πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 8 Frequently Asked Questions on Organizations' Data Protection Programs πŸ•΄

Adherence to data protection regulations requires a multidisciplinary approach that has the commitment of all employees. Expect to be asked questions like these.

πŸ“– Read

via "Dark Reading: ".
❌ Bug in Google Maps Opened Door to Cross-Site Scripting Attacks ❌

A researcher discovered a cross-site scripting flaw in Google Map's export function, which earned him $10,000 in bug bounty rewards.

πŸ“– Read

via "Threatpost".
❌ Cryptobugs Found in Numerous Google Play Store Apps ❌

A new dynamic tool developed by Columbia University researchers flagged cryptography mistakes made in more than 300 popular Android apps.

πŸ“– Read

via "Threatpost".
πŸ•΄ Post-COVID-19 Cybersecurity Spending Update πŸ•΄

Security spending growth will slow in 2020, but purse strings are looser than for other areas of IT.

πŸ“– Read

via "Dark Reading: ".
πŸ” How SMBs are overcoming key challenges in cybersecurity πŸ”

Small and midsized businesses cited budget constraints as their biggest security obstacle, according to Untangle.

πŸ“– Read

via "Security on TechRepublic".
❌ Critical Adobe Flaws Allow Attackers to Run JavaScript in Browsers ❌

Five critical cross-site scripting flaws were fixed by Adobe in Experience Manager as part of its regularly scheduled patches.

πŸ“– Read

via "Threatpost".
πŸ•΄ VPNs: The Cyber Elephant in the Room πŸ•΄

While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google Cloud Expands Confidential Computing Lineup πŸ•΄

Google plans to build out its Confidential Computing portfolio with the launch of Confidential GKE Nodes for Kubernetes workloads.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ WordPress Plug-in Has Critical Zero-Day πŸ•΄

The vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.

πŸ“– Read

via "Dark Reading: ".
πŸ” Following Data Theft, NJ Hacker Sentenced πŸ”

The hacker admitted last year that he broke into two companies – one his former employer – and stole more than 15,000 files.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Critical Intel Active Management Technology Flaw Allows Privilege Escalation ❌

The critical Intel vulnerability could allow unauthenticated attackers gain escalated privileges on Intel vPro corporate systems.

πŸ“– Read

via "Threatpost".
❌ Microsoft’s Patch Tuesday Packed with Critical RCE Bugs ❌

The most concerning of the disclosed bugs would allow an attacker to take over Microsoft Exchange just by sending an email.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Fixes 129 Vulnerabilities for September's Patch Tuesday πŸ•΄

This month's Patch Tuesday brought fixes for 23 critical vulnerabilities, including a notable flaw in Microsoft Exchange.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Next-Gen Firewalls 101: Not Just a Buzzword πŸ•΄

In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of devices.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-11124

u'Possible use-after-free while accessing diag client map table since list can be reallocated due to exceeding max client limit.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9607, Nicobar, QCS404, QCS405, QCS610, Rennell, SA6155P, SA8155P, Saipan, SC8180X, SDM660, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
❌ Spyware Labeled β€˜TikTok Pro’ Exploits Fears of US Ban ❌

Malware can take over common device functions as well as creates a phishing page to steal Facebook credentials.

πŸ“– Read

via "Threatpost".
⚠ Fake web alerts – how to spot and stop them ⚠

How do you spot and deal with fake system alerts on both computers and mobile devices?

πŸ“– Read

via "Naked Security".
πŸ•΄ Top 5 Identity-Centric Security Imperatives for Newly Minted Remote Workers πŸ•΄

In the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft issues 129 security fixes as part of Patch Tuesday September πŸ”

This month's patch Tuesday includes patches for 15 Microsoft products, including 23 critical CVEs.

πŸ“– Read

via "Security on TechRepublic".
❌ Severe Industrial Bugs Allow Takeover of Critical Systems ❌

Researchers warn of critical vulnerabilities in a third-party industrial component used by top ICS vendors like Rockwell Automation and Siemens.

πŸ“– Read

via "Threatpost".
πŸ•΄ Multiparty Encryption Allows Companies to Solve Security-Data Conundrum πŸ•΄

An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.

πŸ“– Read

via "Dark Reading: ".