๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
ATENTIONโ€ผ New - CVE-2018-21236

An issue was discovered in Foxit Reader before 2.4.4. It has a NULL pointer dereference.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2018-21235

An issue was discovered in Foxit E-mail advertising system before September 2018. It allows authentication bypass and information disclosure, related to Interspire Email Marketer.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Malware Campaign Hides in Resumes and Medical Leave Forms ๐Ÿ•ด

The campaigns have been part of the overall increase in coronavirus-related malware activity.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Food Companies Spar Over Stolen Trade Secrets Claim ๐Ÿ”

In a new lawsuit, a candy bar company is alleging a former employee downloaded more than 6,000 files involving its trade secrets, strategies, and market insights, before leaving to join a competitor.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
โŒ Trump, Biden Campaign Staffers Targeted By APT Phishing Emails โŒ

Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.

๐Ÿ“– Read

via "Threatpost".
โŒ Tycoon Ransomware Banks on Unusual Image File Tactic โŒ

To fly under the radar, the newly discovered ransomware is compiled into a Java image file format that's rarely used by developers.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ‘1
๐Ÿ•ด New 'Tycoon' Ransomware Strain Targets Windows, Linux ๐Ÿ•ด

Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด The Privacy & Security Outlook for Businesses Post-COVID-19 ๐Ÿ•ด

Long-term business needs -- and the ethical implications that result -- don't simply go away just because we're navigating a global health crisis.

๐Ÿ“– Read

via "Dark Reading: ".
โš  Botnet blasts WordPress sites with configuration download attacks โš 

A million sites attacked by 20,000 different computers.

๐Ÿ“– Read

via "Naked Security".
โš  S2 Ep42: Apple auth attack, Octopus Scanner, Escobar escapades โ€“ Naked Security podcast โš 

The latest Naked Security podcast is out now!

๐Ÿ“– Read

via "Naked Security".
โŒ WhatsApp Phone Numbers Pop Up in Google Search Results โ€” But is it a Bug? โŒ

A researcher found that phone numbers tied to WhatsApp accounts are indexed publicly on Google Search creating what he claims is a โ€œprivacy issueโ€ for users.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Local, State Governments Face Cybersecurity Crisis ๐Ÿ•ด

Ransomware hit small government organizations hard in 2019. Now they have to deal with budget cuts, pandemic precautions, social unrest, and the coming election cycle.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Name That Toon: Sign of the Tides ๐Ÿ•ด

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate โŒ

Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.

๐Ÿ“– Read

via "Threatpost".
โŒ Electrolux, Others Conned Out of Big Money by BEC Scammer โŒ

Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ” Friday Five: 6/5 Edition ๐Ÿ”

The city of Minneapolis hit with a DDoS attack, Zoom's new security policy causes social media uproar, and a wave of cyber-attacks target anti-racism sites - catch up on the week's news with the Friday Five.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
๐Ÿ›  Faraday 3.11.1 ๐Ÿ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
โŒ FTC Slams Childrenโ€™s App Developer for COPPA Violations โŒ

Children's app developer HyperBeard must pay $150,000 after the FTC claimed it violated privacy laws.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Spear-Phishing Campaign Hits Developer Collaboration System Users ๐Ÿ•ด

Users of Zeplin, a popular developer and designer collaboration system, have been hit with new waves of spear-phishing attacks in the last month.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Q&A: Eugene Spafford on the Risks of Internet Voting ๐Ÿ•ด

Allowing people to cast their ballots online to circumvent coronavirus-related health concerns introduces problems that we simply don't know how to manage, says the Purdue University professor and security leader.

๐Ÿ“– Read

via "Dark Reading: ".