πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs ❌

The groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.

πŸ“– Read

via "Threatpost".
πŸ•΄ Tales from the Trenches Show Security Issues Endemic to Healthcare πŸ•΄

The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What A Security Engineer & Software Engineer Learned By Swapping Roles πŸ•΄

A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Offers Reward of $10M for Info Leading to Discovery of Election Meddling ❌

Government hopes to avoid interference in the upcoming November presidential vote with a hefty reward.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits ❌

Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2020: β€˜Zero-Click’ MacOS Exploit Chain Uses Microsoft Office Macros ❌

At Black Hat 2020, Patrick Wardle disclosed an exploit chain that bypasses Microsoft's malicious macros protections to infect MacOS users.

πŸ“– Read

via "Threatpost".
⚠ Porn blast disrupts bail hearing of alleged Twitter hacker ⚠

An alleged hacker's bail hearing held online via Zoom with screen sharing enabled... what could possibly go wrong?

πŸ“– Read

via "Naked Security".
πŸ” FBI announcement on Windows 7 end of life prompts worry from security experts πŸ”

Despite the FBI announcement, hospitals, schools, and government offices across the world still use Windows 7.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 3 Tips For Better Security Across the Software Supply Chain πŸ•΄

It may sound look intimidating, but with a few tweaks to tools and processes already in use, it's not hard to get a head start on improving security posture of the software supply chain.

πŸ“– Read

via "Dark Reading: ".
πŸ” COVID-19-related scams cost Americans more than $98 million since the start of 2020 πŸ”

Online shopping is the most prevalent type of scam with people losing nearly $14 million to date, according to FTC data.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Security analysts want more help from developers to improve DevSecOps πŸ”

More training on security tools and better performance metrics can accomplish this, according to a new survey.

πŸ“– Read

via "Security on TechRepublic".
❌ High-Severity Cisco DoS Flaw Plagues Small-Business Switches ❌

Cisco recently patched the high-severity flaw, which could allow remote, unauthenticated attackers to launch DoS attacks against its popular small business switches.

πŸ“– Read

via "Threatpost".
πŸ•΄ Ripple20: More Vulnerable Devices Identified πŸ•΄

Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Energy Market Manipulation with High-Wattage IoT Botnets πŸ•΄

Attackers that can compromise enough products such as smart ACs and heaters can tweak power demand in subtle ways for financial gain or to hurt market players, researchers at Black Hat say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Four Rules and Three Tools to Protect Against Fake SaaS Apps πŸ•΄

Here's how to blunt the twinned forces of shadow IT and counterfeit apps and keep your data safe.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ A Real-World Tool for Organizing, Integrating Your Other Tools πŸ•΄

Omdia Cybersecurity Accelerator analyst Eric Parizo describes the value overwhelmed security managers may find in a SPIF.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 2019 Breach Leads to $80 Million Fine for Capital One πŸ•΄

The fine is part of a series of steps required by the Office of the Comptroller of the Currency.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Counting for Good: Hardware Counters Un-mask Malware πŸ•΄

Nick Gregory, research scientist at Capsule8, talks about his session with Capsule8 data scientist Harini Kannan, "Uncommon Sense: Detecting Exploits With Novel Hardware Performance Counters and Machine Learning Magic."

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-13365

Certain Zyxel products have a locally accessible binary that allows a non-root user to generate a password for an undocumented user account that can be used for a TELNET session as root. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-13364

A backdoor in certain Zyxel products allows remote TELNET access via a CGI script. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.

πŸ“– Read

via "National Vulnerability Database".