πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Friday Five: 7/24 Edition πŸ”

A new phishing campaign abuses enterprise cloud services, BadPower attack could set your device on fire, and the UK sports industry under near constant cyber attack - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ›  Sifter 8.6 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ ASUS routers could be reflashed with malware – patch now! ⚠

Responsible disclosure means the bugs are already fixed - but don't forget to check that you applied the patch.

πŸ“– Read

via "Naked Security".
πŸ” Companies turning to isolation technology to protect against the internet's biggest threats πŸ”

Isolation technology allows companies to keep employee browsers siloed in the cloud.

πŸ“– Read

via "Security on TechRepublic".
❌ News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags ❌

Threatpost editors talk about the biggest security news stories for the week ended Jul. 24.

πŸ“– Read

via "Threatpost".
❌ NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug ❌

Power plants, factories, oil and gas refineries and more are all in the sights of foreign adversaries, the U.S. warns.

πŸ“– Read

via "Threatpost".
πŸ•΄ Rise of the Robots: How You Should Secure RPA πŸ•΄

Robotic Process Automation (RPA) is the next big thing in innovation and digital strategy. But what security details are overlooked in the rush to implement bots?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Access to Internal Twitter Admin Tools Is Widespread πŸ•΄

More than 1,000 individuals have access to tools that could have aided the attackers in the recent Twitter attack on high-profile accounts.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Remote Work Could Help Cybersecurity's Diversity Problem - But Will It? πŸ•΄

Job market data from the second quarter suggests there are increasing opportunities for women and minorities in the world of remote work, but long-standing biases may provide resistance.

πŸ“– Read

via "Dark Reading: ".
❌ DJI Drone App Riddled With Privacy Issues, Researchers Allege ❌

The DJI GO 4 application open users’ sensitive data up for the taking, researchers allege.

πŸ“– Read

via "Threatpost".
πŸ•΄ Garmin Takes App & Services Offline After Suspected Ransomware Attack πŸ•΄

Wearables company Garmin shut down its website, app, call centers, and other services in the aftermath of a security incident.

πŸ“– Read

via "Dark Reading: ".
πŸ” DevSecOps tutorial: What is it, and how can it improve application security? πŸ”

Dr. David Brumley, a professor at Carnegie Mellon University and CEO of ForAllSecure, explains what DevSecOps is and how companies can use it to improve security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Social engineering: A cheat sheet for business professionals πŸ”

People, like computers, can be hacked using a process called social engineering, and there's a good chance a cybersecurity attack on your organization could start with this technique.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Organizations Continue to Struggle With App Vulns πŸ•΄

A high percentage of discovered bugs remain unremediated for a long time, a new study shows.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-10610

In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10608

In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10606

In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10602

In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Network Manager due to a race condition. This can result in blocking connections and queries to PI Data Archive.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10600

In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Archive Subsystem when the subsystem is working under memory pressure. This can result in blocking queries to PI Data Archive.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10614

In OSIsoft PI System multiple products and versions, an authenticated remote attacker with write access to PI Vision databases could inject code into a display. Unauthorized information disclosure, deletion, or modification is possible if a victim views the infected display.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10604

In OSIsoft PI System multiple products and versions, a remote, unauthenticated attacker could crash PI Network Manager service through specially crafted requests. This can result in blocking connections and queries to PI Data Archive.

πŸ“– Read

via "National Vulnerability Database".