πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Smartwatch Hack Could Trick Dementia Patients into Overdosing ❌

Attackers could hack the smartwatch and send dementia patients alerts for taking their medication.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2012-6474

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6473

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Friday Five: 7/10 Edition πŸ”

Lebron James' legal files put up for auction, US Secret Service warns of increase in MSP hacks, and Andoid Apps stealing user data - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Google Bans Stalkerware Ads – With a Loophole ❌

Starting in August Google is banning ads of products or services promoting stalkerware.

πŸ“– Read

via "Threatpost".
πŸ•΄ Biden Campaign Hires 2 Top Cybersecurity Executives πŸ•΄

The campaign has filled the positions of CISO and CTO in the runup to the 2020 presidential election.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers πŸ•΄

RSA data reveals a continued shift away from browser-based fraud as attackers target mobile apps.

πŸ“– Read

via "Dark Reading: ".
❌ Popular TP-Link Family of Kasa Security Cams Vulnerable to Attack ❌

Researcher warns the highly-rated Kasa family of security cameras have bugs that gives hackers access to private video feeds and settings.

πŸ“– Read

via "Threatpost".
πŸ›  nfstream 5.1.6 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2019-20898

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20897

The avatar upload feature in affected versions of Atlassian Jira Server and Data Center allows remote attackers to achieve Denial of Service via a crafted PNG file. The affected versions are before version 8.5.4, from version 8.6.0 before 8.6.2, and from version 8.7.0 before 8.7.1.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot stories of the week ⚠

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
❌ How CARTA Strategies for Web Applications are Met with Indusface AppTrana Solution ❌

From an operational standpoint, the foundation of CARTA starts with an assessment and then building the zero-trust principles on top of that with an adaptive security model.

πŸ“– Read

via "Threatpost".
❌ A β€˜New Age’ of Sophisticated Business Email Compromise is Coming ❌

A new BEC threat group is heralding more sophisticated email scams that target organizations without DMARC and squeeze as much money out of victims as possible.

πŸ“– Read

via "Threatpost".
πŸ•΄ Learn About the Latest Election Security Threats and Defenses at Black Hat USA πŸ•΄

Christopher Krebs, director of the CISA, will explain how the organization is leading the federal effort to support state and local officials in their mission to secure US elections this year.

πŸ“– Read

via "Dark Reading: ".
❌ The Enemy Within: How Insider Threats Are Changing ❌

Insider-threat security experts unravel the new normal during this time of remote working, and explain how to protect sensitive data from this escalating risk.

πŸ“– Read

via "Threatpost".
πŸ•΄ Decoding the Verizon DBIR Report: An Insider's Look Beyond the Headlines πŸ•΄

To truly understand cybersecurity trends, we must look beyond the headlines and ask more of the data. What you learn might surprise you.

πŸ“– Read

via "Dark Reading: ".
⚠ Digicert revokes a raft of web security certificates ⚠

The good news is that this was a bureaucratic necessity rather than an actual cybersecurity attack.

πŸ“– Read

via "Naked Security".
❌ Secret Service Creates Cyber Fraud Task Forces ❌

Traditional financial crime and cyberattacks are converging, requiring new skills and approaches to the problem, officials said.

πŸ“– Read

via "Threatpost".
πŸ•΄ Experts Predict Rise of Data Theft in Ransomware Attacks πŸ•΄

The most attractive targets for data theft are businesses perceived as most likely to pay to prevent exposure of their information.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-19338

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

πŸ“– Read

via "National Vulnerability Database".