πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2020-11493

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.

πŸ“– Read

via "National Vulnerability Database".
❌ WhatsApp Discloses 6 Bugs via Dedicated Security Site ❌

The company also committed to more transparency about app flaws, with an advisory page aimed at keeping the community better informed of security vulnerabilities.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five 9/4 πŸ”

Owning an "OG" email account, lessons from the Garmin ransomware attack, and Emotet's new 'Red Dawn' attachment - catch up on the week’s news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ Phishing tricks – the Top Ten Treacheries of 2020 ⚠

Here's the Top Ten - or perhaps we mean The Worst Ten. How many would you fall for?

πŸ“– Read

via "Naked Security".
πŸ•΄ The Hidden Security Risks of Business Applications πŸ•΄

Today's enterprises depend on mission-critical applications to keep them productive, help better serve customers, and keep up with demand. It's important that they also know the risks.

πŸ“– Read

via "Dark Reading: ".
πŸ” Phishing attack baits victims by promising access to quarantined emails πŸ”

This campaign tries to steal account credentials by convincing users that their email service has quarantined three messages, says Cofense.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-3881

Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.

πŸ“– Read

via "National Vulnerability Database".
❌ Attackers Steal Outlook Credentials Via Overlay Screens on Legitimate Sites ❌

A phishing campaign uses overlay screens and email 'quarantine' policies to steal targets' Microsoft Outlook credentials.

πŸ“– Read

via "Threatpost".
πŸ•΄ Strategic Cyber Warfare Heats Up πŸ•΄

It's "anything goes," according to renowned hacker the Grugq, who drew a bright line between cyberwar and cyber warfare at this week's virtual Disclosure Conference.

πŸ“– Read

via "Dark Reading: ".
πŸ” New Python-based trojan targets financial tech firms to steal sensitive data πŸ”

Dubbed PyVil, the new remote access trojan goes after passwords, documents, browser cookies, and email credentials, says Cybereason.

πŸ“– Read

via "Security on TechRepublic".
❌ Facebook Debuts Third-Party Vulnerability Disclosure Policy ❌

If the social-media behemoth finds a bug in another platform's code, the project has 90 days to remediate before Facebook goes public.

πŸ“– Read

via "Threatpost".
❌ Vulnerability Disclosure: Ethical Hackers Seek Best Practices ❌

Cybersecurity researchers Brian Gorenc and Dustin Childs talk about the biggest vulnerability disclosure challenges in IoT and the industrial vertical.

πŸ“– Read

via "Threatpost".
πŸ•΄ Ad Fraud: The Multi-Billion Dollar Cybercrime CISOs Might Overlook πŸ•΄

Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Collection of Metadata -- as Done by the NSA -- Likely Unconstitutional, US Court Suggests πŸ•΄

A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.

πŸ“– Read

via "Dark Reading: ".
❌ Social Media: Thwarting The Phishing-Data Goldmine ❌

Cybercriminals can use social media in many ways in order to trick employees.

πŸ“– Read

via "Threatpost".
πŸ•΄ Warner Music Group Admits Breach πŸ•΄

The months-long breach hit financial details for customers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Qualcomm unveils new Snapdragon processor to power 5G computers πŸ”

The Snapdragon 8cx Gen 2 5G chip is designed to bring 5G to commercial and consumer Always On, Always Connected PCs. The processor supports Wi-Fi 6 and offers productivity and security benefits.

πŸ“– Read

via "Security on TechRepublic".
πŸ” What SMBs and startups can learn from securing a presidential campaign πŸ”

Mayor Pete Buttigieg's former CISO and Splunk security advisor Mick Baccio explains the cybersecurity best practices he learned from protecting a presidential candidate's campaign.

πŸ“– Read

via "Security on TechRepublic".
πŸ” What SMBs and startups can learn from securing a presidential campaign πŸ”

Mayor Pete Buttigieg's former CISO and Splunk security advisor Mick Baccio explains the cybersecurity best practices he learned from protecting a presidential candidate's campaign.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Ad Fraud: The Multibillion-Dollar Cybercrime CISOs Might Overlook πŸ•΄

Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to move Google Authenticator from one iPhone or Android device to another πŸ”

If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.

πŸ“– Read

via "Security on TechRepublic".