πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Fresh Options for Fighting Fraud in Financial Services πŸ•΄

Fraud prevention requires a consumer-centric, data sharing approach.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-11994

Server-Side Template Injection and arbitrary file disclosure on Camel templating components

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-19417

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-19416

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-19415

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Advanced Attackers Take Aim at Office 365 πŸ•΄

Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Charges Kazakhstani Citizen With Hacking Into More Than 300 Orgs πŸ•΄

The accused man, and members of his cybercriminal group, allegedly made at least $1.5 million hacking into companies and selling access to systems over the past three years.

πŸ“– Read

via "Dark Reading: ".
πŸ” DOJ Charges "fxmsp" Hacker for Breaching 300 Organizations πŸ”

The hacker, based in Kazakhstan, sold backdoor access to over 300 victim networks, some for up to $100,000.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Advertising Plugin for WordPress Threatens Full Site Takeovers ❌

Thousands of vulnerable websites need to apply the patch to avoid RCE.

πŸ“– Read

via "Threatpost".
πŸ•΄ As More People Return to Travel Sites, So Do Malicious Bots πŸ•΄

Attacks against travel-related websites are on the rise as the industry begins to slowly recover from COVID-19, new data shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ More Malware Found Preinstalled on Government Smartphones πŸ•΄

Researchers report the American Network Solutions UL40 smartphone comes with compromised apps.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Fraud Ring "Bargain Bear" Brings Sophistication to Online Crime πŸ•΄

The ring tests the validity of stolen credentials to be used in fraud through an online marketplace.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Study Finds 15 Billion Stolen, Exposed Credentials in Criminal Markets πŸ•΄

Data is fueling account takeover attacks in a big way, Digital Shadows says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft Cloud App Security: This software can help you to manage shadow IT and boost productivity πŸ”

How to use shadow IT discovery in Microsoft Cloud App Security to help remote workers stay secure and save bandwidth.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cloud environments are making the security alert overload problem worse πŸ”

Companies say that automation helps ease the burden but most have a long way to go to reach full implementation, according to new survey.

πŸ“– Read

via "Security on TechRepublic".
❌ β€˜Undeletable’ Malware Shows Up in Yet Another Android Device ❌

Researchers have found trojans and adware in preinstalled apps on a low-cost device distributed by the government-funded Lifeline Assistance Program.

πŸ“– Read

via "Threatpost".
πŸ•΄ Pen Testing ROI: How to Communicate the Value of Security Testing πŸ•΄

There are many reasons to pen test, but the financial reasons tend to get ignored.

πŸ“– Read

via "Dark Reading: ".
❌ BlueLeaks Server Seized By German Police: Report ❌

The server contained almost 270 gigabytes of data collected from 200 police departments, law enforcement training and support resources and fusion centers.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Tips for Getting the Most From Nessus πŸ•΄

Books have been written on using the powerful network-discovery and vulnerability-scanning tool. These tips will help you get started.

πŸ“– Read

via "Dark Reading: ".
πŸ” Joker billing fraud malware eluded Google Play security to infect Android devices πŸ”

A new variant targeted Android users to subscribe them to premium services without their consent, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  GNU Privacy Guard 2.2.21 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".