🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Why Cybersecurity's Silence Matters to Black Lives 🕴

The industry is missing an opportunity to educate the public about bad actors who capitalize off of protest, voting rights education and police brutality petitions through social engineering and phishing attacks.

📖 Read

via "Dark Reading: ".
Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks

The phishing campaign targeted Office 365 accounts in 62 countries, using business-related reports and the coronavirus pandemic as lures.

📖 Read

via "Threatpost".
🔐 How to encrypt an external drive or card in macOS 🔐

Looking to encrypt removable storage on macOS, but can't figure out how? Jack Wallen shows you the way to make this work.

📖 Read

via "Security on TechRepublic".
🔐 BYOD: A trend rife with security concerns 🔐

Researchers explored the implications of allowing employees to bring their own devices for sensitive work tasks.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2020-14476

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-11849

Elevation of privilege and/or unauthorized access vulnerability in Micro Focus Identity Manager. Affecting versions prior to 4.7.3 and 4.8.1 hot fix 1. The vulnerability could allow information exposure that can result in an elevation of privilege or an unauthorized access.

📖 Read

via "National Vulnerability Database".
Notorious Hacker ‘Fxmsp’ Outed After Widespread Access-Dealing

The Kazakh native made headlines last year for hacking McAfee, Symantec and Trend Micro; but the Feds say he's also behind a widespread backdoor operation spanning six continents.

📖 Read

via "Threatpost".
🕴 Fresh Options for Fighting Fraud in Financial Services 🕴

Fraud prevention requires a consumer-centric, data sharing approach.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2020-11994

Server-Side Template Injection and arbitrary file disclosure on Camel templating components

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-19417

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-19416

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-19415

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

📖 Read

via "National Vulnerability Database".
🕴 How Advanced Attackers Take Aim at Office 365 🕴

Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.

📖 Read

via "Dark Reading: ".
🕴 US Charges Kazakhstani Citizen With Hacking Into More Than 300 Orgs 🕴

The accused man, and members of his cybercriminal group, allegedly made at least $1.5 million hacking into companies and selling access to systems over the past three years.

📖 Read

via "Dark Reading: ".
🔏 DOJ Charges "fxmsp" Hacker for Breaching 300 Organizations 🔏

The hacker, based in Kazakhstan, sold backdoor access to over 300 victim networks, some for up to $100,000.

📖 Read

via "Subscriber Blog RSS Feed ".
Advertising Plugin for WordPress Threatens Full Site Takeovers

Thousands of vulnerable websites need to apply the patch to avoid RCE.

📖 Read

via "Threatpost".
🕴 As More People Return to Travel Sites, So Do Malicious Bots 🕴

Attacks against travel-related websites are on the rise as the industry begins to slowly recover from COVID-19, new data shows.

📖 Read

via "Dark Reading: ".
🕴 More Malware Found Preinstalled on Government Smartphones 🕴

Researchers report the American Network Solutions UL40 smartphone comes with compromised apps.

📖 Read

via "Dark Reading: ".
🕴 New Fraud Ring "Bargain Bear" Brings Sophistication to Online Crime 🕴

The ring tests the validity of stolen credentials to be used in fraud through an online marketplace.

📖 Read

via "Dark Reading: ".
🕴 Study Finds 15 Billion Stolen, Exposed Credentials in Criminal Markets 🕴

Data is fueling account takeover attacks in a big way, Digital Shadows says.

📖 Read

via "Dark Reading: ".
🔐 Microsoft Cloud App Security: This software can help you to manage shadow IT and boost productivity 🔐

How to use shadow IT discovery in Microsoft Cloud App Security to help remote workers stay secure and save bandwidth.

📖 Read

via "Security on TechRepublic".