πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Intel Tackles Malware Related to Memory Security at Hardware Level πŸ•΄

New control-flow enforcement technology will become available with upcoming Tiger Lake mobile processor, chipmaker says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Following Breach, Marketplace Minted Target of New CCPA Lawsuit πŸ”

The online marketplace, which specializes in greeting cards and wedding invites, was hit with a class action lawsuit under the California Consumer Privacy Act last week, alleging it failed to protect its customers PII.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Twitter Disrupts Wide-Ranging Political Disinformation Campaigns ❌

This removal, of 32K accounts, is not the first time Twitter has taken action to protect its users from influence operations. Researchers weighed in on the practice with Threatpost.

πŸ“– Read

via "Threatpost".
πŸ•΄ Now-Former eBay Security Team Members Charged in Bizarre Cyberstalking Campaign πŸ•΄

A bloody pig mask, doxing threats, and a foiled surveillance attempt were among the actions six ex-eBay employees took against an editor and publisher of a newsletter.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ryuk Continues to Dominate Ransomware Response Cases πŸ•΄

Analysis reveals how Ryuk's operators are changing their techniques and using new means to break in.

πŸ“– Read

via "Dark Reading: ".
❌ Shadow IT: Why It’s Still a Major Risk in Today’s Environments ❌

According to industry analyst firm Gartner, as many as one-third of successful attacks on enterprises target data that are housed in unsanctioned IT resources.

πŸ“– Read

via "Threatpost".
⚠ Eavesdroppers can use light bulbs to listen in from afar ⚠

Researchers have developed an ingenious way to eavesdrop from a distance without relying on planted bugs: they just stare at a light bulb.

πŸ“– Read

via "Naked Security".
⚠ β€˜Anonymous’ takes down Atlanta Police Dept. site after police shooting ⚠

Hackers affiliating themselves with the hacktivist label have joined the Black Lives Matter backlash after a fatal police shooting on Friday.

πŸ“– Read

via "Naked Security".
πŸ•΄ IoT Security Trends & Challenges in the Wake of COVID-19 πŸ•΄

The demand for Internet of Things security practices that protect sensitive medical equipment and data will double within the next five years. Here's why.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization's domain from security threats πŸ”

Unlocked domains are susceptible to malicious tactics that can lead to unauthorized DNS changes and domain name hijacking, says CSC.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Half of Firms Likely Running Vulnerable Oracle E-Business Suite πŸ•΄

Two security vulnerabilities could open up companies to financial attacks and compliance violations if the software is not updated, Onapsis says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Most Americans say 'No' to coronavirus contact tracing apps πŸ”

Some 71% of people polled cited privacy concerns as the main reason for not wanting to use a COVID-19 tracing app, says Avira.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-18614

On the Cypress CYW20735 evaluation board, any data that exceeds 384 bytes is copied and causes an overflow. This is because the maximum BLOC buffer size for sending and receiving data is set to 384 bytes, but everything else is still configured to the usual size of 1092 (which was used for everything in the previous CYW20719 and later CYW20819 evaluation board). To trigger the overflow, an attacker can either send packets over the air or as unprivileged local user. Over the air, the minimal PoC is sending "l2ping -s 600" to the target address prior to any pairing. Locally, the buffer overflow is immediately triggered by opening an ACL or SCO connection to a headset. This occurs because, in WICED Studio 6.2 and 6.4, BT_ACL_HOST_TO_DEVICE_DEFAULT_SIZE and BT_ACL_DEVICE_TO_HOST_DEFAULT_SIZE are set to 384.

πŸ“– Read

via "National Vulnerability Database".
❌ β€˜Ripple20’ Bugs Impact Hundreds of Millions of Connected Devices ❌

The vulnerabilities affect everything from printers to insulin pumps to ICS gear.

πŸ“– Read

via "Threatpost".
❌ Theft of CIA’s β€˜Vault 7’ Secrets Tied to β€˜Woefully Lax” Security ❌

An internal investigation into the 2016 CIA breach condemned the agency's security measures, saying it β€œfocused more on building up cyber tools than keeping them secure."

πŸ“– Read

via "Threatpost".
⚠ Intel announces β€œexploit busting” features in its next processor chips ⚠

More bad news for cybercrooks... we hope.

πŸ“– Read

via "Naked Security".
πŸ•΄ Cisco Brings SecureX into Full Security Lineup to Cut Complexity πŸ•΄

This step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware from Your Lawyer's Perspective πŸ•΄

Three good reasons why your incident response team's first call after a data breach should be to outside counsel.

πŸ“– Read

via "Dark Reading: ".
πŸ” IT pros see increased workload and security threats amid shift to remote working πŸ”

Malicious emails, risky employee behavior, and a rise in software vulnerabilities are the top threats seen by IT professionals, says Ivanti.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Fabricator Claims Competitor Poached Employees, Then Data πŸ”

One company is alleging a rival shop lured two of its most senior employees away - along with trade secrets, confidential information, and a list of its customers.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Adobe Patches 18 Critical Flaws in Out-Of-Band Update ❌

Critical vulnerabilities were patched in Adobe After Effects, Illustrator, Premiere Pro, Premiere Rush and Audition.

πŸ“– Read

via "Threatpost".