πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time ❌

Microsoft has warned on a new breed of patient ransomware attacks that lurk in networks for weeks before striking.

πŸ“– Read

via "Threatpost".
πŸ•΄ Data Loss Spikes Under COVID-19 Lockdowns πŸ•΄

Two new reports suggest a massive gap between how organizations have prepared their cybersecurity defenses and the reality of their efficacy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google, Microsoft Brands Impersonated the Most in Form-Based Attacks πŸ•΄

Attackers are preying on users' inclination to click on familiar-looking websites, but instead trick them into sharing usernames and passwords.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Vulnerability Disclosures Drop in Q1 for First Time in a Decade πŸ•΄

Even with more security issues published on Patch Tuesdays, the total number of software flaws dropped for the first three months of 2020, according to one tally.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to properly secure sysctl on Linux πŸ”

Protecting your Linux servers against SYN attacks and IP spoofing isn't nearly as hard you think. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-13362

In QEMU 4.2.0, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-13361

In QEMU 4.2.0, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20807

In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).

πŸ“– Read

via "National Vulnerability Database".
❌ Google Location Tracking Lambasted in Arizona Lawsuit ❌

The lawsuit, filed against Google by Arizona's Attorney General, alleges that the tech giant uses β€œdeceptive and unfair conduct” to obtain users’ location data.

πŸ“– Read

via "Threatpost".
πŸ•΄ 3 SMB Cybersecurity Myths Debunked πŸ•΄

Small and midsize businesses are better at cyber resilience than you might think.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ NSA Warns Russia's 'Sandworm' Group Is Targeting Email Servers πŸ•΄

The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable two-factor authentication for Bitwarden πŸ”

If you use Bitwarden as your password manager of choice, you owe it to yourself to enable two-factor authentication.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-13245

Certain NETGEAR devices are affected by Missing SSL Certificate Validation. This affects R7000 1.0.9.6_1.2.19 through 1.0.11.100_10.2.10, and possibly R6120, R7800, R6220, R8000, R6350, R9000, R6400, RAX120, R6400v2, RBR20, R6800, XR300, R6850, XR500, and R7000P.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11079

node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.

πŸ“– Read

via "National Vulnerability Database".
❌ Hackers Compromise Cisco Servers Via SaltStack Flaws ❌

Attackers compromised six Cisco VIRL-PE servers that are affected by critical SaltStack vulnerabilities.

πŸ“– Read

via "Threatpost".
πŸ•΄ Valak Malware Retasked to Steal Data from US, German Firms πŸ•΄

Once considered a loader for other malware, Valak regularly conducts reconnaissance and steals information and credentials, new analysis shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers ID Hacktivist Who Defaced Nearly 5,000 Websites πŸ•΄

Opsec mistakes lead a Check Point researcher to an individual in Brazil who was behind a longtime hacking campaign.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ GitHub Supply Chain Attack Uses Octopus Scanner Malware πŸ•΄

Octopus Scanner is a new malware used to compromise 26 open source projects in a massive GitHub supply chain attack.

πŸ“– Read

via "Dark Reading: ".
❌ Inside the Hoaxcalls Botnet: Both Success and Failure ❌

The DDoS group sets itself apart by using exploits -- but it doesn't always pan out.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2020-11082

In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-6342

An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.

πŸ“– Read

via "National Vulnerability Database".