🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2020-12774

D-Link DSL-7740C does not properly validate user input, which allows an authenticated LAN user to inject arbitrary command.

📖 Read

via "National Vulnerability Database".
Leak Exposes Private Data of Genealogy Service Users

An exposed ElasticSearch server belonging to Software MacKiev put 60,000 users of Ancestry.com’s Family Tree Maker software at risk.

📖 Read

via "Threatpost".
🕴 Cybersecurity Lessons from the Pandemic 🕴

How does cybersecurity support business and society? The pandemic shows us.

📖 Read

via "Dark Reading: ".
🕴 Q&A: How Systemic Racism Weakens Cybersecurity 🕴

Cybersecurity policy expert and attorney Camille Stewart explains how to dismantle systemic racism in the industry - and build a more diverse and representative workforce.

📖 Read

via "Dark Reading: ".
🔐 Phishing is the leading type of COVID-19 fraud 🔐

TransUnion surveyed consumers in six countries and found that phishing was the preferred method of attack 27% of the time.

📖 Read

via "Security on TechRepublic".
🔐 Threat actors have evolved during the pandemic 🔐

McAfee sees a surge of COVID-19-themed malicious apps and other attacks in the first quarter.

📖 Read

via "Security on TechRepublic".
🔐 How cybercriminals have exploited the coronavirus pandemic 🔐

Phishing campaigns, deceptive domains, and malicious apps are just some of the tactics that have taken advantage of the virus and its repercussions, says Check Point Research.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2019-18619

Incorrect parameter validation in the synaTee component of Synaptics WBF drivers using an SGX enclave (all versions prior to 2019-11-15) allows a local user to execute arbitrary code in the enclave (that can compromise confidentiality of enclave data) via APIs that accept invalid pointers.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-18618

Incorrect access control in the firmware of Synaptics VFS75xx family fingerprint sensors that include external flash (all versions prior to 2019-11-15) allows a local administrator or physical attacker to compromise the confidentiality of sensor data via injection of an unverified partition table.

📖 Read

via "National Vulnerability Database".
Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware

An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group - since 2013.

📖 Read

via "Threatpost".
Lazarus Group Surfaces with Advanced Malware Framework

The North Korean APT has been using the framework, called MATA, for a number of purposes, from spying to financial gain.

📖 Read

via "Threatpost".
🛠 Logwatch 7.5.4 🛠

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🕴 The InfoSec Barrier to AI 🕴

Information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2019-16244

OMERO.server before 5.6.1 allows attackers to bypass the security filters and access hidden objects via a crafted query.

📖 Read

via "National Vulnerability Database".
🕴 COVID-19-Related Attacks Exploded in the First Half of 2020 🕴

COVID-19 as part of a cyberattack increased by more than 3,900% between February and June.

📖 Read

via "Dark Reading: ".
🕴 Ripple20's Effects Will Impact IoT Cybersecurity for Years to Come 🕴

A series of newly discovered TCP/IP software vulnerabilities pose a threat to millions of IoT devices. Undiscovered since the early 1990s, they highlight the need to improve security in an increasingly precarious IoT supply chain.

📖 Read

via "Dark Reading: ".
🔐 Phishing attacks and ransomware are the most challenging threats for many organizations 🔐

Unpatched systems and misconfigurations are also major concerns for security professionals, Balbix says.

📖 Read

via "Security on TechRepublic".
🔐 How to add two-factor authentication to the Bitwarden desktop client 🔐

If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.

📖 Read

via "Security on TechRepublic".
🔐 How to add two-factor authentication to the Bitwarden desktop client 🔐

If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.

📖 Read

via "Security on TechRepublic".
🕴 North Korea's Lazarus Group Developing Cross-Platform Malware Framework 🕴

The APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS, and Linux.

📖 Read

via "Dark Reading: ".
🔏 Our Ongoing Investments to Make it Easier to Switch from Symantec DLP 🔏

When Broadcom acquired Symantec in the fall of 2019, there were many questions in the market from their customer base. Many of them came to us asking for assistance in protecting their most critical data and reducing their vendor uncertainty.

📖 Read

via "Subscriber Blog RSS Feed ".