πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Engineer Behind Google, Uber Trade Secret Theft Case Sentenced πŸ”

Anthony Levandowski, the former Google engineer, was sentenced this week, four months after he plead guilty to stealing Google's trade secrets.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2020-15106

In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL.

πŸ“– Read

via "National Vulnerability Database".
❌ Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges ❌

Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahead of November's election.

πŸ“– Read

via "Threatpost".
πŸ•΄ Voatz Delivers Multilayered Security to Protect Electronic Voting πŸ•΄

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Pen Testers Share the Inside Story of Their Arrest and Exoneration πŸ•΄

Coalfire's Gary De Mercurio and Justin Wynn share the inside story of their infamous arrest last year while conducting a contracted red-team engagement in an Iowa courthouse -- and what it took to clear their names.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SynerComm Reboots a Security Staple with 'Continuous' Pen Testing πŸ•΄

SPONSORED CONTENT: Penetration testing has evolved well beyond a couple guys you hire to try and break into your network, according to SynerComm's Brian Judd. In addition to a service that offers round-the-clock pen testing, SynerComm also provides purple team testing, effectively splitting the difference with red- and blue-team exercises.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What to Tell Young People of Color About InfoSec Careers πŸ•΄

CEO and founder of Revolution Cyber Juliet Okafor and Baker Hughes Director of Global OT Security Programs Paul Brager talk about the unique lessons and hard truths they provide when mentoring young black cybersecurity professionals.

πŸ“– Read

via "Dark Reading: ".
❌ Twitter Fixes High-Severity Flaw Affecting Android Users ❌

A vulnerability in Twitter for Android could have allowed attackers to access private direct messages (DMs) and other data.

πŸ“– Read

via "Threatpost".
πŸ•΄ Developing Community for Woman Infosec Pros in India πŸ•΄

Vandana Verma tells us how women in India are finding support, education and love of cybersecurity through the growing InfosecGirls community.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Supporting Women in InfoSec πŸ•΄

Maxine Holt, research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs now.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-13404

The ATOS/Sips (aka Atos-Magento) community module 3.0.0 to 3.0.5 for Magento allows command injection.

πŸ“– Read

via "National Vulnerability Database".
❌ Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers ❌

Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch to security researchers with new safe harbor terms and vulnerability disclosure policies at Black Hat USA 2020.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs ❌

The groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.

πŸ“– Read

via "Threatpost".
πŸ•΄ Tales from the Trenches Show Security Issues Endemic to Healthcare πŸ•΄

The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What A Security Engineer & Software Engineer Learned By Swapping Roles πŸ•΄

A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Offers Reward of $10M for Info Leading to Discovery of Election Meddling ❌

Government hopes to avoid interference in the upcoming November presidential vote with a hefty reward.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits ❌

Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets.

πŸ“– Read

via "Threatpost".