πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Key Considerations & Best Practices for Establishing a Secure Remote Workforce πŸ•΄

Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-25262 β€Ό

PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/pages/delete/ URI: pages will be deleted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-2289 β€Ό

Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-2296 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Shared Objects Plugin 0.44 and earlier allows attackers to configure shared objects.

πŸ“– Read

via "National Vulnerability Database".
🦿 Buyers beware: Hackers poised to make Amazon Prime Day into a prime phishing day 🦿

Analysis of hundreds of millions of web pages found phishing and fraudulent sites using the Amazon brand and logos poised for big Prime Day sales, according to Bolster Research.

πŸ“– Read

via "Tech Republic".
❌ Microsoft Azure Flaws Open Admin Servers to Takeover ❌

Two flaws in Microsoft's cloud-based Azure App Services could have allowed server-side forgery request (SSFR) and remote code-execution attacks.

πŸ“– Read

via "Threat Post".
πŸ•΄ Kaspersky Researchers Spot Russia-on-Russia Cyber-Espionage Campaign πŸ•΄

Steganography-borne malware used to spy on industrial targets in Russia.

πŸ“– Read

via "Dark Reading".
πŸ•΄ US Election-Related Websites Vulnerable to Fraud, Abuse πŸ•΄

New research finds the vast majority of reputable news, political, and donor-oriented sites don't use registry locks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-5389 β€Ό

Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain an information disclosure vulnerability. Authenticated low privileged OMIMSCC users may be able to retrieve sensitive information from the logs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13344 β€Ό

An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2. Sessions keys are stored in plain-text in Redis which allows attacker with Redis access to authenticate as any user that has a session stored in Redis

πŸ“– Read

via "National Vulnerability Database".
🦿 Security pros: Cyber threats to industrial enterprises increase due to pandemic 🦿

86% polled said their organization made cybersecurity a priority during the COVID-19 crisis and implemented appropriate training for remote workers, according to a report.

πŸ“– Read

via "Tech Republic".
⚠ Naked Security Podcast – we’re back for Series 3! ⚠

Join us weekly for the Naked Security Podcast - back for Series 3 and available wherever good podcasts are found!

πŸ“– Read

via "Naked Security".
πŸ›  Zeek 3.2.2 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
⚠ 8 tips to tighten up your work-from-home network ⚠

You don't have to be an IT guru to beef up your cybersecurity at home. Sometimes it's enough to ask yourself, "Which bits can I turn off?"

πŸ“– Read

via "Naked Security".
❌ Cisco Fixes High-Severity Webex, Security Camera Flaws ❌

Three high-severity flaws exist in Cisco's Webex video conferencing system, Cisco’s Video Surveillance 8000 Series IP Cameras and Identity Services Engine.

πŸ“– Read

via "Threat Post".
🦿 How SMBs can better protect their data from cyberattacks 🦿

SMBs compromised by an effective cyberattack can not only lose data and suffer financially but go out of business entirely, says Infrascale.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Scale Up Threat Hunting to Skill Up Analysts πŸ•΄

Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-10816 β€Ό

Zoho ManageEngine Applications Manager 14780 and before allows a remote unauthenticated attacker to register managed servers via AAMRequestProcessor servlet.

πŸ“– Read

via "National Vulnerability Database".
πŸ” What is HIPAA Compliance? πŸ”

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Digital Guardian".
🦿 Cloud and remote work support strengthened US market performance 🦿

The IT outlook for 2021, top trends and guidance as the enterprise prepares for "the next normal," according to a new report from IDC.

πŸ“– Read

via "Tech Republic".
❌ RAINBOWMIX Apps in Google Play Serve Up Millions of Ad Fraud Victims ❌

Collectively, 240 fraudulent Android apps -- masquerading as retro game emulators -- account for 14 million installs.

πŸ“– Read

via "Threat Post".