πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 6 Dangerous Defaults Attackers Love (and You Should Know) πŸ•΄

Default configurations can be massive vulnerabilities. Here are a half dozen to check on for your network.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Spin on a Longtime DNS Intel Tool πŸ•΄

Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.

πŸ“– Read

via "Dark Reading: ".
πŸ” Trade Secret Theft Case Involving Pharma Giant Can Move Forward πŸ”

An ex-worker who allegedly stole hundreds of company files had previously attempted to dismiss the lawsuit.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ New Spin on a Longtime DNS Intel Tool πŸ•΄

Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why multi-factor authentication should be set up for all your services and devices πŸ”

More than ever, now is the time to make absolutely sure that your services and devices are using the best protection available to keep data secured and away from unauthorized hands.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-13523

An exploitable information disclosure vulnerability exists in SoftPerfectÒ€ℒs RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
❌ NetWalker Ransomware Rakes in $29M Since March ❌

The ransomware has surged since moving to a RaaS model.

πŸ“– Read

via "Threatpost".
πŸ•΄ How Ransomware Threats Are Evolving & How to Spot Them πŸ•΄

A series of new reports explains how ransomware attackers are changing techniques and how organizations can spot stealthy criminals.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-13522

An exploitable arbitrary file delete vulnerability exists in SoftPerfect RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can allow an unprivileged user to delete any file on the filesystem. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18112

Affected versions of Atlassian Fisheye allow remote attackers to view the HTTP password of a repository via an Information Disclosure vulnerability in the logging feature. The affected versions are before version 4.8.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Pen Testers Who Got Arrested Doing Their Jobs Tell All πŸ•΄

Coalfire's Gary De Mercurio and Justin Wynn share the details of their physical penetration-testing engagement gone wrong, as well as recommendations for protecting all red teamers.

πŸ“– Read

via "Dark Reading: ".
❌ A Cyber β€˜Vigilante’ is Sabotaging Emotet’s Return ❌

During Black Hat USA 2020, Threatpost talks to Sherrod DeGrippo, with Proofpoint, about Emotet's recent return -and how a cyber vigilante is attempting to thwart the malware's comeback.

πŸ“– Read

via "Threatpost".
πŸ•΄ DDoS Attacks Doubled in Q2 Compared with Prior Quarter πŸ•΄

Most attacks were small, but the big ones got bigger than ever, Cloudflare says.

πŸ“– Read

via "Dark Reading: ".
πŸ” COVID-19 highlights need for business and security leaders to work together to prevent cyberattacks πŸ”

New Tenable study says 94% of organizations experienced a business-impacting cyberattack or compromise within the past 12 months; 46% weathered five or more attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Why Confidential Computing Is a Game Changer πŸ•΄

Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-13151

Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Paid $13.7M in Bug Bounty Rewards in 2019-2020 πŸ•΄

The 2019-2020 program year awarded 327 security researchers through 15 bounty programs, with a largest reward of $200,000.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybersecurity Budget Rose in 2019, Uncertainty Prevails in 2020 πŸ•΄

Budgets rise as IT complexity continued to challenge companies, with identity and access management technology an increasingly common focus.

πŸ“– Read

via "Dark Reading: ".
❌ NSA Warns Smartphones Leak Location Data ❌

The agency known for its own questionable surveillance activity advised how mobile users can limit others’ ability to track where they are.

πŸ“– Read

via "Threatpost".
❌ Microsoft Teams Patch Bypass Allows RCE ❌

An attacker can hide amidst legitimate traffic in the application's update function.

πŸ“– Read

via "Threatpost".