πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Vulns in Open Source EHR Puts Patient Health Data at Risk πŸ•΄

Five high-risk flaws in health IT software from LibreHealth, a researcher at Bishop Fox finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Patch ASAP': Cisco Issues Updates for Routers, VPN Firewall πŸ•΄

Cisco issues five critical security patches among a batch of some 31 updates.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Puzzles and Riddles Help InfoSec Pros Solve Real-World Problems πŸ•΄

A researcher shares the unexpected lessons learned in years of creating puzzles and riddles for his cybersecurity colleagues.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Attack Technique Uses Misconfigured Docker API πŸ•΄

A new technique builds and deploys an attack on the victim's own system

πŸ“– Read

via "Dark Reading: ".
πŸ” Ransomware accounts for a third of all cyberattacks against organizations πŸ”

Government agencies were most heavily hit by ransomware during the first quarter, says Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cryptocurrency Scam Spreads Across High-Profile Twitter Accounts πŸ•΄

Twitter accounts belonging to former president Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, and Bill Gates are among those hijacked in a massive cryptocurrency scam.

πŸ“– Read

via "Dark Reading: ".
πŸ” Twitter accounts of Elon Musk, Bill Gates and others hijacked to promote crypto scam πŸ”

The verified accounts for Gates, Musk and Apple issued tweets promoting a cryptocurrency scam, asking followers to send money to a blockchain address.

πŸ“– Read

via "Security on TechRepublic".
❌ Twitter Elite Accounts Are Hijacked in Unprecedented Cryptocurrency Scam ❌

The Twitter accounts of Gates, Musk, Biden, Apple and Uber have each been hijacked at the same time to push a cryptocurrency scam in an unprecedented breach of Twitter accounts.

πŸ“– Read

via "Threatpost".
⚠ Twitter limits tweeting as prominent accounts spam out cryptocoin scams ⚠

Twitter is investigating a rash of fraudulent tweets from prominent accounts - don't fall for these scams!

πŸ“– Read

via "Naked Security".
❌ LokiBot Redux Attacks Massive List of Common Android Apps ❌

BlackRock, based on the Xerxes source code, can steal info not only from financial apps but also TikTok, Tinder, Instagram, Uber and many others.

πŸ“– Read

via "Threatpost".
❌ Threat Actors Introduce Unique β€˜Newbie’ Hacker Forum ❌

CryptBB becomes more inclusive by inviting less experienced hackers to learn from expert cybercriminals and one another.

πŸ“– Read

via "Threatpost".
❌ Amazon-Themed Phishing Campaigns Swim Past Security Checks ❌

A pair of recent campaigns aim to lift credentials and other personal information under the guise of Amazon package-delivery notices.

πŸ“– Read

via "Threatpost".
πŸ•΄ Level Up Your Kubernetes Security Skills at Black Hat USA πŸ•΄

Gain access to a broad spectrum of in-depth cybersecurity Briefings and Trainings.

πŸ“– Read

via "Dark Reading: ".
πŸ” Watch out for these subject lines in email phishing attacks πŸ”

Campaigns exploiting COVID-19 remained popular last quarter, but cybercriminals also relied on tried and true subjects, says KnowBe4.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift πŸ•΄

The only entities equipped to safeguard Internet of Things devices against risks are the IoT device manufacturers themselves.

πŸ“– Read

via "Dark Reading: ".
πŸ” Check Point helps Zoom resolve "Vanity URL" security problem πŸ”

The loophole gave cybercriminals an opening through specialized Zoom URL links.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How COVID-19 has increased the risk of security threats πŸ”

During the first half of the year, 80% of companies surveyed saw "slightly to considerably more" cyberattack attempts, says Exabeam.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use the Google Pixel Safety Check feature πŸ”

The Android-powered Google Pixel line of phones received a very important updated feature dedicated to user's personal safety. Learn how to use the Safety Check feature.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Credential stuffing attacks on global media companies are spiking πŸ”

A new report from Akamai also finds a staggering increase in attacks targeting published content.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 820% jump in e-gift card bot attacks since COVID-19 lockdowns began πŸ”

The biggest victims were online food-delivery services and retailers, says cybersecurity firm PerimeterX.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-4748

IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 173174.

πŸ“– Read

via "National Vulnerability Database".