πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ EvilQuest: Inside A β€˜New Class’ of Mac Malware ❌

Mac expert Thomas Reed discusses how EvilQuest is ushering in a new class of Mac malware.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Issues Out-of-Band Patches for RCE Flaws πŸ•΄

Vulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New MacOS Ransomware Hides in Pirated Program πŸ•΄

A bogus installer for Little Snitch carries a ransomware hitchhiker.

πŸ“– Read

via "Dark Reading: ".
❌ Alina Point-of-Sale Malware Spotted in Ongoing Campaign ❌

The malware is using DNS tunneling to exfiltrate payment-card data.

πŸ“– Read

via "Threatpost".
❌ Cisco Warns of High-Severity Bug in Small Business Switch Lineup ❌

A high-severity flaw allows remote, unauthenticated attackers to potentially gain administrative privileges for Cisco small business switches.

πŸ“– Read

via "Threatpost".
πŸ•΄ DHS Shares Data on Top Cyberthreats to Federal Agencies πŸ•΄

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Businesses Invest in Cloud Security Tools Despite Concerns πŸ•΄

A majority of organizations say the acceleration was driven by a need to support more remote employees.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Chinese Software Company Aisino Uninstalls GoldenSpy Malware πŸ•΄

Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-15312

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is a Zolo Halo DNS rebinding attack. The device was found to be vulnerable to DNS rebinding. Combined with one of the many /httpapi.asp endpoint command-execution security issues, the DNS rebinding attack could allow an attacker to compromise the victim device from the Internet.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15311

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15310

An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign πŸ•΄

Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-20417

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate internal services via an Information Disclosure vulnerability. The vulnerability is only exploitable if WebSudo is disabled in Jira. The affected versions are before version 8.4.2.

πŸ“– Read

via "National Vulnerability Database".
⚠ 133m records for sale as fruits of data breach spree keep raining down ⚠

Databases can be had for as little as $100, on up to $1,100. Most, if not all, are being sold by the hacking group Shiny Hunters.

πŸ“– Read

via "Naked Security".
πŸ•΄ 7 IoT Tips for Home Users πŸ•΄

Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep every one secure.

πŸ“– Read

via "Dark Reading: ".
πŸ” Zoom: We've delivered on all of our security and privacy promises, apart from one πŸ”

CEO Eric Yuan said the company had been working to improve safety, privacy and security, but has pushed back the date for its transparency report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DHS Shares Data on Top Cyber Threats to Federal Agencies πŸ•΄

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.

πŸ“– Read

via "Dark Reading: ".
❌ FakeSpy Android Malware Spread Via β€˜Postal-Service’ Apps ❌

New β€˜smishing’ campaigns from the Roaming Mantis threat group infect Android users with the FakeSpy infostealer.

πŸ“– Read

via "Threatpost".
πŸ•΄ Lessons from COVID-19 Cyberattacks: Where Do We Go Next? πŸ•΄

We need to learn from the attacks and attempts that have occurred in order to prepare for the future.

πŸ“– Read

via "Dark Reading: ".
⚠ MongoDB ransom threats step up from blackmail to full-on wiping ⚠

Still thinking "the crooks probably won't find me if I make a security blunder"?

πŸ“– Read

via "Naked Security".
πŸ” EU Data Protection Authority Wants to Promote Digital Justice πŸ”

The European Data Protection Supervisor (EDPS) announced its plans for 2020-2024 this week and stressed that the EU needs digital solidarity and to make data work for all people across Europe’s borders.

πŸ“– Read

via "Subscriber Blog RSS Feed ".