πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ On 'Invisible Salamanders' and Insecure Messages πŸ•΄

Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.

πŸ“– Read

via "Dark Reading: ".
πŸ” What Does a Data Breach Cost in 2020? πŸ”

Ponemon Institute's annual Cost of a Data Breach report tracks how industry data breach costs have changed over time.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Black Hat 2020: Mercedes-Benz E-Series Rife with 19 Bugs ❌

Researchers went into detail about the discovery and disclosure of 19 security flaws they found in Mercedes-Benz vehicles, which have all been fixed.

πŸ“– Read

via "Threatpost".
πŸ•΄ Where Dark Reading Goes Next πŸ•΄

Dark Reading Editor-in-Chief gives a complete rundown of all the Dark Reading projects you might not even know about, his insight into the future of the security industry, and how we plan to cover it.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ A Mix of Optimism and Pessimism for Security of the 2020 Election πŸ•΄

DHS CISA's Christopher Krebs and Georgetown University's Matt Blaze at Black Hat USA give the lowdown on where things stand and what still needs to happen to protect the integrity of November's election.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Create New Framework to Evaluate User Security Awareness πŸ•΄

Approaches based on questionnaires and self-evaluation are not always a good indicator of how well a user can mitigate social engineering threats.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-15114

In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11937

In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.

πŸ“– Read

via "National Vulnerability Database".
❌ Black Hat 2020: Influence Campaigns Are a Cybersecurity Problem ❌

An inside look at how nation-states use social media to influence, confuse and divide -- and why cybersecurity researchers should be involved.

πŸ“– Read

via "Threatpost".
πŸ•΄ Getting to the Root: How Researchers Identify Zero-Days in the Wild πŸ•΄

Google Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.

πŸ“– Read

via "Dark Reading: ".
❌ Augmenting AWS Security Controls ❌

Appropriate use of native security controls in AWS and other CSPs is fundamental to managing cloud risk and avoiding costly breaches.

πŸ“– Read

via "Threatpost".
⚠ Business Email Compromise – fighting back with machine learning ⚠

Machine learning models are immune to blandishments, threats, flattery and so - so why not set them against social engineers?

πŸ“– Read

via "Naked Security".
❌ Hackers Dump 20GB of Intel’s Confidential Data Online ❌

Chipmaker investigates a leak of intellectual property from its partner and customer resource center.

πŸ“– Read

via "Threatpost".
πŸ•΄ IoT Security During COVID-19: What We've Learned & Where We're Going πŸ•΄

Vigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest crop of pandemic opportunists.

πŸ“– Read

via "Dark Reading: ".
πŸ” Report: Two new encryption standards will soon sweep away security controls πŸ”

Security professionals must act before TLS 1.3 and DNS-over-HTTPS (DoH) are implemented or they won't be able to analyze network traffic and detect cyberthreats, warns Forrester Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ BEC Campaigns Target Financial Execs via Office 365 πŸ•΄

A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researcher Finds New Office Macro Attacks for MacOS πŸ•΄

Building successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to limit file upload size on NGINX to mitigate DoS attack πŸ”

If you have an NGINX site that must allow users to upload files, try this configuration to help prevent possible Denial-of-Service attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Friday Five: 8/7 Edition πŸ”

Telstra suffers a DoS attack, the hackers behind last month's Twitter breach are arrested, and an NSA advisory warns mobile users about the dangers of location data - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2020-11993

Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11985

IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.

πŸ“– Read

via "National Vulnerability Database".