πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Twitter limits tweeting as prominent accounts spam out cryptocoin scams ⚠

Twitter is investigating a rash of fraudulent tweets from prominent accounts - don't fall for these scams!

πŸ“– Read

via "Naked Security".
❌ LokiBot Redux Attacks Massive List of Common Android Apps ❌

BlackRock, based on the Xerxes source code, can steal info not only from financial apps but also TikTok, Tinder, Instagram, Uber and many others.

πŸ“– Read

via "Threatpost".
❌ Threat Actors Introduce Unique β€˜Newbie’ Hacker Forum ❌

CryptBB becomes more inclusive by inviting less experienced hackers to learn from expert cybercriminals and one another.

πŸ“– Read

via "Threatpost".
❌ Amazon-Themed Phishing Campaigns Swim Past Security Checks ❌

A pair of recent campaigns aim to lift credentials and other personal information under the guise of Amazon package-delivery notices.

πŸ“– Read

via "Threatpost".
πŸ•΄ Level Up Your Kubernetes Security Skills at Black Hat USA πŸ•΄

Gain access to a broad spectrum of in-depth cybersecurity Briefings and Trainings.

πŸ“– Read

via "Dark Reading: ".
πŸ” Watch out for these subject lines in email phishing attacks πŸ”

Campaigns exploiting COVID-19 remained popular last quarter, but cybercriminals also relied on tried and true subjects, says KnowBe4.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift πŸ•΄

The only entities equipped to safeguard Internet of Things devices against risks are the IoT device manufacturers themselves.

πŸ“– Read

via "Dark Reading: ".
πŸ” Check Point helps Zoom resolve "Vanity URL" security problem πŸ”

The loophole gave cybercriminals an opening through specialized Zoom URL links.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How COVID-19 has increased the risk of security threats πŸ”

During the first half of the year, 80% of companies surveyed saw "slightly to considerably more" cyberattack attempts, says Exabeam.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use the Google Pixel Safety Check feature πŸ”

The Android-powered Google Pixel line of phones received a very important updated feature dedicated to user's personal safety. Learn how to use the Safety Check feature.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Credential stuffing attacks on global media companies are spiking πŸ”

A new report from Akamai also finds a staggering increase in attacks targeting published content.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 820% jump in e-gift card bot attacks since COVID-19 lockdowns began πŸ”

The biggest victims were online food-delivery services and retailers, says cybersecurity firm PerimeterX.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-4748

IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 173174.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4747

IBM Team Concert (RTC) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172887.

πŸ“– Read

via "National Vulnerability Database".
❌ Zoom Addresses Vanity URL Zero-Day ❌

An attacker could pose as a company employee, invite customers or partners to meetings, then use socially engineered conversation to extract sensitive information.

πŸ“– Read

via "Threatpost".
πŸ•΄ Russian Cyberattacks Target COVID-19 Research, Vaccine Development πŸ•΄

Government agencies in the US, UK, and Canada report Russian group Cozy Bear is targeting organizations developing coronavirus vaccines.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your Twitter account from being hacked πŸ”

Following the hacks of verified Twitter accounts for several high-profile people, including Bill Gates and Joe Biden, how can you prevent your own account from falling into the wrong hands?

πŸ“– Read

via "Security on TechRepublic".
❌ State-Sponsored Hackers Look to Steal COVID-19 Vaccine Research ❌

The Russia-linked APT29 has set its sights on pharma research in Western nations in a likely attempt to get ahead on a cure for coronavirus.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybersecurity Leaders: Invest In Your People πŸ•΄

Training, especially cross-training, is insanely powerful when team members are able to experience, train, and work together. It also builds trust.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybercriminals disguising as top streaming services to spread malware πŸ”

Malicious actors are posing as Netflix, Hulu, and more, to launch phishing attacks, steal passwords, launch spam, and distribute viruses.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Twitter Attack Raises Concerns Over its Internal Controls πŸ•΄

Attackers temporarily gained control of the accounts of Joe Biden, Barack Obama, Bill Gates, and others, to tweet a bitcoin scam.

πŸ“– Read

via "Dark Reading: ".