πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2019-14758

An issue was discovered in KaiOS 2.5 and 2.5.1. The pre-installed File Manager application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a file via email to the victim that will inject HTML into the File Manager application (assuming the victim chooses to download the email attachment). At a bare minimum, this allows an attacker to take control over the File Manager application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-14757

An issue was discovered in KaiOS 2.5 and 2.5.1. The pre-installed Contacts application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a vCard file to the victim that will inject HTML into the Contacts application (assuming the victim chooses to import the file). At a bare minimum, this allows an attacker to take control over the Contacts application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
❌ MFA Bypass Bugs Opened Microsoft 365 to Attack ❌

Vulnerabilities β€˜that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio.

πŸ“– Read

via "Threatpost".
πŸ•΄ Simplify Your Privacy Approach to Overcome CCPA Challenges πŸ•΄

By building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations.

πŸ“– Read

via "Dark Reading: ".
πŸ” Ransomware attacks continue to dominate the threat landscape πŸ”

Cybercriminals are increasingly exploiting the Cobalt Strike testing toolkit to carry out ransomware campaigns, says Cisco Talos Incident Response.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to protect your organization from DDoS attacks πŸ”

Without early threat detection, you may not know your website has been hit by a DDoS attack until it slows down or stops, says NordVPN Teams.

πŸ“– Read

via "Security on TechRepublic".
πŸ” CISOs are struggling to prepare for security compliance audits πŸ”

CISOs are turning to automation to address concerns about doing more with less, preparing for audits remotely, and speeding evidence collection, according to a newly released study.

πŸ“– Read

via "Security on TechRepublic".
❌ Windows Exploit Released For Microsoft β€˜Zerologon’ Flaw ❌

Security researchers and U.S. government authorities alike are urging admins to address Microsoft's critical privilege escalation flaw.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 things to know about zero trust ops πŸ”

Checking users, applications, and devices on your network are just a few ways to keep your company safe from cyberattacks. Tom Merritt lists five things to know about zero trust ops.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 things to know about zero trust ops πŸ”

Checking users, applications, and devices on your network are just a few ways to keep your company safe from cyberattacks. Tom Merritt lists five things to know about zero trust ops.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Research Finds Nearly 800,000 Access Keys Exposed Online πŸ•΄

The keys were primarily for access to databases and cloud services.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to run a phishing attack simulation with GoPhish πŸ”

Jack Wallen shows you how to run a phishing simulation on your employees to test their understanding of how this type of attack works.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 10 antivirus software options for security-conscious users πŸ”

The world is too dangerous to use the internet unprotected. Save your computers, tablets, and phones from being attacked with these options.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cyberattacks against schools are on the rise πŸ”

With the back-to-school season, schools and academic organizations are seeing an increase in cyberattacks, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.4.5 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Encrypted Traffic Inference: An Alternative to Enterprise Network Traffic Decryption πŸ•΄

Finding threats in encrypted inbound network traffic is complex and expensive for enterprises, but a fascinating new approach could eliminate the need for decryption.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Taking Security With You in the WFH Era: What to Do Next πŸ•΄

As many organizations pivot to working from home, here are some considerations for prioritizing the new security protocols.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CISA Issues Alert for Microsoft Netlogon Vulnerability πŸ•΄

CISA has issued an alert following the discovery of publicly available exploit code for Windows elevation of privilege flaw CVE-2020-1472.

πŸ“– Read

via "Dark Reading: ".
❌ IBM Spectrum Protect Plus Security Open to RCE ❌

Two bugs (CVE-2020-4703 and CVE-2020-4711) in IBM's Spectrum Protect Plus data-storage protection solution could enable remote code execution.

πŸ“– Read

via "Threatpost".
❌ QR Codes Serve Up a Menu of Security Concerns ❌

QR code usage is soaring in the pandemic -- but malicious versions aren't something that most people think about.

πŸ“– Read

via "Threatpost".