πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Ransomware, Data Breach Follow Phishing Attack at Magellan Health πŸ•΄

The healthcare company has informed affected employees of a data breach on a single corporate server.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attackers Routinely Use Older Vulnerabilities to Exploit Businesses, US Cyber Agency Warns πŸ•΄

Security issues in Microsoft products dominate the US government's top 10 list of commonly exploited vulnerabilities, but Apache Struts, Adobe Flash, and Drupal are also routinely targeted.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Problem with Automating Data Privacy Technology πŸ•΄

Managing complex and nuanced consumer rights requests presents a unique challenge for enterprises in today's regulated world of GDPR and CCPA. Here's why.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-15880

In FreeBSD 12.1-STABLE before r356911, and 12.1-RELEASE before p5, insufficient checking in the cryptodev module allocated the size of a kernel buffer based on a user-supplied length allowing an unprivileged process to trigger a kernel panic.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15879

In FreeBSD 12.1-STABLE before r356908, 12.1-RELEASE before p5, 11.3-STABLE before r356908, and 11.3-RELEASE before p9, a race condition in the cryptodev module permitted a data structure in the kernel to be used after it was freed, allowing an unprivileged process can overwrite arbitrary kernel memory.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15878

In FreeBSD 12.1-STABLE before r352509, 11.3-STABLE before r352509, and 11.3-RELEASE before p9, an unprivileged local user can trigger a use-after-free situation due to improper checking in SCTP when an application tries to update an SCTP-AUTH shared key.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How educational organizations can be better protected against data breaches πŸ”

Half of the organizations surveyed by Netwrix suffered a data breach last year because of the unauthorized sharing of information.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Biometrics in the Great Beyond πŸ•΄

A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?

πŸ“– Read

via "Dark Reading: ".
❌ Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App ❌

Future features include plenty of self-reporting options, and officials' fears the data could be misused.

πŸ“– Read

via "Threatpost".
❌ Texas Courts Won’t Pay Up in Ransomware Attack ❌

Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack.

πŸ“– Read

via "Threatpost".
πŸ” CISA, FBI Breakdown Most Exploited Vulnerabilities πŸ”

The U.S. government recapped the top 10 most exploited vulnerabilities from 2016-2019 and warned how 2020 is shaping up vulnerability-wise on Tuesday.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Organizations Conduct App Penetration Tests More Frequently - and Broadly πŸ•΄

Compliance is no longer the primary motivator. AppSec is, Cobalt.io says.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to check for weak passwords on your Linux systems with John the Ripper πŸ”

Are you certain your users are working with strong passwords on your Linux servers? Let John the Ripper show you who is and who isn't.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Cyber-Espionage Framework Dubbed Ramsay πŸ•΄

The framework is designed to collect and exfiltrate sensitive documents from air-gapped networks.

πŸ“– Read

via "Dark Reading: ".
⚠ Update now! Windows gets another bumper patch update ⚠

Windows users won't have to fix β€˜big’ exploited or public flaws this month, but May's Patch Tuesday is one of the biggest patch rounds.

πŸ“– Read

via "Naked Security".
❌ Login with Facebook Bug Earns $20K Bounty ❌

The cross-site scripting vulnerability could have allowed trivial account takeover.

πŸ“– Read

via "Threatpost".
πŸ” Three resources to improve your understanding of AWS security and harden cloud deployments πŸ”

A security session at the AWS Summit Online focused on the basics of Control Tower, Landing Zones, and GuardDuty.

πŸ“– Read

via "Security on TechRepublic".
❌ BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks ❌

BEC gangs like "Exaggerated Lion" are using tricky tactics - like exploiting G Suite - to scam companies out of millions.

πŸ“– Read

via "Threatpost".
⚠ Woman stalked by sandwich server via her COVID-19 contact tracing info ⚠

She wanted a sub, not Facebook, Instagram and SMS come-ons from the guy who served her and intercepted her contact-tracing details.

πŸ“– Read

via "Naked Security".
❌ Utah Says No to Apple/Google COVID-19 Tracing; Debuts Startup App ❌

"Healthy Together” app uses a raft of location data, including GPS, cell tower triangulation and Bluetooth, to pinpoint users and ID coronavirus hotspots.

πŸ“– Read

via "Threatpost".
πŸ” DevOps needs to morph into DevSecOps to close security threats in the cloud πŸ”

Oracle and KMPG threat report finds that over-privileged accounts and poorly protected cloud secrets are the biggest security risks.

πŸ“– Read

via "Security on TechRepublic".