πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-17768

Ingenico Telium 2 POS terminals have an insecure TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17767

Ingenico Telium 2 POS terminals have hardcoded PPP credentials. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17766

Ingenico Telium 2 POS Telium2 OS allow bypass of file-reading restrictions via the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-17765

Ingenico Telium 2 POS terminals have undeclared TRACE protocol commands. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
❌ Google Squashes Critical Android Media Framework Bug ❌

The September Android security bulletin addressed critical- and high-severity flaws tied to 53 CVEs overall.

πŸ“– Read

via "Threatpost".
❌ Zeppelin Ransomware Returns with New Trojan on Board ❌

The malware has popped up in a targeted campaign and a new infection routine.

πŸ“– Read

via "Threatpost".
πŸ•΄ Inova Suffers Third-Party Data Breach πŸ•΄

The breach occurred as part of a ransomware attack against service provider Blackbaud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Chart: Does Lack of Diversity Impact the Skills Shortage? πŸ•΄

Yes, according to 21% of security pros who participated in the 2020 Black Hat Attendee Survey.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Meet the Middlemen Who Connect Cybercriminals With Victims πŸ•΄

An analysis of initial access brokers explains how they break into vulnerable organizations and sell their access for up to $10,000.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Legality of Security Research to be Decided in US Supreme Court Case πŸ•΄

A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Attacks Disrupt School Reopenings πŸ•΄

A flurry of recent attacks is complicating attempts to deliver classes online at some schools in different parts of the country.

πŸ“– Read

via "Dark Reading: ".
❌ CDRThief Malware Targets VoIP Gear in Carrier Networks ❌

The Linux-targeted code can steal phone-call metadata, likely in spy campaigns or for use in VoIP fraud.

πŸ“– Read

via "Threatpost".
πŸ” Linux servers and workstations are hackers' next target, security researchers warn πŸ”

Sophisticated hackers and crooks are developing more tools to target Linux-based systems used by government and big business.

πŸ“– Read

via "Security on TechRepublic".
❌ Product Overview: Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine ❌

The Cynet 360 platform is built on three pillars; Extended Detection and Response (XDR), Response Automation, and Managed Detection and Response (MDR).

πŸ“– Read

via "Threatpost".
❌ Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles ❌

New opt-in COVID-19 Exposure Notifications Express systems baked into Apple’s iOS and available on Android need privacy guardrails, say privacy advocates.

πŸ“– Read

via "Threatpost".
πŸ•΄ Ripple20 Malware Highlights Industrial Security Challenges πŸ•΄

Poor security practices allowed software vulnerabilities to propagate throughout industrial and IoT products for more than 20 years.

πŸ“– Read

via "Dark Reading: ".
❌ Ransomware And Zoom-Bombing: Cyberattacks Disrupt Back-to-School Plans ❌

Cyberattacks have caused several school systems to delay students' first day back - and experts warn that new COVID-related delays could be the new "snow days."

πŸ“– Read

via "Threatpost".
πŸ›  Zeek 3.2.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks ❌

The "BLURtooth" flaw allows attackers within wireless range to bypass authentication keys and snoop on devices utilizing implementations of Bluetooth 4.0 through 5.0.

πŸ“– Read

via "Threatpost".
πŸ” How ransomware attacks are growing in severity πŸ”

Demands are sharply higher, and the complexity and costs of addressing an attack are increasing, according to cyber insurance provider Coalition.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Managed IT Providers: The Cyber-Threat Actors' Gateway to SMBs πŸ•΄

Criminals have made MSPs a big target of their attacks. That should concern small and midsize businesses a great deal.

πŸ“– Read

via "Dark Reading: ".