πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2011-2863

Insufficient policy enforcement in V8 in Google Chrome prior to 14.0.0.0 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-1805

Bad cast in CSS in Google Chrome prior to 11.0.0.0 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
❌ ZLoader-Laced Emails Target Unemployed Victims ❌

Researchers are warning of spear-phishing emails with CV lures that spread the ZLoader malware, which steals banking credentials from victims.

πŸ“– Read

via "Threatpost".
⚠ Google deletes Indian app that deleted Chinese apps ⚠

Google has deleted an app from the Play Store that offered to delete Android software associated with China.

πŸ“– Read

via "Naked Security".
πŸ” Cybercriminals now spoofing job hunters to deploy password-stealing malware πŸ”

Malicious files masquerading as curriculum vitae are being sent to businesses to install malware that can capture passwords and other sensitive information, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
⚠ Nuclear missile contractor hacked in Maze ransomware attack ⚠

Attackers hacked and encrypted the computers of a contractor whose clients include the US military, government agencies and major military contractors.

πŸ“– Read

via "Naked Security".
πŸ•΄ What Usability Means to Security Pros πŸ•΄

The last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools.

πŸ“– Read

via "Dark Reading: ".
❌ Google Faces Privacy Lawsuit Over Tracking Users in Incognito Mode ❌

A $5 billion class-action lawsuit filed in a California federal court alleges that Google's Chrome incognito mode collects browser data without people’s knowledge or consent.

πŸ“– Read

via "Threatpost".
πŸ•΄ Could Automation Kill the Security Analyst? πŸ•΄

Five skills to ensure job security in the Age of Automation.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to encrypt an external drive or card in macOS πŸ”

Looking to encrypt removable storage on macOS, but can't figure out how? Jack Wallen shows you the way to make this work.

πŸ“– Read

via "Security on TechRepublic".
πŸ” New Java-based ransomware targets Windows and Linux servers πŸ”

Aimed at SMBs, educational facilities, and software companies, the ransomware leverages Java to encrypt server-based files, according to BlackBerry and KPMG.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Office Files Most Popular for Exploit Tests πŸ•΄

A new report examines attacker methodologies to better understand how exploit testing is conducted in the wild.

πŸ“– Read

via "Dark Reading: ".
πŸ” Unauthorized drone detection is getting easier with software from Blackberry πŸ”

A new partnership with Dedrone has led to a platform that can instantly detect and notify security personnel of drones in sensitive airspace.

πŸ“– Read

via "Security on TechRepublic".
❌ U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked ❌

Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.

πŸ“– Read

via "Threatpost".
❌ Zoom Restricts End-to-End Encryption to Paid Users ❌

The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.

πŸ“– Read

via "Threatpost".
⚠ You DID change your password after that data breach, didn’t you? ⚠

Apparently, some people consider their passwords "invincible", even after a data breach. Don't be those people.

πŸ“– Read

via "Naked Security".
❌ Understanding the Payload-Less Email Attacks Evading Your Security Team ❌

Business email compromise (BEC) attacks represent a small percentage of email attacks, but disproportionately represent the greatest financial risk.

πŸ“– Read

via "Threatpost".
πŸ•΄ Strengthening Secure Information Sharing Through Technology & Standards πŸ•΄

How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-21244

An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows arbitrary application execution via an embedded executable file in a PDF portfolio, aka FG-VD-18-029.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21243

An issue was discovered in Foxit PhantomPDF before 8.3.6. It has COM object mishandling when Microsoft Word is used.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21242

An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows Remote Code Execution via a GoToE or GoToR action.

πŸ“– Read

via "National Vulnerability Database".