πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Even the most tech-savvy Americans have bad online safety habits πŸ”

92% of Americans say they care about online safety and data privacy, yet a new report from iProov showed 44% polled shared passwords and mobile devices with their partners.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Google, Microsoft most spoofed brands in latest phishing attacks πŸ”

Scammers are increasingly exploiting file sharing sites such as Google Docs and Microsoft Sway to steal user credentials, according to Barracuda Networks.

πŸ“– Read

via "Security on TechRepublic".
⚠ Pablo Escobar’s brother sues Apple for $2.6b over FaceTime flaw ⚠

Roberto Escobar says a FaceTime eavesdropping bug led to his address being leaked, assassination threats, and being forced into hiding.

πŸ“– Read

via "Naked Security".
❌ Valak Loader Revamped to Rob Microsoft Exchange Servers ❌

Phishing campaigns targeting enterprises in U.S. and Germany have been used to nab enterprise mailing info, passwords and certificates.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep 41: Super-sized ransomware, FBI v Apple and AirPods hot or not – Naked Security Podcast ⚠

The latest Naked Security podcast is out now!

πŸ“– Read

via "Naked Security".
πŸ•΄ How Elite Protectors Operationalize Security Protection πŸ•΄

There is no silver bullet for cybersecurity. It takes the right people, with the right mindset, applying the right elements of good security from the data center to the SOC.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-11950

VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to upload and execute a script (with resultant execution of OS commands). For example, this affects IT9388-HT devices.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11949

testserver.cgi of the web service on VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to obtain arbitrary files from a camera's local filesystem. For example, this affects IT9388-HT devices.

πŸ“– Read

via "National Vulnerability Database".
⚠ Inside a ransomware gang’s attack toolbox ⚠

Ransomware's changed a lot over the years - here's a peek into a criminal gang's current toolbox...

πŸ“– Read

via "Naked Security".
πŸ” Data Trends Report Highlights Risk of Data Loss in Pandemic πŸ”

With nearly everyone these days working from home, how has the COVID-19 crisis impacted the risk of sensitive data loss?

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How one hacktivist became a full-fledged cybercriminal πŸ”

Though hacktivism can sometimes stem from a legitimate cause, one person couldn't resist turning to true cybercrime, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
❌ PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time ❌

Microsoft has warned on a new breed of patient ransomware attacks that lurk in networks for weeks before striking.

πŸ“– Read

via "Threatpost".
πŸ•΄ Data Loss Spikes Under COVID-19 Lockdowns πŸ•΄

Two new reports suggest a massive gap between how organizations have prepared their cybersecurity defenses and the reality of their efficacy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google, Microsoft Brands Impersonated the Most in Form-Based Attacks πŸ•΄

Attackers are preying on users' inclination to click on familiar-looking websites, but instead trick them into sharing usernames and passwords.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Vulnerability Disclosures Drop in Q1 for First Time in a Decade πŸ•΄

Even with more security issues published on Patch Tuesdays, the total number of software flaws dropped for the first three months of 2020, according to one tally.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to properly secure sysctl on Linux πŸ”

Protecting your Linux servers against SYN attacks and IP spoofing isn't nearly as hard you think. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-13362

In QEMU 4.2.0, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-13361

In QEMU 4.2.0, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20807

In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).

πŸ“– Read

via "National Vulnerability Database".
❌ Google Location Tracking Lambasted in Arizona Lawsuit ❌

The lawsuit, filed against Google by Arizona's Attorney General, alleges that the tech giant uses β€œdeceptive and unfair conduct” to obtain users’ location data.

πŸ“– Read

via "Threatpost".
πŸ•΄ 3 SMB Cybersecurity Myths Debunked πŸ•΄

Small and midsize businesses are better at cyber resilience than you might think.

πŸ“– Read

via "Dark Reading: ".