πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” New Java-based ransomware targets Windows and Linux servers πŸ”

Aimed at SMBs, educational facilities, and software companies, the ransomware leverages Java to encrypt server-based files, according to BlackBerry and KPMG.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Office Files Most Popular for Exploit Tests πŸ•΄

A new report examines attacker methodologies to better understand how exploit testing is conducted in the wild.

πŸ“– Read

via "Dark Reading: ".
πŸ” Unauthorized drone detection is getting easier with software from Blackberry πŸ”

A new partnership with Dedrone has led to a platform that can instantly detect and notify security personnel of drones in sensitive airspace.

πŸ“– Read

via "Security on TechRepublic".
❌ U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked ❌

Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.

πŸ“– Read

via "Threatpost".
❌ Zoom Restricts End-to-End Encryption to Paid Users ❌

The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.

πŸ“– Read

via "Threatpost".
⚠ You DID change your password after that data breach, didn’t you? ⚠

Apparently, some people consider their passwords "invincible", even after a data breach. Don't be those people.

πŸ“– Read

via "Naked Security".
❌ Understanding the Payload-Less Email Attacks Evading Your Security Team ❌

Business email compromise (BEC) attacks represent a small percentage of email attacks, but disproportionately represent the greatest financial risk.

πŸ“– Read

via "Threatpost".
πŸ•΄ Strengthening Secure Information Sharing Through Technology & Standards πŸ•΄

How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-21244

An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows arbitrary application execution via an embedded executable file in a PDF portfolio, aka FG-VD-18-029.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21243

An issue was discovered in Foxit PhantomPDF before 8.3.6. It has COM object mishandling when Microsoft Word is used.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21242

An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows Remote Code Execution via a GoToE or GoToR action.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21241

An issue was discovered in Foxit PhantomPDF before 8.3.6. It has an untrusted search path that allows a DLL to execute remote code.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21240

An issue was discovered in Foxit Reader and PhantomPDF before 9.2. It allows memory consumption via an ArrayBuffer(0xfffffffe) call.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21239

An issue was discovered in Foxit Reader and PhantomPDF before 9.2. It allows NTLM credential theft via a GoToE or GoToR action.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21238

An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows memory consumption via an ArrayBuffer(0xfffffffe) call.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21237

An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows NTLM credential theft via a GoToE or GoToR action.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21236

An issue was discovered in Foxit Reader before 2.4.4. It has a NULL pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21235

An issue was discovered in Foxit E-mail advertising system before September 2018. It allows authentication bypass and information disclosure, related to Interspire Email Marketer.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Malware Campaign Hides in Resumes and Medical Leave Forms πŸ•΄

The campaigns have been part of the overall increase in coronavirus-related malware activity.

πŸ“– Read

via "Dark Reading: ".
πŸ” Food Companies Spar Over Stolen Trade Secrets Claim πŸ”

In a new lawsuit, a candy bar company is alleging a former employee downloaded more than 6,000 files involving its trade secrets, strategies, and market insights, before leaving to join a competitor.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Trump, Biden Campaign Staffers Targeted By APT Phishing Emails ❌

Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.

πŸ“– Read

via "Threatpost".