πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-1985

IBM Trusteer Rapport/Apex 3.6.1908.22 contains an unused legacy driver which could allow a user with administrator privileges to cause a buffer overflow that would result in a kernel panic. IBM X-Force ID: 154207.

πŸ“– Read

via "National Vulnerability Database".
πŸ” FBI, CISA Warn About Vishing Campaign Targeting Teleworkers πŸ”

In the wake of news that attackers have been carrying out a successful voice phishing campaign against companies for a month, government orgs offered tips on how employees working from home can mitigate future attacks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Extra security or extra risk? Pros and cons of password managers πŸ”

Tech consultants and journalists have their own conflicting opinions about the best way to manage access in a world full of security risks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Attackers Use Unicode & HTML to Bypass Email Security Tools πŸ•΄

Researchers spot cybercriminals using new techniques to help malicious phishing emails slip past detection tools.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CISA Releases 5G Security Guidelines πŸ•΄

The new document defines lines of effort for developing security for the growing 5G network.

πŸ“– Read

via "Dark Reading: ".
❌ Google Fixes High-Severity Chrome Browser Code Execution Bug ❌

The high-severity flaw, which was patched in the latest version of Google's Chrome browser, could allow code execution.

πŸ“– Read

via "Threatpost".
πŸ•΄ MITRE Releases 'Shield' Active Defense Framework πŸ•΄

Free knowledge base offers techniques and tactics for engaging with and better defending against network intruders.

πŸ“– Read

via "Dark Reading: ".
❌ Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem ❌

With many in the public sphere warning about a potential compromise of the integrity of the Presidential Election, security researchers instead flag online resources and influence campaigns as the biggest problem areas.

πŸ“– Read

via "Threatpost".
πŸ” IoT botnets: Smart homes ripe for a new type of cyberattack πŸ”

The burgeoning smart home device market has given rise to digital intrusion and potential energy market manipulation on a massive scale.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Fatal Flaw in Data Security πŸ•΄

Simply stated: No matter how sophisticated your security software is, data cannot be simultaneously used and secured. But that may be changing soon.

πŸ“– Read

via "Dark Reading: ".
❌ Lazarus Group Targets Cryptocurrency Firms Via LinkedIn Messages ❌

The North Korean-linked APT's latest campaign shows that it is shifting focus to target the cryptocurrency and financial verticals.

πŸ“– Read

via "Threatpost".
❌ Safari Bug Revealed After Apple Takes Nearly a Year to Patch ❌

Polish security researcher unveiled the flaw in a cross-browser sharing API that could allow attackers to steal user files.

πŸ“– Read

via "Threatpost".
πŸ›  Sifter 9.5 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Falco 0.25.0 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Palo Alto Networks to Acquire The Crypsis Group for $265M πŸ•΄

This is the latest in a series of acquisitions that Palo Alto has made since 2018.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Three Easy Ways to Avoid Meow-like Database Attacks πŸ•΄

The largest problem facing database security today is the disconnect between security teams and DBAs beginning from the moment of configuration and continuing throughout the database lifecycle.

πŸ“– Read

via "Dark Reading: ".
πŸ” DOJ Discusses China's Efforts to Steal US IP πŸ”

John Demers, the Justice Department's top national security official, said that 80% of state-connected espionage cases relate to China.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Online Business Fraud Down, Consumer Fraud Up πŸ•΄

Criminals are changing tactics to match changing business conditions in the coronavirus pandemic, according to a new report.

πŸ“– Read

via "Dark Reading: ".
πŸ” How phishing attacks have exploited Amazon Web Services accounts πŸ”

Phishing campaigns could compromise business data and use Amazon's cloud platform to launch further attacks, says KnowBe4.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Phishing Attack Used Box to Land in Victim Inboxes πŸ•΄

A phishing attack targeting government and security organizations used a legitimate Box page with Microsoft 365 branding to trick victims.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Election Security's Sticky Problem: Attackers Who Don't Attack Votes πŸ•΄

If election defenders are protecting votes, and adversaries are attacking something else entirely, both sides might claim success, "Operation BlackOut" simulation shows.

πŸ“– Read

via "Dark Reading: ".