πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Ryuk Continues to Dominate Ransomware Response Cases πŸ•΄

Analysis reveals how Ryuk's operators are changing their techniques and using new means to break in.

πŸ“– Read

via "Dark Reading: ".
❌ Shadow IT: Why It’s Still a Major Risk in Today’s Environments ❌

According to industry analyst firm Gartner, as many as one-third of successful attacks on enterprises target data that are housed in unsanctioned IT resources.

πŸ“– Read

via "Threatpost".
⚠ Eavesdroppers can use light bulbs to listen in from afar ⚠

Researchers have developed an ingenious way to eavesdrop from a distance without relying on planted bugs: they just stare at a light bulb.

πŸ“– Read

via "Naked Security".
⚠ β€˜Anonymous’ takes down Atlanta Police Dept. site after police shooting ⚠

Hackers affiliating themselves with the hacktivist label have joined the Black Lives Matter backlash after a fatal police shooting on Friday.

πŸ“– Read

via "Naked Security".
πŸ•΄ IoT Security Trends & Challenges in the Wake of COVID-19 πŸ•΄

The demand for Internet of Things security practices that protect sensitive medical equipment and data will double within the next five years. Here's why.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization's domain from security threats πŸ”

Unlocked domains are susceptible to malicious tactics that can lead to unauthorized DNS changes and domain name hijacking, says CSC.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Half of Firms Likely Running Vulnerable Oracle E-Business Suite πŸ•΄

Two security vulnerabilities could open up companies to financial attacks and compliance violations if the software is not updated, Onapsis says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Most Americans say 'No' to coronavirus contact tracing apps πŸ”

Some 71% of people polled cited privacy concerns as the main reason for not wanting to use a COVID-19 tracing app, says Avira.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-18614

On the Cypress CYW20735 evaluation board, any data that exceeds 384 bytes is copied and causes an overflow. This is because the maximum BLOC buffer size for sending and receiving data is set to 384 bytes, but everything else is still configured to the usual size of 1092 (which was used for everything in the previous CYW20719 and later CYW20819 evaluation board). To trigger the overflow, an attacker can either send packets over the air or as unprivileged local user. Over the air, the minimal PoC is sending "l2ping -s 600" to the target address prior to any pairing. Locally, the buffer overflow is immediately triggered by opening an ACL or SCO connection to a headset. This occurs because, in WICED Studio 6.2 and 6.4, BT_ACL_HOST_TO_DEVICE_DEFAULT_SIZE and BT_ACL_DEVICE_TO_HOST_DEFAULT_SIZE are set to 384.

πŸ“– Read

via "National Vulnerability Database".
❌ β€˜Ripple20’ Bugs Impact Hundreds of Millions of Connected Devices ❌

The vulnerabilities affect everything from printers to insulin pumps to ICS gear.

πŸ“– Read

via "Threatpost".
❌ Theft of CIA’s β€˜Vault 7’ Secrets Tied to β€˜Woefully Lax” Security ❌

An internal investigation into the 2016 CIA breach condemned the agency's security measures, saying it β€œfocused more on building up cyber tools than keeping them secure."

πŸ“– Read

via "Threatpost".
⚠ Intel announces β€œexploit busting” features in its next processor chips ⚠

More bad news for cybercrooks... we hope.

πŸ“– Read

via "Naked Security".
πŸ•΄ Cisco Brings SecureX into Full Security Lineup to Cut Complexity πŸ•΄

This step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware from Your Lawyer's Perspective πŸ•΄

Three good reasons why your incident response team's first call after a data breach should be to outside counsel.

πŸ“– Read

via "Dark Reading: ".
πŸ” IT pros see increased workload and security threats amid shift to remote working πŸ”

Malicious emails, risky employee behavior, and a rise in software vulnerabilities are the top threats seen by IT professionals, says Ivanti.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Fabricator Claims Competitor Poached Employees, Then Data πŸ”

One company is alleging a rival shop lured two of its most senior employees away - along with trade secrets, confidential information, and a list of its customers.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Adobe Patches 18 Critical Flaws in Out-Of-Band Update ❌

Critical vulnerabilities were patched in Adobe After Effects, Illustrator, Premiere Pro, Premiere Rush and Audition.

πŸ“– Read

via "Threatpost".
πŸ•΄ 83% of Forbes 2000 Companies' Web Domains Are Poorly Protected πŸ•΄

Only a handful have controls against domain-name hijacking, DNS modifications, and other threats, a new CSC study finds.

πŸ“– Read

via "Dark Reading: ".
❌ Qbot Trojan Reappears to Go After U.S. Banking Customers ❌

The 12-year-old malware is still dangerous, sporting advanced evasion techniques.

πŸ“– Read

via "Threatpost".
πŸ•΄ Adobe Releases PDF Protected Mode for Document Cloud πŸ•΄

The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CIA's 'Lax' Security Led to 2017 Compromise of Its Hacking Tools πŸ•΄

Internal CIA report released today shows poor security controls surrounding the intelligence agency's hacking tools.

πŸ“– Read

via "Dark Reading: ".