πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2015-9549

A reflected Cross-site Scripting (XSS) vulnerability exists in OcPortal 9.0.20 via the OCF_EMOTICON_CELL.tpl FIELD_NAME field to data/emoticons.php.

πŸ“– Read

via "National Vulnerability Database".
❌ Netgear Won’t Patch 45 Router Models Vulnerable to Serious Flaw ❌

Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models.

πŸ“– Read

via "Threatpost".
πŸ” New Bill Would Bar IP Theft Offenders From US πŸ”

Yet another bill designed to crackdown on IP theft, the Stop Theft of Intellectual Property Act of 2020, was introduced in the Senate last week

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Google Updates Ad Policies to Counter Influence Campaigns, Extortion ❌

Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or circulate politically influential content.

πŸ“– Read

via "Threatpost".
πŸ•΄ Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020 πŸ•΄

Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Data Ethics Is a Growing CISO Priority πŸ•΄

With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New 'Nanodegree' Program Provides Hands-On Cybersecurity Training πŸ•΄

Emerging streamlined curriculum programs aim to help narrow the skills gap.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat πŸ•΄

"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI Warns on New E-Commerce Fraud πŸ•΄

A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to make your PC passwordless in the Windows 10 May 2020 Update πŸ”

You don't need an account password to sign into Windows 10 version 2004.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-11584

A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11583

A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 11 Hot Startups to Watch at Black Hat USA πŸ•΄

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 11 Hot Startups to Watch at Black Hat USA πŸ•΄

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

πŸ“– Read

via "Dark Reading: ".
πŸ” VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics πŸ”

Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.

πŸ“– Read

via "Security on TechRepublic".
⚠ GandCrab ransomware hacker arrested in Belarus ⚠

Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia.

πŸ“– Read

via "Naked Security".
❌ Podcast: Learning to β€˜Speak the Language’ of OT Security Teams ❌

Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, talks about the differing priorities between IT and OT security teams as industrial control systems become connected.

πŸ“– Read

via "Threatpost".
❌ Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks ❌

COVID-19 pandemic spurs spoofing preference changes, plus a surge in email-based attacks.

πŸ“– Read

via "Threatpost".
πŸ” How poor security practices from remote employees are wasting the time of IT staff πŸ”

Along with the independence remote work affords employees comes the use of shadow IT and poor password practices, according to a new survey by 1Password.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Study finds misconfigured cloud storage services in 93% of cloud deployments analyzed πŸ”

An Accurics study said cloud breaches will likely increase in velocity and scale as more enterprises move to the cloud.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Securing IoT as a Remote Workforce Strategy πŸ•΄

Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security.

πŸ“– Read

via "Dark Reading: ".