πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Tech jobs: These are the skills most in demand as companies change their priorities πŸ”

Keeping the hackers out remains a top priority but firms are also looking at new areas of investment.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 75% of AppSec practitioners see a growing cultural divide between AppSec and developers πŸ”

Thirty-nine percent of developers said the security team is responsible for securing apps, while 67% of AppSec practitioners said their teams are responsible, according to a new study.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Permission Management & the Goldilocks Conundrum πŸ•΄

In today's COVID-19 era, managing access has become even more difficult, especially for large organizations. Here's how to get it "just right."

πŸ“– Read

via "Dark Reading: ".
❌ Google Cloud Buckets Exposed in Rampant Misconfiguration ❌

A too-large percentage of cloud databases containing highly sensitive information are publicly available, an analysis shows.

πŸ“– Read

via "Threatpost".
❌ Activision Refutes Claims of 500K-Account Hack ❌

The Call of Duty behemoth said that the reports of widespread hacks are false.

πŸ“– Read

via "Threatpost".
❌ Firefox 81 Release Kills High-Severity Code-Execution Bugs ❌

Mozilla has fixed three high-severity flaws with the release of Firefox 81 and Firefox ESR 78.3.

πŸ“– Read

via "Threatpost".
❌ Microsoft Overhauls Patch Tuesday Security Update Guide ❌

Microsoft announced a new Security Guide to help cybersecurity profession more quickly untangle relevant bugs in its monthly security bulletins.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Extends Data Loss Prevention to Cloud App Security πŸ•΄

The update, one of several announced today, is intended to help employees remain compliant when handling data across cloud applications.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Can Schools Pass Their Biggest Cybersecurity Test Yet? πŸ•΄

Understaffed, underfunded, and underequipped, IT teams in the K-12 sector face a slew of challenges amid remote and hybrid learning models. Here's where they can begin to protect their schools against cyberattacks.

πŸ“– Read

via "Dark Reading: ".
❌ Known Citrix Workspace Bug Open to New Attack ❌

Windows MSI files provide an opening for attackers even though the bug was mostly patched in July.

πŸ“– Read

via "Threatpost".
πŸ•΄ Startup Aims to Map and Track All the IT and Security Things πŸ•΄

Security service JupiterOne spins off from a healthcare service provider's homegrown technology.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Google Search Hacks Push Viruses & Porn πŸ•΄

Three incidents demonstrate how cybercriminals leverage the scourge of black-hat search engine optimization to manipulate search results.

πŸ“– Read

via "Dark Reading: ".
πŸ” Georgia Clinic Pays $1.5M to Settle HIPAA Noncompliance πŸ”

An investigation by HHS OCR at this clinic uncovered "longstanding, systemic noncompliance with the HIPAA Privacy and Security Rules."

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Four ways CISOs can move enterprise security into the new normal πŸ”

Security is changing rapidly, and the COVID-19 pandemic hasn't helped. A Cisco roundtable of chief information security officer advisers plotted the course for a secure future.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  OpenSSL Toolkit 1.1.1h πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Google Chrome Bugs Open Browsers to Attack ❌

Google's new release of Chrome 85.0.4183.121 for Windows, Mac, and Linux fixes 10 security flaws.

πŸ“– Read

via "Threatpost".
πŸ” How to create a secure username πŸ”

Passwords are the most important factor for securing your accounts. But you need to pay attention to your usernames as well, says NordPass.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Vulnerability Disclosure Programs See Signups & Payouts Surge πŸ•΄

More than $44.75 million in rewards were paid to hackers over the past year, driving total payouts beyond $100 million.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attackers Target Small Manufacturing Firms πŸ•΄

The most common tactics include credential stuffing using valid accounts, various forms of deception, and vulnerabilities in third-party software, Rapid7 says in its latest quarterly threat report.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-1983

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-1947

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA.

πŸ“– Read

via "National Vulnerability Database".