Subsea Fiber-Optics Cables πŸ•΄

Malware, spies and hackers, plus erosion and sharks, threaten fiber-optics that transmit almost all the world's data

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-7946

Information Exposure vulnerability in Unity8 as used on the Ubuntu phone and possibly also in Unity8 shipped elsewhere. This allows an attacker to enable the MTP service by opening the emergency dialer. Fixed in 8.11+16.04.20160111.1-0ubuntu1 and 8.11+15.04.20160122-0ubuntu1.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-1423

signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-0953

A race condition was discovered in the Linux drivers for Nvidia graphics which allowed an attacker to exfiltrate kernel memory to userspace. This issue was fixed in version 295.53.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-0952

A heap buffer overflow was discovered in the device control ioctl in the Linux driver for Nvidia graphics cards, which may allow an attacker to overflow 49 bytes. This issue was fixed in version 295.53.

πŸ“– Read

via "National Vulnerability Database".
⚠ More crypto-stealing Chrome extensions swatted by Google ⚠

Google deleted more malicious extensions from the Chrome Web Store after they were found to be phishing cryptocurrency users.

πŸ“– Read

via "Naked Security".
⚠ Vote for Naked Security in the European Blogger Awards 2020! ⚠

If you enjoy what you read, hear and see from the Naked Security team, please vote for us - it means a lot!

πŸ“– Read

via "Naked Security".
❌ Podcast: Shifting Cloud Security Left With Infrastructure-as-Code ❌

Companies are looking to "shift left" with Infrastructure-as-Code (IaC) security capabilities to boost improve developer productivity, avoid misconfigurations and prevent policy violations.

πŸ“– Read

via "Threatpost".
πŸ•΄ Why DevSecOps Is Critical for Containers and Kubernetes πŸ•΄

DevSecOps is a big and sometimes difficult shift for organizations. The key to success? Take small steps.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyber Subterfuge and Curious Sharks Threaten the World's Subsea Fiber-Optic Cables πŸ•΄

Malware, spies, and hackers, plus erosion and sharks, pose huge risks to the fiber optics that transmit almost all the world's data.

πŸ“– Read

via "Dark Reading: ".
❌ Report: Microsoft’s GitHub Account Gets Hacked ❌

The Shiny Hunters hacking group said it stole 500 GB of data from the tech giant’s repositories on the developer platform, which it owns.

πŸ“– Read

via "Threatpost".
❌ Hackers Breach 3.5 Million MobiFriends Dating App Credentials ❌

The emails, hashed passwords and usernames of 3.5 million users of the dating app MobiFriends were put up for sale on an underground forum.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2019-14898

The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.

πŸ“– Read

via "National Vulnerability Database".