πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Why organizations should consider HTTPS inspection to find encrypted malware πŸ”

Some 67% of all malware seen in the first quarter was delivered via HTTPS, according to security firm WatchGuard Technologies.

πŸ“– Read

via "Security on TechRepublic".
❌ Office 365 Users Targeted By β€˜Coronavirus Employee Training’ Phish ❌

Threat actors shift focus from COVID-19 to employee coronavirus training and current events like Black Lives Matter as cyber-attacks continue to rise.

πŸ“– Read

via "Threatpost".
πŸ•΄ Lucifer Malware Aims to Become Broad Platform for Attacks πŸ•΄

The recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Better Collaboration Between Security & Development πŸ•΄

Security and development teams must make it clear why their segment of the development life cycle is relevant to the other teams in the pipeline.

πŸ“– Read

via "Dark Reading: ".
❌ Nvidia Warns Windows Gamers of Serious Graphics Driver Bugs ❌

Several high-severity flaws in Nvidia's GPU display drivers for Windows users could lead to code-execution, DoS and more.

πŸ“– Read

via "Threatpost".
πŸ•΄ Another Record-Breaking DDoS Attack Signals Shift in Criminal Methods πŸ•΄

Malicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.

πŸ“– Read

via "Dark Reading: ".
πŸ” FBI: Online crimes increasing in Florida, California, Texas, Ohio, and New York πŸ”

Analysis of FBI data found that nearly $2 billion was stolen from US victims in 2019 just from business email compromise.

πŸ“– Read

via "Security on TechRepublic".
πŸ” What your personal identity and data are worth on the Dark Web πŸ”

Your credit card is worth around $33, your driver's license around $27, and your PayPal account around $42, according to Reviews.org.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Phishing attacks target workers returning to the office πŸ”

Emails with fake COVID-19 training materials are trying to trick employees into sharing their Microsoft credentials, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Vulnerabilities Declining in Open Source, But Slow Patching Still a Problem πŸ•΄

Even as more code is produced, indirect dependencies continue to undermine security.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Contact Tracing & Threat Intel: Broken Tools & Processes πŸ•΄

How epidemiology can solve the people problem in security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-21268

The traceroute (aka node-traceroute) package through 1.0.0 for Node.js allows remote command injection via the host parameter. This occurs because the Child.exec() method, which is considered to be not entirely safe, is used. In particular, an OS command can be placed after a newline character.

πŸ“– Read

via "National Vulnerability Database".
❌ Golang Worm Widens Scope to Windows, Adds Payload Capacity ❌

A first-stage malware loader spotted in active campaigns has added additional exploits and a new backdoor capability.

πŸ“– Read

via "Threatpost".
πŸ” Senate's New Anti-Encryption Bill Rankles Privacy Advocates πŸ”

Privacy advocates are up in arms about a sweeping new bill introduced this week that would allow "lawful access" of encrypted devices and services with a warrant.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Expiring security certificates may start shutting down IoT devices πŸ”

Updating CA root SSL certificates requires updating the firmware on streaming devices, smart devices, routers, cameras, and more.

πŸ“– Read

via "Security on TechRepublic".
❌ Nationwide Facial Recognition Ban Proposed By Lawmakers ❌

Lawmakers proposed a new bill that would ban the use of facial recognition by law enforcement nationwide.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 Tips for Effective Deception πŸ•΄

The right decoys can frustrate attackers and help detect threats more quickly.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny πŸ•΄

Researchers from IntSights observed a sharp increase in the use of popular instant messaging apps over the past year among threat groups.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-10379

In Pillow before 6.2.3 and 7.x before 7.0.1, there are two Buffer Overflows in libImaging/TiffDecode.c.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10378

In libImaging/PcxDecode.c in Pillow before 6.2.3 and 7.x before 7.0.1, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10177

Pillow before 6.2.3 and 7.x before 7.0.1 has multiple out-of-bounds reads in libImaging/FliDecode.c.

πŸ“– Read

via "National Vulnerability Database".