πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Insights for hiring the next generation of cybersecurity experts πŸ”

A new report from Kudelski Security provides companies tips for how to recruit and retain talent up for the digital challenges of tomorrow.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ CyberArk Acquires Idaptive for Identity-as-a-Service Tech πŸ•΄

The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-16112

TylerTech Eagle 2018.3.11 deserializes untrusted user input, resulting in remote code execution via a crafted Java object to the recorder/ServiceManager?service=tyler.empire.settings.SettingManager URI.

πŸ“– Read

via "National Vulnerability Database".
⚠ Beware the DHL delivery message email – it could be a package scam ⚠

Here's a DHL delivery scam with a simple twist - simplicity and a total lack of drama...

πŸ“– Read

via "Naked Security".
πŸ•΄ Ransomware, Data Breach Follow Phishing Attack at Magellan Health πŸ•΄

The healthcare company has informed affected employees of a data breach on a single corporate server.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attackers Routinely Use Older Vulnerabilities to Exploit Businesses, US Cyber Agency Warns πŸ•΄

Security issues in Microsoft products dominate the US government's top 10 list of commonly exploited vulnerabilities, but Apache Struts, Adobe Flash, and Drupal are also routinely targeted.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Problem with Automating Data Privacy Technology πŸ•΄

Managing complex and nuanced consumer rights requests presents a unique challenge for enterprises in today's regulated world of GDPR and CCPA. Here's why.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-15880

In FreeBSD 12.1-STABLE before r356911, and 12.1-RELEASE before p5, insufficient checking in the cryptodev module allocated the size of a kernel buffer based on a user-supplied length allowing an unprivileged process to trigger a kernel panic.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15879

In FreeBSD 12.1-STABLE before r356908, 12.1-RELEASE before p5, 11.3-STABLE before r356908, and 11.3-RELEASE before p9, a race condition in the cryptodev module permitted a data structure in the kernel to be used after it was freed, allowing an unprivileged process can overwrite arbitrary kernel memory.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15878

In FreeBSD 12.1-STABLE before r352509, 11.3-STABLE before r352509, and 11.3-RELEASE before p9, an unprivileged local user can trigger a use-after-free situation due to improper checking in SCTP when an application tries to update an SCTP-AUTH shared key.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How educational organizations can be better protected against data breaches πŸ”

Half of the organizations surveyed by Netwrix suffered a data breach last year because of the unauthorized sharing of information.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Biometrics in the Great Beyond πŸ•΄

A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?

πŸ“– Read

via "Dark Reading: ".
❌ Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App ❌

Future features include plenty of self-reporting options, and officials' fears the data could be misused.

πŸ“– Read

via "Threatpost".
❌ Texas Courts Won’t Pay Up in Ransomware Attack ❌

Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack.

πŸ“– Read

via "Threatpost".
πŸ” CISA, FBI Breakdown Most Exploited Vulnerabilities πŸ”

The U.S. government recapped the top 10 most exploited vulnerabilities from 2016-2019 and warned how 2020 is shaping up vulnerability-wise on Tuesday.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Organizations Conduct App Penetration Tests More Frequently - and Broadly πŸ•΄

Compliance is no longer the primary motivator. AppSec is, Cobalt.io says.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to check for weak passwords on your Linux systems with John the Ripper πŸ”

Are you certain your users are working with strong passwords on your Linux servers? Let John the Ripper show you who is and who isn't.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Cyber-Espionage Framework Dubbed Ramsay πŸ•΄

The framework is designed to collect and exfiltrate sensitive documents from air-gapped networks.

πŸ“– Read

via "Dark Reading: ".
⚠ Update now! Windows gets another bumper patch update ⚠

Windows users won't have to fix β€˜big’ exploited or public flaws this month, but May's Patch Tuesday is one of the biggest patch rounds.

πŸ“– Read

via "Naked Security".
❌ Login with Facebook Bug Earns $20K Bounty ❌

The cross-site scripting vulnerability could have allowed trivial account takeover.

πŸ“– Read

via "Threatpost".
πŸ” Three resources to improve your understanding of AWS security and harden cloud deployments πŸ”

A security session at the AWS Summit Online focused on the basics of Control Tower, Landing Zones, and GuardDuty.

πŸ“– Read

via "Security on TechRepublic".