πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Fetish app put users’ identities at risk with plain-text passwords ⚠

Whiplr, a naughty, naughty little app, has now secured passwords with "one-way encryption" and is "adding more security measures".

πŸ“– Read

via "Naked Security".
☒ 'Father of Zeus' Kronos malware exploits Office bug to hijack your bank account ☒

The $7000 malware shows there is serious money to be made in the banking Trojan market.

πŸ“– Read

via "Latest topics for ZDNet in Security".
❌ Magecart Group Pinned in Recent British Airways Breach ❌

The Magecart Group has been blamed for the British Airways breach that compromised 380k payment cards.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Airbnb launches investigation after man finds hidden camera in clock ⚠

Trust your gut: if staring at that common object in your rental gives you the heebie jeebies, it might be because it's staring back at you.

πŸ“– Read

via "Naked Security".
⚠ The rise of targeted ransomware ⚠

Ransomware hasn't gone away, but it is getting quieter and more targeted.

πŸ“– Read

via "Naked Security".
πŸ” These industries will soon be impacted by biometric security πŸ”

BioCatch's VP Frances Zelazny explains why companies are dropping passwords in favor of biometric security like fingerprint and iris scanners.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2016-7068

An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 3.7.4 and 4.0.4, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerDNS server by sending crafted DNS queries, which might result in a partial denial of service if the system becomes overloaded. This issue is based on the fact that the PowerDNS server parses all records present in a query regardless of whether they are needed or even legitimate. A specially crafted query containing a large number of records can be used to take advantage of that behaviour.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-7047

A flaw was found in the CloudForms API before 5.6.3.0, 5.7.3.1 and 5.8.1.2. A user with permissions to use the MiqReportResults capability within the API could potentially view data from other tenants or groups to which they should not have access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-0750

The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Why higher education is one of the worst industries at handling cyberattacks πŸ”

Some 73% of institutions took three or more days to apply patches for cyberthreats, according to a recent EfficientIP report.

πŸ“– Read

via "Security on TechRepublic".
☒ Online security 101: Tips for protecting your privacy from hackers and spies ☒

This simple advice will help to protect you against hackers and government surveillance.

πŸ“– Read

via "Latest topics for ZDNet in Security".
❌ Adobe Patches Six Critical Flaws in ColdFusion ❌

Adobe issued fixes for versions of its ColdFusion web development platform - including six critical flaws.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ 4 Practical Measures to Improve Election Security Now πŸ•΄

It's more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage.

πŸ“– Read

via "Dark Reading: ".
☒ First IoT security bill reaches governor's desk in California ☒

California IoT security bill criticized by security researcher. Expert says bill "is based upon an obviously superficial understanding of the problem."

πŸ“– Read

via "Latest topics for ZDNet in Security".
πŸ•΄ British Airways Breach Linked to Ticketmaster Breach Attackers πŸ•΄

Magecart attackers hit airline with the same "digital skimmers" they used on the entertainment company in June, researchers say.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-7066

It was found that the improper default permissions on /tmp/auth directory in JBoss Enterprise Application Platform before 7.1.0 can allow any local user to connect to CLI and allow the user to execute any arbitary operations.

πŸ“– Read

via "National Vulnerability Database".
⚠ Drive away a Tesla today (even if it isn’t yours) ⚠

Raspberry Pi's processing power versus Tesla's Model X cryptography - victory for the little guy!

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-0715

Pivotal Cloud Foundry Elastic Runtime version 1.4.0 through 1.4.5, 1.5.0 through 1.5.11 and 1.6.0 through 1.6.11 is vulnerable to a remote information disclosure. It was found that original mitigation configuration instructions provided as part of CVE-2016-0708 were incomplete and could leave PHP Buildpack, Staticfile Buildpack and potentially other custom Buildpack applications vulnerable to remote information disclosure. Affected applications use automated buildpack detection, serve files directly from the root of the application and have a buildpack that matched after the Java Buildpack in the system buildpack priority when Java Buildpack versions 2.0 through 3.4 were present.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Key to Stealing a Tesla Model S πŸ•΄

A team of hackers finds it's possible to steal a Tesla Model S by cloning the key fob.

πŸ“– Read

via "Dark Reading: ".
❌ Millions of Records Exposed in Veeam Misconfigured Server ❌

Exposed data included names, emails addresses and IP addresses.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Bad Actors Sizing Up Systems Via Lightweight Recon Malware ❌

These stealthy downloaders initially infect systems and then only install additional malware on systems of interest.

πŸ“– Read

via "The first stop for security news | Threatpost ".