πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2020-10982

Gambio GX before 4.0.1.0 allows SQL Injection in admin/gv_mail.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ” IBM finds cyberattacks costing companies nearly $4 million per breach πŸ”

The study showed concrete financial benefits to having security systems and teams in place.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The future of encryption: Getting ready for the quantum computer attack πŸ”

PQShield, a spin-out from the UK's Oxford University, is developing advanced cryptographic solutions for hardware, software and communications to protect businesses' data from the quantum threat.

πŸ“– Read

via "Security on TechRepublic".
❌ OkCupid Security Flaw Threatens Intimate Dater Details ❌

Attackers could exploit various flaws in OkCupid's mobile app and webpage to steal victims' sensitive data and even send messages out from their profiles.

πŸ“– Read

via "Threatpost".
❌ Facial-Recognition Flop: Face Masks Thwart Virus, Stump Security Systems ❌

Algorithms clocked error rates of between 5% to 50% when comparing photos of people wearing digitally created masks with unmasked faces.

πŸ“– Read

via "Threatpost".
πŸ” 87% of Americans view data privacy as a human right, but most still use risky security practices πŸ”

While 56% of Americans want more control over personal data, more than 40% said they reuse passwords, use public Wi-Fi, or save a credit card to an online store, KPMG found.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Future's Biggest Cybercrime Threat May Already Be Here πŸ•΄

Current attacks will continue to be refined, and what may seem a weakness now could turn out to be a disaster.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your website's database from hackers πŸ”

A recent investigation by NordPass and a white hat hacker discovered more than 9,000 unsecured databases online with more than 10 billion individual entries.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How to Decipher InfoSec Job Titles' Mysteries πŸ•΄

Figuring out which cybersecurity job you want -- or are qualified for -- can be difficult when words have no consistent meaning in the industry.

πŸ“– Read

via "Dark Reading: ".
πŸ” How IT leaders were unprepared for the security challenges posed by COVID-19 πŸ”

The top three challenges cited in a Tanium survey were identifying new computing devices, overwhelmed IT capacity due to VPN requirements, and increased risks from video conferencing.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Most consumers do not trust big tech with their privacy πŸ”

Social media and online shopping sites top the list of services consumers feel do not adequately protect their personal information.

πŸ“– Read

via "Security on TechRepublic".
πŸ” It's not OK, Cupid: Security flaws could expose user data and more πŸ”

Researchers found a number of vulnerabilities that could give attackers access to a treasure trove of personally identifying information about members.

πŸ“– Read

via "Security on TechRepublic".
⚠ US tax service says, β€œ2FA is a must!” ⚠

We know it's an old drum, but we're not tired of beating it yet: 2FA is your friend.

πŸ“– Read

via "Naked Security".
❌ Critical Security Flaw in WordPress Plugin Allows RCE ❌

WordPress plugin Comments – wpDiscuz, which is installed on over 70,000 sites, has issued a patch.

πŸ“– Read

via "Threatpost".
❌ Critical Bugs in Utilities VPNs Could Cause Physical Damage ❌

Gear from Secomea, Moxa and HMS Networks are affected by remote code-execution flaws, researchers warn.

πŸ“– Read

via "Threatpost".
πŸ•΄ Technical Challenges of IoT Cybersecurity in a Post-COVID-19 World πŸ•΄

Effective management of vulnerabilities can be done only when information about supply chain dependencies is accurate and recent.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Sifter 9 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Hydra Network Logon Cracker 9.1 πŸ› 

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2020-11934

It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11933

cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Dark Reading Video News Desk Returns to Black Hat πŸ•΄

Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!

πŸ“– Read

via "Dark Reading: ".