πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ β€˜Bot or Not?’ – a game to train us to spot chatbots faking it as humans ⚠

Can you tell whether you're talking to a human or AI?

πŸ“– Read

via "Naked Security".
πŸ” Honda hit by cyberattack that impacted its global operations πŸ”

The automaker's customer service and financial services are unavailable as it deals with an attack that experts believe is ransomware.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 92% of SMBs think they can recover from a disaster, but many don't have plans in place πŸ”

New research shows that the vast majority of small and midsize leaders believe they expect, and can handle, the unexpectedβ€”but 16% don't even know their recovery time objective.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How DNS attacks threaten organizations πŸ”

Application downtime was the most significant side effect of a DNS attack, according to EfficientIP.

πŸ“– Read

via "Security on TechRepublic".
❌ Thanos Ransomware First to Weaponize RIPlace Tactic ❌

Thanos is the first ransomware family to feature the weaponized RIPlace tactic, enabling it to bypass ransomware protections.

πŸ“– Read

via "Threatpost".
❌ Encryption Utility Firm Accused of Bundling Malware Functions in Product ❌

The increasingly prevalent GuLoader malware has been traced back to a far-reaching encryption service that attempts to pass as above-board.

πŸ“– Read

via "Threatpost".
πŸ•΄ 3 Ways the Pandemic Will Affect Enterprise Security in the Future πŸ•΄

While CISOs have been focused on immediate threats, it's time to look ahead to what a post-COVID-19 future will look like.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is Cyber Security? Definition, Best Practices & More πŸ”

Learn about cyber security, why it's important, and how to get started building a cyber security program in this installment of our Data Protection 101 series.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2019-4576

IBM QRadar Network Packet Capture 7.3.0 - 7.3.3 Patch 1 and 7.4.0 GA does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 166803.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-3588

Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow unauthorized users to interact with the On-Access Scan Messages - Threat Alert Window when the Windows Login Screen is locked.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-3585

Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow local users to interact with the On-Access Scan Messages - Threat Alert Window with elevated privileges via running McAfee Tray with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Efficient Security Testing Requires Automation, but Humans Are Needed Too πŸ•΄

An annual survey of penetration testers finds that although machines can quickly find many classes of vulnerabilities, human analysts are still necessary to gauge the severity of discovered issues.

πŸ“– Read

via "Dark Reading: ".
πŸ›  WhatWeb Scanner 0.5.2 πŸ› 

WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Zeek 3.1.4 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Asset Management Mess? How to Get Organized πŸ•΄

Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-10708

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Fake COVID-19 Contact-Tracing Apps Infect Android Phones πŸ•΄

Researchers find 12 Android applications disguised as official COVID-19 contact tracing apps installing malware onto devices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Telehealth Attack Surface πŸ•΄

Amid the surge in digital healthcare stemming from the coronavirus pandemic, security is taking a backseat to usability.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-10755

An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project

πŸ“– Read

via "National Vulnerability Database".
❌ Critical Intel Flaws Fixed in Active Management Technology ❌

Two critical flaws in Intel AMT, which could enable privilege escalation, were patched along with 20 other bugs in its June security update.

πŸ“– Read

via "Threatpost".
πŸ” How to better defend your cloud-based environments against cyberattack πŸ”

A rapid, disorganized shift to the cloud can open the door to data theft, ransomware, malware, and other cyberattacks, says IBM X-Force.

πŸ“– Read

via "Security on TechRepublic".