πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Android Users Hit with β€˜Undeletable’ Adware ❌

Researchers say that 14.8 percent of Android users who were targeted with mobile malware or adware last year were left with undeletable files.

πŸ“– Read

via "Threatpost".
πŸ•΄ North Korea's Lazarus Group Diversifies Into Card Skimming πŸ•΄

Since at least May 2019, the state-sponsored threat actor has stolen card data from dozens of retailers, including major US firms.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attackers Scan for Vulnerable BIG-IP Devices After Flaw Disclosure πŸ•΄

The US Cybersecurity and Infrastructure Security Agency encourages organizations to patch a critical flaw in the BIG-IP family of application delivery controllers, as firms find evidence that attackers are scanning for the critical vulnerability.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to ensure the integrity of your encrypted drive while it's hibernating in macOS πŸ”

Enabling full-disk encryption to keep documents secure is highly recommended. By default, macOS does not maintain integrity while hibernating. But there's a fix for that.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Sifter 7.8 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.12 πŸ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ BEC Busts Take Down Multimillion-Dollar Operations πŸ•΄

The two extraditions of business email compromise attackers indicate a step forward for international law enforcement collaboration.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-15096

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.

πŸ“– Read

via "National Vulnerability Database".
⚠ Flashy Nigerian Instagram star extradited to US to face BEC charges ⚠

It's a short jump from a Rolls Royce ride to extradition from the UAE. Goodbye, Dubai, goodbye, Palazzo Versace, hello, Chicago jail cell.

πŸ“– Read

via "Naked Security".
❌ First-Ever Russian BEC Gang, Cosmic Lynx, Uncovered ❌

Researchers warn that Cosmic Lynx targets firms that don't use DMARC and uses a "mergers and acquisitions" pretext that can lead to large sums of money being stolen.

πŸ“– Read

via "Threatpost".
❌ Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET Sites ❌

A campaign discovered by Malwarebytes Labs in mid-April has lifted credentials from a number of e-commerce portals.

πŸ“– Read

via "Threatpost".
⚠ Company web names hijacked via outdated cloud DNS records ⚠

Why hack into a server when you can just send vistors to a fake alternative instead?

πŸ“– Read

via "Naked Security".
πŸ•΄ Applying the 80-20 Rule to Cybersecurity πŸ•΄

How security teams can achieve 80% of the benefit for 20% of the work.

πŸ“– Read

via "Dark Reading: ".
πŸ” Remote workers aren't taking security seriously. Now that has to change πŸ”

IT teams help can mitigate the risks of shadow IT by being more flexible and adapting to the needs of remote workers, according to a new study.

πŸ“– Read

via "Security on TechRepublic".
❌ Citrix Bugs Allow Unauthenticated Code Injection, Data Theft ❌

Admins should patch their Citrix ADC and Gateway installs immediately.

πŸ“– Read

via "Threatpost".
πŸ” 65% of organizations saw at least 3 OT system intrusions within the past year πŸ”

As OT tech becomes more advanced, so do the cybersecurity concerns surrounding it, Fortinet found.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Bitdefender unveils Human Risk Analytics to protect against human error πŸ”

Part of the company's GravityZone product, the new feature analyzes user mistakes and errors to help track and mitigate them.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  GRR 3.4.2.0 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2020-15037

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-15036

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Linked.php dv parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10745

A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".