๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ•ด Business Email Compromise Attacks Involving MFA Bypass Increase ๐Ÿ•ด

Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ NSA, FBI Warn of Linux Malware Used in Espionage Attacks โŒ

A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Healthcare Industry Sees Respite From Attacks in First Half of 2020 ๐Ÿ•ด

Breach disclosures are down, and reported ransomware attacks have also plummeted. Good news -- or a calm before the storm?

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด CISA Warns of Phishing Campaign with Loan-Relief Lure ๐Ÿ•ด

Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2019-20383

ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Instagram Retained Deleted User Data Despite GDPR Rules โŒ

The photo-sharing app retained peopleโ€™s photos and private direct messages on its servers even after users removed them.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด WFH Summer 2020 Caption Contest Winners ๐Ÿ•ด

Clever wordplay on sandcastles, sandboxes, zero trust. and granular controls. And the winners are ...

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด 7 Ways to Keep Your Remote Workforce Safe ๐Ÿ•ด

These tips will help you chart a course for a security strategy that just may become part of the normal way organizations will function over the next several years.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” How cybercriminals are exploiting US unemployment benefits to make money ๐Ÿ”

Scammers use Social Security numbers and other data to create synthetic IDs to collect unemployment benefits, says IntSights.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” Friday Five: 8/14 Edition ๐Ÿ”

Ransomware group launches a new data leak site, 1 Billion Android phones possibly at risk of data theft, and England is testing a new coronavirus contact-tracing app - catch up on the week's news with the Friday Five.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONโ€ผ New - CVE-2019-7410

There is stored cross site scripting (XSS) in Galileo CMS v0.042. Remote authenticated users could inject arbitrary web script or HTML via $page_title in /lib/Galileo/files/templates/page/show.html.ep (aka the PAGE TITLE Field).

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2019-6112

A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2019-19643

ise smart connect KNX Vaillant 1.2.839 contain a Denial of Service.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Forcepoint Hopes for Breakout Moment by Hopping on the ZTA Bandwagon ๐Ÿ•ด

The debut of Forcepoint's two-pronged zero trust access (ZTA) solution delivers much-needed competitive momentum, but it must do more to stand out against a growing field of ZTA competitors.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2019-5591

A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Critical Flaws in WordPress Quiz Plugin Allow Site Takeover โŒ

The recently patched flaws could be abused by an unauthenticated, remote attackers to take over vulnerable websites.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด DHS CISA Warns of Phishing Emails Rigged with KONNI Malware ๐Ÿ•ด

Konni is a remote administration tool cyberattackers use to steal files, capture keystrokes, take screenshots, and execute malicious code.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2015-8033

In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2015-8032

In Textpattern 4.5.7, an unprivileged author can change an article's markup setting.

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Mac Users Targeted by Spyware Spreading via Xcode Projects โŒ

The XCSSET suite of malware also hijacks browsers, has a ransomware module and more -- and uses a pair of zero-day exploits.

๐Ÿ“– Read

via "Threatpost".