πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2016-7064

A flaw was found in pritunl-client before version 1.0.1116.6. A lack of signature verification leads to sensitive information leakage

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-7063

A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
❌ Chris Vickery: AI Will Drive Tomorrow’s Data Breaches ❌

Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top threat no one's ready for.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2015-5238

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-3796. Reason: This candidate is a reservation duplicate of CVE-2015-3796. Notes: All CVE users should reference CVE-2015-3796 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Fortinet Buys Cloud Security Firm OPAQ πŸ•΄

The company plans to add zero-trust networking capabilities to its Secure Access Service Edge architecture.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft 365 Updated with New Security, Risk, Compliance Tools πŸ•΄

Updates built for remote employees include an endpoint data loss prevention platform, insider risk management, and double key encryption.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Indicts 2 Chinese Nationals for Stealing IP & Business Secrets, Including COVID-19 Research πŸ•΄

Pair working on behalf of themselves and China's Ministry of State Security, Justice Department says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The State of Hacktivism in 2020 πŸ•΄

Activism via hacking might not be as noisy as it once was, but it hasn't been silenced yet.

πŸ“– Read

via "Dark Reading: ".
❌ Emotet Returns in Malspam Attacks Dropping TrickBot, QakBot ❌

Emotet has resurfaced after a five-month hiatus, with more than 250,000 malspam messages being sent to email recipients worldwide.

πŸ“– Read

via "Threatpost".
πŸ•΄ DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records πŸ•΄

China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.

πŸ“– Read

via "Dark Reading: ".
πŸ” Remote working: We're stressed and distracted and making these security errors πŸ”

Stress, burnout and distractions in the home could result in more cybersecurity breaches as a result of human error, a report from Tessian has found.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-12774

D-Link DSL-7740C does not properly validate user input, which allows an authenticated LAN user to inject arbitrary command.

πŸ“– Read

via "National Vulnerability Database".
❌ Leak Exposes Private Data of Genealogy Service Users ❌

An exposed ElasticSearch server belonging to Software MacKiev put 60,000 users of Ancestry.com’s Family Tree Maker software at risk.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybersecurity Lessons from the Pandemic πŸ•΄

How does cybersecurity support business and society? The pandemic shows us.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Q&A: How Systemic Racism Weakens Cybersecurity πŸ•΄

Cybersecurity policy expert and attorney Camille Stewart explains how to dismantle systemic racism in the industry - and build a more diverse and representative workforce.

πŸ“– Read

via "Dark Reading: ".
πŸ” Phishing is the leading type of COVID-19 fraud πŸ”

TransUnion surveyed consumers in six countries and found that phishing was the preferred method of attack 27% of the time.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Threat actors have evolved during the pandemic πŸ”

McAfee sees a surge of COVID-19-themed malicious apps and other attacks in the first quarter.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How cybercriminals have exploited the coronavirus pandemic πŸ”

Phishing campaigns, deceptive domains, and malicious apps are just some of the tactics that have taken advantage of the virus and its repercussions, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-18619

Incorrect parameter validation in the synaTee component of Synaptics WBF drivers using an SGX enclave (all versions prior to 2019-11-15) allows a local user to execute arbitrary code in the enclave (that can compromise confidentiality of enclave data) via APIs that accept invalid pointers.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-18618

Incorrect access control in the firmware of Synaptics VFS75xx family fingerprint sensors that include external flash (all versions prior to 2019-11-15) allows a local administrator or physical attacker to compromise the confidentiality of sensor data via injection of an unverified partition table.

πŸ“– Read

via "National Vulnerability Database".
❌ Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware ❌

An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group - since 2013.

πŸ“– Read

via "Threatpost".