πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Microsoft’s MFA is so strong, it locked out users for 8 hours ⚠

It's a long time for Office 365 and Azure AD users to be locked out of such an important business platform, but MFA remains a good idea.

πŸ“– Read

via "Naked Security".
⚠ Big breach, Creep-O-Meter and Black Friday [PODCAST] ⚠

It's the latest Naked Security Podcast - you're welcome!

πŸ“– Read

via "Naked Security".
πŸ•΄ 2018 Hacker Kids Gift Guide πŸ•΄

Fun gift choices that foster design thinking and coding skills in kids both young and old.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install fail2ban on Ubuntu Server 18.04 πŸ”

Your Ubuntu Server might be vulnerable to attacks. To prevent unwanted logins, Jack Wallen shows you how to install intrusion detection system, fail2ban.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ To Stockpile or Not to Stockpile Zero-Days? πŸ•΄

As the debate rages on, there is still no simple answer to the question of whether the government should stockpile or publicly disclose zero-day vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why e-commerce is winning: Most Americans now trust online retailers with their data πŸ”

Despite conflicting opinions about online privacy, customers choose to shop with companies that take reasonable security precautions.

πŸ“– Read

via "Security on TechRepublic".
❌ Emotet’s Thanksgiving Campaign Delivers New Recipes for Compromise ❌

The crafty malware has departed from its usual cornucopia of tactics and tricks.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Amazon Low-Key Reveals Breach of Some Customer Data πŸ•΄

'Technical error' exposed names and email addresses.

πŸ“– Read

via "Dark Reading: ".
πŸ” 500K Android users hit with malware, and what to do if you're infected πŸ”

13 malicious apps ended up on the Google Play store. Here's how to stay protected.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2009-5153

In Novell NetWare before 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated attackers to execute code, because a length field was incorrectly trusted.

πŸ“– Read

via "National Vulnerability Database".
<b>&#9000; USPS Site Exposed Data on 60 Million Users &#9000;</b>

<code>U.S. Postal Service just fixed a security weakness that allowed anyone who has an account at usps.com to view account details for some 60 million other users, and in some cases to modify account details on their behalf.</code><code>Media</code><code>Image: USPS.com</code><code>KrebsOnSecurity was contacted last week by a researcher who discovered the problem, but who asked to remain anonymous. The researcher said he informed the USPS about his finding more than a year ago yet never received a response. After confirming his findings, this author contacted the USPS, which promptly addressed the issue.</code><code>The problem stemmed from an authentication weakness in a USPS Web component known as an β€œapplication program interface,” or API β€” basically, a set of tools defining how various parts of an online application such as databases and Web pages should interact with one another.</code><code>The API in question was tied to a Postal Service initiative called β€œInformed Visibility,” which according to the USPS is designed to let businesses, advertisers and other bulk mail senders β€œmake better business decisions by providing them with access to near real-time tracking data” about mail campaigns and packages.</code><code>In addition to exposing near real-time data about packages and mail being sent by USPS commercial customers, the flaw let any logged-in usps.com user query the system for account details belonging to any other users, such as email address, username, user ID, account number, street address, phone number, authorized users, mailing campaign data and other information.</code><code>Many of the API’s features accepted β€œwildcard” search parameters, meaning they could be made to return all records for a given data set without the need to search for specific terms. No special hacking tools were needed to pull this data, other than knowledge of how to view and modify data elements processed by a regular Web browser like Chrome or Firefox.</code><code>Media</code><code>A USPS brochure advertising the features and benefits of Informed Visibility.</code><code>In cases where multiple accounts shared a common data element β€” such as a street address β€” using the API to search for one specific data element often brought up multiple records. For example, a search on the email addresses for readers who volunteered to help with this research turned up multiple accounts when those users had more than one user signed up at the same physical address.</code><code>β€œThis is not good,” said one anonymous reader who volunteered to help with this research, after viewing a cut-and-paste of his USPS account details looked up via his email address. β€œEspecially since we moved due to being threatened by a neighbor.”</code><code>Nicholas Weaver, a researcher at the International Computer Science Institute and lecturer at UC Berkeley, said the API should have validated that the account making the request had permission to read the data requested.</code><code>β€œThis is not even Information Security 101, this is Information Security 1, which is to implement access control,” Weaver said. β€œIt seems like the only access control they had in place was that you were logged in at all. And if you can access other peoples’ data because they aren’t enforcing access controls on reading that data, it’s catastrophically bad and I’m willing to bet they’re not enforcing controls on writing to that data as well.”</code><code>A cursory review by KrebsOnSecurity indicates the promiscuous API let any user request account changes for any other user, such as email address, phone number or other key details.</code><code>Fortunately, the USPS appears to have included a validation step to prevent unauthorized changes β€” at least with some data fields. Attempts to modify the email address associated with my USPS account via the API prompted a confirmation message sent to the email address tied to that account…
πŸ•΄ Mirai Evolves From IoT Devices to Linux Servers πŸ•΄

Netscout says it has observed at least one dozen Mirai variants attempting to exploit a recently disclosed flaw in Hadoop YARN on Intel servers.

πŸ“– Read

via "Dark Reading: ".
πŸ” How IoT medical devices save your life and threaten your privacy πŸ”

Consumers increasingly depend upon IoT devices to help them do everything from improving sleep to monitoring blood sugar levels. In the process, they may be giving up more privacy than expected.

πŸ“– Read

via "Security on TechRepublic".
❌ FCC Addresses Robocalling – But Questions Remain ❌

The FCC will consider a proposal to combat robocalls and text spam in December.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Podcast: Why β€˜Throwing Money’ at Threats Won’t Work ❌

How can businesses create an effective cyber defense strategy? It starts with defining success, an expert tells us.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Reddit helps admin solve mystery of rogue Raspberry Pi ⚠

Finding a mysterious circuit board plugged into a network that you are tasked with managing is always going to be a disconcerting moment for any sysadmin.

πŸ“– Read

via "Naked Security".
⚠ Cybercriminal techniques – Sophoslabs 2019 Threat Report ⚠

Cyberattackers are successfully evading detection on Windows computers by abusing legitimate admin tools that come pre-installed with the operating system.

πŸ“– Read

via "Naked Security".
⚠ Update now! Adobe Flash has another critical security vulnerability ⚠

Adobe’s Flash Player for Windows, Mac and Linux has a critical vulnerability that should be patched as a top priority.

πŸ“– Read

via "Naked Security".
❌ As Black Friday Looms, IoT Gadgets Take the Risk Spotlight ❌

Ahead of the holiday shopping bonanza, the security community is talking to consumers about IoT security.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Podcast: Breaking Down the Magecart Threat (Part One) ❌

In the first part of our podcast series, we talked to Rapid7's chief data scientist about how Magecart has changed.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Zero-Trust Frameworks: Securing the Digital Transformation ❌

Zero trust refers to the notion of evaluating  the security risk of devices and users within the context of any given moment, without automatically conferring access based on credentials.

πŸ“– Read

via "Threatpost | The first stop for security news".