πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Maze Ransomware Adopts Ragnar Locker Virtual-Machine Approach ❌

Maze continues to adopt tactics from rival cybercrime gangs.

πŸ“– Read

via "Threatpost".
πŸ” TikTok and WeChat to be banned from US app stores starting Sunday πŸ”

Users in the US would be unable to download the two Chinese-owned apps from local app stores, according to the Department of Commerce.

πŸ“– Read

via "Security on TechRepublic".
❌ Security Takeaways from the Great Work-from-Home Experiment ❌

As the pandemic drags on and remote workforces stay remote, zero-trust and other lessons learned should come to the fore.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2020-0272

In libhwbinder, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-130166487

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0271

In the Settings app, there is an insecure default value. This could lead to local escalation of privilege and tapjacking with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-144507081

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0269

In Android Auto Settings, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-151645626

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0268

In NFC, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148294643

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0265

In Telephony, there are possible leaks of sensitive data due to missing permission checks. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150155839

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0263

In the Accessibility service, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154913130

πŸ“– Read

via "National Vulnerability Database".
❌ SecOps Teams Wrestle with Manual Processes, HR Gaps ❌

Enterprise security teams are "drowning in alerts."

πŸ“– Read

via "Threatpost".
πŸ” How to encrypt files on your Linux servers with gocryptfs πŸ”

Looking for an easy to use encryption tool to protect data on your Linux servers? Jack Wallen shows you how to install and use gocryptfs to serve that very purpose.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Deadly Ransomware Story Continues to Unfold πŸ•΄

A ransomware attack with fatal consequences is attracting notice and comment from around the world.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ A Hacker's Playlist πŸ•΄

Nine security researchers share their favorite songs and genres.

πŸ“– Read

via "Dark Reading: ".
❌ Stubborn WooCommerce Plugin Bugs Get Third Patch ❌

Users of the Discount Rules for WooCommerce WordPress plugin are urged to apply a third and (hopefully) final patch.

πŸ“– Read

via "Threatpost".
❌ The TikTok Ban: Security Experts Weigh in on the App’s Risks ❌

With no hard evidence of abuse, are bans warranted? The real security concerns will likely come after the ban goes into effect, researchers said in our exclusive roundtable.

πŸ“– Read

via "Threatpost".
⚠ Naked Security Live – β€œThe Zerologon hole: are you at risk?” ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
πŸ” Windows Server: Patch this critical flaw now says Homeland Security in emergency warning πŸ”

Government agencies in the US have until today to patch a Windows Server vulnerability that could give hackers control over federal networks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Hacking Yourself: Marie Moe and Pacemaker Security πŸ•΄

Future consumer devices, including pacemakers, should be built with security from the start.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 5 Steps to Greater Cyber Resiliency πŸ•΄

Work from home isn't going away anytime soon, and the increased vulnerability means cyber resiliency will continue to be critical to business resiliency.

πŸ“– Read

via "Dark Reading: ".