🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2019-15285

Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-15283

Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

📖 Read

via "National Vulnerability Database".
🕴 12 Bare-Minimum Benchmarks for AppSec Initiatives 🕴

The newly published Building Security in Maturity Model provides the software security basics organizations should cover to keep up with their peers.

📖 Read

via "Dark Reading: ".
🕴 7 Non-Technical Skills Threat Analysts Should Master to Keep Their Jobs 🕴

It's not just technical expertise and certifications that enable analysts to build long-term careers in cybersecurity.

📖 Read

via "Dark Reading: ".
🔐 Experts discuss ways IT can maximize budget amid COVID-19 shrinkage 🔐

With revenue down, CIOs are rearranging their technology spending to prioritize return to office needs and security, executives say.

📖 Read

via "Security on TechRepublic".
🔐 FBI warns of cybercriminals spreading false info about 2020 election results 🔐

Bad actors could create or change websites and social media content to discredit this year's electoral process, cautions the FBI and CISA.

📖 Read

via "Security on TechRepublic".
🔐 How rogue TikTok accounts are promoting malicious mobile apps 🔐

The accounts are pushing games, wallpaper, and other apps designed to deploy adware scams toward iOS and Android users, says Avast.

📖 Read

via "Security on TechRepublic".
OldGremlin Ransomware Group Bedevils Russian Orgs

The cybercriminal group has plagued firms with ransomware, sent via spear phishing emails with COVID-19 lures, since March.

📖 Read

via "Threatpost".
🕴 FBI, DHS Warn of 'Likely' Disinformation Campaigns About Election Results 🕴

Nation-state actors and cybercriminals could wage cyberattacks and spread false information about the integrity of the election results while officials certify the final vote counts.

📖 Read

via "Dark Reading: ".
CISA: LokiBot Stealer Storms Into a Resurgence

The trojan has seen a big spike in activity since August, the Feds are warning.

📖 Read

via "Threatpost".
Critical Industrial Flaws Pose Patching Headache For Manufacturers

When it comes to patching critical flaws, industrial firms face various challenges - with some needing to shut down entire factories in order to apply updates.

📖 Read

via "Threatpost".
🔐 How to combat cyber threats amid the shift to remote working 🔐

Some 85% of CISOs surveyed by Netwrix revealed that they sacrificed cybersecurity to quickly set up employees to work remotely.

📖 Read

via "Security on TechRepublic".
🕴 Making the Case for Medical Device Cybersecurity 🕴

With an increasing number of Internet-connected medical devices in use to manage diabetes, protection against a variety of wireless network attacks could very well be a matter of life and death for patients.

📖 Read

via "Dark Reading: ".
🕴 My Journey Toward SAP Security 🕴

When applications are critical to the business's core functions, the CISO and their staff better get the security right.

📖 Read

via "Dark Reading: ".
🕴 Microsoft's Azure Defender for IoT Uses CyberX Tech 🕴

Azure Defender for IoT is built to help IT and OT teams discover IoT and OT assets, identify critical flaws, and detect malicious behavior.

📖 Read

via "Dark Reading: ".
🔐 How cyberattacks are targeting video gamers and companies 🔐

Game players are affected by phishing campaigns, while gaming companies are getting hit by DDoS attacks, says Akamai.

📖 Read

via "Security on TechRepublic".
🔐 Cybersecurity Perception Study shows increasing admiration for those in the profession 🔐

The study by (ISC)² also finds a global shortage of 4.07 million.

📖 Read

via "Security on TechRepublic".
Gamer Credentials Now a Booming, Juicy Target for Hackers

Credential abuse drives illicit market for in-game rare skins, special weapons and unique tools.

📖 Read

via "Threatpost".
🕴 India's Cybercrime and APT Operations on the Rise 🕴

Growing geopolitical tensions with China in particular are fueling an increase in cyberattacks between the two nations, according to IntSights.

📖 Read

via "Dark Reading: ".
🔏 Shopify Acknowledges Insider Breach of 200 Stores 🔏

A breach at the popular e-commerce site was linked back to two "rogue" support team employees.

📖 Read

via "Subscriber Blog RSS Feed ".
🕴 Google Cloud Debuts Threat-Detection Service 🕴

Lockdown economics are driving a threat-intelligence business boom. Chronicle Detect is Google's answer to monitoring so much log data created by the distributed workforce.

📖 Read

via "Dark Reading: ".