πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Beware β€œsecure DNS” scam targeting website owners and bloggers ⚠

If you run a website or a blog, watch out for emails promising "DNSSEC upgrades" - these scammers are after your whole site.

πŸ“– Read

via "Naked Security".
πŸ•΄ Tall Order for Small Businesses: 3 Tips to Find Tailored Security Solutions πŸ•΄

SMBs are responsible for nearly 44% of US economic activity, but given the current climate, it can be difficult for them to find available and/or affordable resources.

πŸ“– Read

via "Dark Reading: ".
πŸ” IBM Research releases differential privacy library that works with machine learning πŸ”

The open-source repository is unique in that most tasks can be run with only a single line of code, according to the company.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-3681

A External Control of File Name or Path vulnerability in osc of SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Software Development Kit 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP4; openSUSE Leap 15.1, openSUSE Factory allowed remote attackers that can change downloaded packages to overwrite arbitrary files. This issue affects: SUSE Linux Enterprise Module for Development Tools 15 osc versions prior to 0.169.1-3.20.1. SUSE Linux Enterprise Software Development Kit 12-SP5 osc versions prior to 0.162.1-15.9.1. SUSE Linux Enterprise Software Development Kit 12-SP4 osc versions prior to 0.162.1-15.9.1. openSUSE Leap 15.1 osc versions prior to 0.169.1-lp151.2.15.1. openSUSE Factory osc versions prior to 0.169.0 .

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Good Cyber Hygiene in a Pandemic-Driven World Starts with Us πŸ•΄

Three ways that security teams can improve processes and collaboration, all while creating the common ground needed to sustain them.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Sifter 7.5 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Haveged 1.9.13 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2019-19160

Reportexpress ProPlus contains a vulnerability that could allow an arbitrary code execution by inserted VBscript into the configure file(rxp).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18256

BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18254

BIOTRONIK CardioMessenger II, The affected products do not encrypt sensitive information while at rest. An attacker with physical access to the CardioMessenger can disclose medical measurement data and the serial number from the implanted cardiac device the CardioMessenger is paired with.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18252

BIOTRONIK CardioMessenger II, The affected products allow credential reuse for multiple authentication purposes. An attacker with adjacent access to the CardioMessenger can disclose its credentials used for connecting to the BIOTRONIK Remote Communication infrastructure.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18248

BIOTRONIK CardioMessenger II, The affected products transmit credentials in clear-text prior to switching to an encrypted communication channel. An attacker can disclose the productÒ€ℒs client credentials for connecting to the BIOTRONIK Remote Communication infrastructure.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18246

BIOTRONIK CardioMessenger II, The affected products do not properly enforce mutual authentication with the BIOTRONIK Remote Communication infrastructure.

πŸ“– Read

via "National Vulnerability Database".
❌ Unpatched Wi-Fi Extender Opens Home Networks to Remote Control ❌

The Homeplug device, from Tenda, suffers from web server bugs as well as a DoS flaw.

πŸ“– Read

via "Threatpost".
❌ AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals ❌

Comparitech’s Paul Bischoff found that Amazon’s facial recognition platform misidentified an alarming number of people, and was racially biased.

πŸ“– Read

via "Threatpost".
πŸ” ID theft: Fake Google alerts are now delivering malware πŸ”

E-mails telling you that your data has been compromised are now sometimes fake. Be careful what you click on.

πŸ“– Read

via "Security on TechRepublic".
πŸ” ID theft: Fake Google alerts are now delivering malware πŸ”

E-mails telling you that your data has been compromised are now sometimes fake. Be careful what you click on.

πŸ“– Read

via "Security on TechRepublic".
❌ Tuesday’s Magento 1 EOL Leaves Clock Ticking on 100K Online Stores ❌

Adobe and payment-card companies are making last-minute pleas for e-commerce sites to update to Magento 2, to avoid Magecart attacks and more.

πŸ“– Read

via "Threatpost".
πŸ•΄ Files Stolen from 945 Websites Discovered on Dark Web πŸ•΄

Researchers who found the archived SQL files estimate up to 14 million people could be affected.

πŸ“– Read

via "Dark Reading: ".
πŸ” 2020 sees rise in invoice and payment fraud BEC attacks πŸ”

Abnormal Security found a 75% increase in this type of campaign in the first three months of the year and a spike of 200% from April to May.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Email Error Leads to Exposed PHI of 11,500 Patients πŸ”

A health plan recently disclosed a data breach of 11,500 patients that was triggered by an email mistake.

πŸ“– Read

via "Subscriber Blog RSS Feed ".