πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Getting Over the Security-to-Business Communication Gap in DevSecOps πŸ•΄

Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Navigating the Asia-Pacific Threat Landscape: Experts Dive In πŸ•΄

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.

πŸ“– Read

via "Dark Reading: ".
❌ Ring’s Flying In-Home Camera Drone Escalates Privacy Worries ❌

Privacy fears are blasting off after Amazon's Ring division unveiled the new Always Home Cam, a smart home security camera drone.

πŸ“– Read

via "Threatpost".
❌ Industrial Cyberattacks Get Rarer but More Complex ❌

The first half of 2020 saw decreases in attacks on most ICS sectors, but oil/gas firms and building automation saw upticks.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Things to Know About the Microsoft 'Zerologon' Flaw πŸ•΄

Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns.

πŸ“– Read

via "Dark Reading: ".
❌ FortiGate VPN Default Config Allows MitM Attacks ❌

The client's default configuration for SSL-VPN has a certificate issue, researchers said.

πŸ“– Read

via "Threatpost".
❌ Bug Bounty FAQ: Top Questions, Expert Answers ❌

Four leading voices in the bug bounty community answer frequently asked questions from bounty hunters, companies and curious cybersecurity professionals.

πŸ“– Read

via "Threatpost".
β€Ό CVE-2020-25827 β€Ό

An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25812 β€Ό

An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25814 β€Ό

In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.

πŸ“– Read

via "National Vulnerability Database".
⚠ Naked Security Live – β€œSMS scams: keep yourself and your family safe!” ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
πŸ•΄ MFA-Minded Attackers Continue to Figure Out Workarounds πŸ•΄

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Safeguarding Schools Against RDP-Based Ransomware πŸ•΄

How getting online learning right today will protect schools, and the communities they serve, for years to come.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 9 Tips to Prepare for the Future of Cloud & Network Security πŸ•΄

Cloud and network security analysts outline trends and priorities businesses should keep top of mind as they grow more reliant on cloud.

πŸ“– Read

via "Dark Reading".
⚠ REvil ransomware crew dangles $1,000,000 cybercrime carrot ⚠

When a company pays a multimillion dollar ransomware blackmail demand, where do you think the money goes?

πŸ“– Read

via "Naked Security".
❌ Joker Trojans Flood the Android Ecosystem ❌

September saw dozens of Joker malware variants hitting Google Play and third-party app stores.

πŸ“– Read

via "Threat Post".
πŸ›  Sifter 10_r2 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Read

via "Packet Storm Security".
🦿 How to install common security tools via Homebrew on a Mac 🦿

We'll guide you through the process of using Homebrew package manager to install common security tools on macOS computers to assess and aid in hardening devices on your network.

πŸ“– Read

via "Tech Republic".
❌ Universal Health Services Ransomware Attack Impacts Hospitals Nationwide ❌

The Ryuk ransomware is suspected to be the culprit.

πŸ“– Read

via "Threat Post".
πŸ” Ransomware Reportedly Behind Nationwide UHS Hospital Outage πŸ”

The full scope of the incident isn't yet known but as a result, many facilities have been left without access to computer systems.

πŸ“– Read

via "Digital Guardian".
❌ Mac, Linux Users Now Targeted by FinSpy Variants ❌

FinSpy has returned in new campaigns targeting dissident organizations in Egypt - and researchers uncovered new samples of the spyware targeting macOS and Linux users.

πŸ“– Read

via "Threat Post".