πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Four More Bugs Patched in Microsoft’s Azure Sphere IoT Platform ❌

Researchers have unearthed more vulnerabilities in Microsoft’s IoT security solution.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2019-14904

A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.

πŸ“– Read

via "National Vulnerability Database".
❌ How to Write a Cybersecurity Playbook During a Pandemic ❌

IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 drags on.

πŸ“– Read

via "Threatpost".
❌ Medical Data Leaked on GitHub Due to Developer Errors ❌

Up to 200,000 patient records from Office 365 and Google G Suite exposed by hardcoded credentials and other improper access controls.

πŸ“– Read

via "Threatpost".
πŸ•΄ Deep Fake: Setting the Stage for Next-Gen Social Engineering πŸ•΄

Humans are susceptible to normalcy bias, which may leave us vulnerable to disinformation that reinforces our beliefs.

πŸ“– Read

via "Dark Reading: ".
πŸ” What a year of penetration testing data can reveal about the state of cybersecurity πŸ”

From web app flaws to a lack of 2FA, Rapid7 found lots of common soft targets in the networks it breached on behalf of clients.

πŸ“– Read

via "Security on TechRepublic".
❌ Disinformation Spurs a Thriving Industry as U.S. Election Looms ❌

Threat actors are becoming increasingly sophisticated in launching disinformation campaigns - and staying under the radar to avoid detection from Facebook, Twitter and other platforms.

πŸ“– Read

via "Threatpost".
πŸ•΄ With More Use of Cloud, Passwords Become Even Weaker Link πŸ•΄

Slow patching provides vulnerabilities to exploit. A lack of network segmentation allows unrestricted lateral movement. Yet a report surveying a year of penetration tests finds that passwords still top the list of what attackers use to compromise systems.

πŸ“– Read

via "Dark Reading: ".
πŸ” Want to create loyal customers? Get on the bleeding edge of data security πŸ”

The public is increasingly wary of the privacy of their data. Companies reliant on it should take this as a sign of the future of customer loyalty, says data privacy firm Privitar.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity at a crossroads: Moving toward trust in our technologies πŸ”

Cloud computing changed the technology landscape forever. Here's hoping that trust will be the next frontier of computing.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-18847

Enterprise Access Client Auto-Updater allows for Remote Code Execution prior to version 2.0.1.

πŸ“– Read

via "National Vulnerability Database".
❌ Hackers Exploit Autodesk Flaw in Recent Cyberespionage Attack ❌

The popular Autodesk software was exploited in a recent cyberespionage campaign against an international architectural company.

πŸ“– Read

via "Threatpost".
⚠ β€œChrome considered harmful” – the Law of Unintended Consequences ⚠

A well-written article on the APNIC blog has provoked a thoughtful response from the Chromium coders - and we can all learn from it!

πŸ“– Read

via "Naked Security".
πŸ•΄ Russian National Arrested for Conspiracy to Hack Nevada Company πŸ•΄

The defendant allegedly planned to pay an employee $1 million to infect the company network with malware.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The 'Shared Responsibility' Misnomer: Why the Cloud Continues to Confound πŸ•΄

Under the "shared responsibility model," the security management of cloud offerings is split equally between the vendor and the customer. Easy enough, right?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Signs Your Supply Chain Risk Just Shot Up πŸ•΄

Risk levels are not steady states. Here are six indications that the danger posed by your supply chain is headed in the wrong direction.

πŸ“– Read

via "Dark Reading: ".
❌ Cisco Patches β€˜High-Severity’ Bugs Impacting Switches, Fibre Storage ❌

Nine bugs were patched, eight of which are rated β€˜high’ severity.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Signs Your Supply Chain Risk Just Shot Up πŸ•΄

Risk levels are not steady states. Here are six indications that the danger posed by your supply chain is headed in the wrong direction.

πŸ“– Read

via "Dark Reading: ".
πŸ” Office 365 Can Now Open Attachments in a Sandbox πŸ”

Microsoft has released a new feature update - Application Guard - that opens suspicious looking attachments in a sandbox to prevent malicious activity.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2019-4692

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 171829.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4691

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 171828.

πŸ“– Read

via "National Vulnerability Database".