πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 6 Signs Your Supply Chain Risk Just Shot Up πŸ•΄

Risk levels are not steady states. Here are six indications that the danger posed by your supply chain is headed in the wrong direction.

πŸ“– Read

via "Dark Reading: ".
πŸ” Office 365 Can Now Open Attachments in a Sandbox πŸ”

Microsoft has released a new feature update - Application Guard - that opens suspicious looking attachments in a sandbox to prevent malicious activity.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2019-4692

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 171829.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4691

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 171828.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4689

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 171826.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4688

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 171825.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-4686

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 171822.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-1501

IBM Security Guardium 10.5, 10.6, and 11.0 could allow an unauthorized user to obtain sensitive information due to missing security controls. IBM X-Force ID: 141226.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ US Warns of Ongoing BeagleBoyz Bank-Theft Operations πŸ•΄

The North Korean operatives have attempted to steal more than $2 billion since 2015 in a series of ongoing campaigns.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install Malware Information Sharing Platform on Ubuntu Server 18.04 πŸ”

If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 'Transparent Tribe' APT Group Deploys New Android Spyware for Cyber Espionage πŸ•΄

The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India.

πŸ“– Read

via "Dark Reading: ".
πŸ” Local governments continue to be the biggest target for ransomware attacks πŸ”

Small municipalities suffer the majority of ransomware, but they aren't the only ones suffering as ransoms rise and payouts become more common.

πŸ“– Read

via "Security on TechRepublic".
❌ Revamped Qbot Trojan Packs New Punch: Hijacks Email Threads ❌

New version of trojan is spreading fast and already has claimed 100,000 victims globally, Check Point has discovered.

πŸ“– Read

via "Threatpost".
❌ Malicious Attachments Remain a Cybercriminal Threat Vector Favorite ❌

Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.

πŸ“– Read

via "Threatpost".
πŸ” What a year of penetration testing data can reveal about the state of cybersecurity πŸ”

From web app flaws to a lack of 2FA, Rapid7 found lots of common soft targets in the networks it breached on behalf of clients.

πŸ“– Read

via "Security on TechRepublic".
⚠ Russian cybercrime suspect arrested in $1m ransomware conspiracy ⚠

When ransomware hits, there are always 3 questions. How much? Did they pay? And the big one: How did the crooks get in?

πŸ“– Read

via "Naked Security".
❌ Magecart’s Success Paves Way For Cybercriminal Credit Card β€˜Sniffer’ Market ❌

Magecart's successes have led to threat actors actively advertising 'sniffers' that can be injected into e-commerce websites in order to exfiltrate payment cards.

πŸ“– Read

via "Threatpost".
πŸ•΄ How CISOs Can Play a New Role in Defining the Future of Work πŸ•΄

Rather than just reacting to security issues in the COVID-19 era, CISOs are now in a position to be change agents alongside their C-suite peers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Qbot trojan hijacking email threads to carry out phishing campaigns πŸ”

The latest variant of this trojan extracts email threads from Outlook, which it uses for phishing attacks, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  I2P 0.9.47 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".