๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ•ด COVID-19-Related Attacks Exploded in the First Half of 2020 ๐Ÿ•ด

COVID-19 as part of a cyberattack increased by more than 3,900% between February and June.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Ripple20's Effects Will Impact IoT Cybersecurity for Years to Come ๐Ÿ•ด

A series of newly discovered TCP/IP software vulnerabilities pose a threat to millions of IoT devices. Undiscovered since the early 1990s, they highlight the need to improve security in an increasingly precarious IoT supply chain.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Phishing attacks and ransomware are the most challenging threats for many organizations ๐Ÿ”

Unpatched systems and misconfigurations are also major concerns for security professionals, Balbix says.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How to add two-factor authentication to the Bitwarden desktop client ๐Ÿ”

If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How to add two-factor authentication to the Bitwarden desktop client ๐Ÿ”

If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด North Korea's Lazarus Group Developing Cross-Platform Malware Framework ๐Ÿ•ด

The APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS, and Linux.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Our Ongoing Investments to Make it Easier to Switch from Symantec DLP ๐Ÿ”

When Broadcom acquired Symantec in the fall of 2019, there were many questions in the market from their customer base. Many of them came to us asking for assistance in protecting their most critical data and reducing their vendor uncertainty.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONโ€ผ New - CVE-2014-1422

In Ubuntu's trust-store, if a user revokes location access from an application, the location is still available to the application because the application will honour incorrect, cached permissions. This is because the cache was not ordered by creation time by the Select struct in src/core/trust/impl/sqlite3/store.cpp. Fixed in trust-store (Ubuntu) version 1.1.0+15.04.20150123-0ubuntu1 and trust-store (Ubuntu RTM) version 1.1.0+15.04.20150123~rtm-0ubuntu1.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด CISA Hires Security Experts to Boost COVID-19 Response ๐Ÿ•ด

The agency brings in expertise from the private sector to improve its technical capabilities and engagement with industry partners.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Apple Security Research Device Program Draws Mixed Reactions โŒ

Apple's Security Research Device program is now open to select researchers - but some are irked by the program's vulnerability disclosure restrictions.

๐Ÿ“– Read

via "Threatpost".
โŒ OilRig APT Drills into Malware Innovation with Unique Backdoor โŒ

The RDAT tool uses email as a C2 channel, with attachments that hide data and commands inside images.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด VC Investment in Cybersecurity Dips & Shifts with COVID-19 ๐Ÿ•ด

While the pandemic has infected funding for cybersecurity startups, it also has emboldened some startups with innovative tools that secure the wave of at-home work.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Surge in Consumer-Grade IoT Devices Undermining Enterprise Security ๐Ÿ•ด

Individuals and business groups are connecting everything from Amazon Echo devices to data-sampling sensors on networks with sensitive systems with little regard to safety, two reports show.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2020-10917

This vulnerability allows remote attackers to execute arbitrary code on affected installations of NEC ESMPRO Manager 6.42. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RMI service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10007.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€‹โ€‹๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ

Have you seen ๐Ÿ‘€ these Telegram channels ๐Ÿ“จ?

๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ
๐Ÿ” Hiring managers should look outside traditional tech hubs to fill cybersecurity jobs ๐Ÿ”

Security professionals are still in high demand amid layoffs in other sectors, a new report finds.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด 8 Cybersecurity Themes to Expect at Black Hat USA 2020 ๐Ÿ•ด

Here are the trends and topics that'll capture the limelight at next month's virtual event.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Hackers will lurk in your email for more than a week after breaking in ๐Ÿ”

Beware - cybercriminals could be spending days rooting around in employee inboxes for information they can sell to other crooks, or use to mount further attacks.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ Twitter: Hackers Accessed Private Messages for Elite Accounts โŒ

A Dutch elected official is among those whose DMs were hijacked, the company said.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ” Best Practices for Data Security in Hybrid Environments ๐Ÿ”

20 Data Security Experts Share Best Practices for Data Security in Hybrid Environments.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".