๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ” Our Ongoing Investments to Make it Easier to Switch from Symantec DLP ๐Ÿ”

When Broadcom acquired Symantec in the fall of 2019, there were many questions in the market from their customer base. Many of them came to us asking for assistance in protecting their most critical data and reducing their vendor uncertainty.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONโ€ผ New - CVE-2014-1422

In Ubuntu's trust-store, if a user revokes location access from an application, the location is still available to the application because the application will honour incorrect, cached permissions. This is because the cache was not ordered by creation time by the Select struct in src/core/trust/impl/sqlite3/store.cpp. Fixed in trust-store (Ubuntu) version 1.1.0+15.04.20150123-0ubuntu1 and trust-store (Ubuntu RTM) version 1.1.0+15.04.20150123~rtm-0ubuntu1.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด CISA Hires Security Experts to Boost COVID-19 Response ๐Ÿ•ด

The agency brings in expertise from the private sector to improve its technical capabilities and engagement with industry partners.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Apple Security Research Device Program Draws Mixed Reactions โŒ

Apple's Security Research Device program is now open to select researchers - but some are irked by the program's vulnerability disclosure restrictions.

๐Ÿ“– Read

via "Threatpost".
โŒ OilRig APT Drills into Malware Innovation with Unique Backdoor โŒ

The RDAT tool uses email as a C2 channel, with attachments that hide data and commands inside images.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด VC Investment in Cybersecurity Dips & Shifts with COVID-19 ๐Ÿ•ด

While the pandemic has infected funding for cybersecurity startups, it also has emboldened some startups with innovative tools that secure the wave of at-home work.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Surge in Consumer-Grade IoT Devices Undermining Enterprise Security ๐Ÿ•ด

Individuals and business groups are connecting everything from Amazon Echo devices to data-sampling sensors on networks with sensitive systems with little regard to safety, two reports show.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2020-10917

This vulnerability allows remote attackers to execute arbitrary code on affected installations of NEC ESMPRO Manager 6.42. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RMI service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10007.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€‹โ€‹๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ

Have you seen ๐Ÿ‘€ these Telegram channels ๐Ÿ“จ?

๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ
๐Ÿ” Hiring managers should look outside traditional tech hubs to fill cybersecurity jobs ๐Ÿ”

Security professionals are still in high demand amid layoffs in other sectors, a new report finds.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด 8 Cybersecurity Themes to Expect at Black Hat USA 2020 ๐Ÿ•ด

Here are the trends and topics that'll capture the limelight at next month's virtual event.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Hackers will lurk in your email for more than a week after breaking in ๐Ÿ”

Beware - cybercriminals could be spending days rooting around in employee inboxes for information they can sell to other crooks, or use to mount further attacks.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ Twitter: Hackers Accessed Private Messages for Elite Accounts โŒ

A Dutch elected official is among those whose DMs were hijacked, the company said.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ” Best Practices for Data Security in Hybrid Environments ๐Ÿ”

20 Data Security Experts Share Best Practices for Data Security in Hybrid Environments.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
๐Ÿ•ด Vulnerable Invisible Salamanders and You: A Tale of Encryption Weakness ๐Ÿ•ด

A Black Hat presentation will discuss how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Cisco, Zoom and Others Must Bolster Security, Say Privacy Chiefs โŒ

Privacy commissioners worldwide urged video conferencing systems like Microsoft, Cisco and Zoom to adopt end-to-end encryption, two-factor authentication and other security measures.

๐Ÿ“– Read

via "Threatpost".
โŒ ASUS Home Router Bugs Open Consumers to Snooping Attacks โŒ

The two flaws allow man-in-the-middle attacks that would give an attacker access to all data flowing through the router.

๐Ÿ“– Read

via "Threatpost".
โš  Sports team nearly paid a $1.25m transfer feeโ€ฆ to cybercrooks โš 

If a crook is already inside your email, occasionally adding in believable emails of their own... how on earth do you spot the fake ones?

๐Ÿ“– Read

via "Naked Security".
๐Ÿ” Malware is down, but IoT and ransomware attacks are up ๐Ÿ”

Malicious attacks disguised as Microsoft Office files increased 176%, according to SonicWall's midyear threat report.

๐Ÿ“– Read

via "Security on TechRepublic".
ATENTIONโ€ผ New - CVE-2020-11440

httpRpmFs in WebCLI in Wind River VxWorks 5.5 through 7 SR0640 has no check for an escape from the web root.

๐Ÿ“– Read

via "National Vulnerability Database".