πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-21239

An issue was discovered in Foxit Reader and PhantomPDF before 9.2. It allows NTLM credential theft via a GoToE or GoToR action.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21238

An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows memory consumption via an ArrayBuffer(0xfffffffe) call.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21237

An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows NTLM credential theft via a GoToE or GoToR action.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21236

An issue was discovered in Foxit Reader before 2.4.4. It has a NULL pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-21235

An issue was discovered in Foxit E-mail advertising system before September 2018. It allows authentication bypass and information disclosure, related to Interspire Email Marketer.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Malware Campaign Hides in Resumes and Medical Leave Forms πŸ•΄

The campaigns have been part of the overall increase in coronavirus-related malware activity.

πŸ“– Read

via "Dark Reading: ".
πŸ” Food Companies Spar Over Stolen Trade Secrets Claim πŸ”

In a new lawsuit, a candy bar company is alleging a former employee downloaded more than 6,000 files involving its trade secrets, strategies, and market insights, before leaving to join a competitor.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Trump, Biden Campaign Staffers Targeted By APT Phishing Emails ❌

Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.

πŸ“– Read

via "Threatpost".
❌ Tycoon Ransomware Banks on Unusual Image File Tactic ❌

To fly under the radar, the newly discovered ransomware is compiled into a Java image file format that's rarely used by developers.

πŸ“– Read

via "Threatpost".
πŸ‘1
πŸ•΄ New 'Tycoon' Ransomware Strain Targets Windows, Linux πŸ•΄

Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Privacy & Security Outlook for Businesses Post-COVID-19 πŸ•΄

Long-term business needs -- and the ethical implications that result -- don't simply go away just because we're navigating a global health crisis.

πŸ“– Read

via "Dark Reading: ".
⚠ Botnet blasts WordPress sites with configuration download attacks ⚠

A million sites attacked by 20,000 different computers.

πŸ“– Read

via "Naked Security".
⚠ S2 Ep42: Apple auth attack, Octopus Scanner, Escobar escapades – Naked Security podcast ⚠

The latest Naked Security podcast is out now!

πŸ“– Read

via "Naked Security".
❌ WhatsApp Phone Numbers Pop Up in Google Search Results β€” But is it a Bug? ❌

A researcher found that phone numbers tied to WhatsApp accounts are indexed publicly on Google Search creating what he claims is a β€œprivacy issue” for users.

πŸ“– Read

via "Threatpost".
πŸ•΄ Local, State Governments Face Cybersecurity Crisis πŸ•΄

Ransomware hit small government organizations hard in 2019. Now they have to deal with budget cuts, pandemic precautions, social unrest, and the coming election cycle.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Name That Toon: Sign of the Tides πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
❌ News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate ❌

Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.

πŸ“– Read

via "Threatpost".
❌ Electrolux, Others Conned Out of Big Money by BEC Scammer ❌

Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 6/5 Edition πŸ”

The city of Minneapolis hit with a DDoS attack, Zoom's new security policy causes social media uproar, and a wave of cyber-attacks target anti-racism sites - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ›  Faraday 3.11.1 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ FTC Slams Children’s App Developer for COPPA Violations ❌

Children's app developer HyperBeard must pay $150,000 after the FTC claimed it violated privacy laws.

πŸ“– Read

via "Threatpost".