πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Insider Behind $1 Billion Trade Secret Theft Case Sentenced πŸ”

The FBI on Wednesday shared details around a recent $1 billion trade secret theft case and reminded companies to report suspected crimes like trade secret theft.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2020-10936

Sympa before 6.2.56 allows privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
❌ DoubleGun Group Builds Massive Botnet Using Cloud Services ❌

The latest campaign spread malware via pirate gaming portals.

πŸ“– Read

via "Threatpost".
πŸ•΄ Stay-at-Home Orders Coincide With Massive DNS Surge πŸ•΄

A variety of sites saw as much as seven times the number of domain requests in late March and early April, suggesting attackers attempted massive denial-of-service attacks.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-11059

In AEgir greater than or equal to 21.7.0 and less than 21.10.1, aegir publish and aegir build may leak secrets from environment variables in the browser bundle published to npm. This has been fixed in 21.10.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Netwalker Ransomware Tools Reveal Attacker Tactics and Techniques πŸ•΄

Malware and related files show that ransomware operators don't need a cutting-edge arsenal to be effective.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-11075

In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to 'root' then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1.

πŸ“– Read

via "National Vulnerability Database".
⚠ Android β€˜StrandHogg 2.0’ flaw lets malware assume identity of any app ⚠

A critical security flaw in Android could be used by attackers to β€œassume the identity” of legitimate apps in order to carry out on-device phishing attacks, say researchers.

πŸ“– Read

via "Naked Security".
πŸ” How user credentials from LiveJournal wound up on the Dark Web πŸ”

Hackers are trying to sell 26 million LiveJournal account credentials following a reported data breach that happened years ago.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Phishing attack impersonates Amazon Web Services to steal user credentials πŸ”

The emails spoof an automated notification from AWS to try to capture Amazon account credentials, according to Abnormal Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Who is the weak link in mobile security? This study suggests it's the C-suite πŸ”

A survey of IT pros and top execs found that IT is worried about the lax attitude their bosses have toward security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Even the most tech-savvy Americans have bad online safety habits πŸ”

92% of Americans say they care about online safety and data privacy, yet a new report from iProov showed 44% polled shared passwords and mobile devices with their partners.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Google, Microsoft most spoofed brands in latest phishing attacks πŸ”

Scammers are increasingly exploiting file sharing sites such as Google Docs and Microsoft Sway to steal user credentials, according to Barracuda Networks.

πŸ“– Read

via "Security on TechRepublic".
⚠ Pablo Escobar’s brother sues Apple for $2.6b over FaceTime flaw ⚠

Roberto Escobar says a FaceTime eavesdropping bug led to his address being leaked, assassination threats, and being forced into hiding.

πŸ“– Read

via "Naked Security".
❌ Valak Loader Revamped to Rob Microsoft Exchange Servers ❌

Phishing campaigns targeting enterprises in U.S. and Germany have been used to nab enterprise mailing info, passwords and certificates.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep 41: Super-sized ransomware, FBI v Apple and AirPods hot or not – Naked Security Podcast ⚠

The latest Naked Security podcast is out now!

πŸ“– Read

via "Naked Security".
πŸ•΄ How Elite Protectors Operationalize Security Protection πŸ•΄

There is no silver bullet for cybersecurity. It takes the right people, with the right mindset, applying the right elements of good security from the data center to the SOC.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-11950

VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to upload and execute a script (with resultant execution of OS commands). For example, this affects IT9388-HT devices.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11949

testserver.cgi of the web service on VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to obtain arbitrary files from a camera's local filesystem. For example, this affects IT9388-HT devices.

πŸ“– Read

via "National Vulnerability Database".
⚠ Inside a ransomware gang’s attack toolbox ⚠

Ransomware's changed a lot over the years - here's a peek into a criminal gang's current toolbox...

πŸ“– Read

via "Naked Security".
πŸ” Data Trends Report Highlights Risk of Data Loss in Pandemic πŸ”

With nearly everyone these days working from home, how has the COVID-19 crisis impacted the risk of sensitive data loss?

πŸ“– Read

via "Subscriber Blog RSS Feed ".