πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Popular TP-Link Family of Kasa Security Cams Vulnerable to Attack ❌

Researcher warns the highly-rated Kasa family of security cameras have bugs that gives hackers access to private video feeds and settings.

πŸ“– Read

via "Threatpost".
πŸ›  nfstream 5.1.6 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2019-20898

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20897

The avatar upload feature in affected versions of Atlassian Jira Server and Data Center allows remote attackers to achieve Denial of Service via a crafted PNG file. The affected versions are before version 8.5.4, from version 8.6.0 before 8.6.2, and from version 8.7.0 before 8.7.1.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot stories of the week ⚠

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
❌ How CARTA Strategies for Web Applications are Met with Indusface AppTrana Solution ❌

From an operational standpoint, the foundation of CARTA starts with an assessment and then building the zero-trust principles on top of that with an adaptive security model.

πŸ“– Read

via "Threatpost".
❌ A β€˜New Age’ of Sophisticated Business Email Compromise is Coming ❌

A new BEC threat group is heralding more sophisticated email scams that target organizations without DMARC and squeeze as much money out of victims as possible.

πŸ“– Read

via "Threatpost".
πŸ•΄ Learn About the Latest Election Security Threats and Defenses at Black Hat USA πŸ•΄

Christopher Krebs, director of the CISA, will explain how the organization is leading the federal effort to support state and local officials in their mission to secure US elections this year.

πŸ“– Read

via "Dark Reading: ".
❌ The Enemy Within: How Insider Threats Are Changing ❌

Insider-threat security experts unravel the new normal during this time of remote working, and explain how to protect sensitive data from this escalating risk.

πŸ“– Read

via "Threatpost".
πŸ•΄ Decoding the Verizon DBIR Report: An Insider's Look Beyond the Headlines πŸ•΄

To truly understand cybersecurity trends, we must look beyond the headlines and ask more of the data. What you learn might surprise you.

πŸ“– Read

via "Dark Reading: ".
⚠ Digicert revokes a raft of web security certificates ⚠

The good news is that this was a bureaucratic necessity rather than an actual cybersecurity attack.

πŸ“– Read

via "Naked Security".
❌ Secret Service Creates Cyber Fraud Task Forces ❌

Traditional financial crime and cyberattacks are converging, requiring new skills and approaches to the problem, officials said.

πŸ“– Read

via "Threatpost".
πŸ•΄ Experts Predict Rise of Data Theft in Ransomware Attacks πŸ•΄

The most attractive targets for data theft are businesses perceived as most likely to pay to prevent exposure of their information.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-19338

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Sifter 8.2 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ TrickBot Sample Accidentally Warns Victims They’re Infected ❌

A data-stealing module in a recent sandboxed sample triggers browser-based fraud alerts for Trickbot victims -- and shows something of the inner working of the malware's operators.

πŸ“– Read

via "Threatpost".
πŸ•΄ Russian Hacker Convicted for Social Network Hacks πŸ•΄

The Russian national was convicted of hacking into accounts at LinkedIn, Dropbox, and Formspring.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Zero-Trust Efforts Rise with the Tide of Remote Working πŸ•΄

With employees likely to continue to spend much, if not all, of their time working from home, companies are focusing more on technologies to boost the security of their now-distributed workplace.

πŸ“– Read

via "Dark Reading: ".
❌ Critical SAP Bug Allows Full Enterprise System Takeover ❌

Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more.

πŸ“– Read

via "Threatpost".