πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Drive away a Tesla today (even if it isn’t yours) ⚠

Raspberry Pi's processing power versus Tesla's Model X cryptography - victory for the little guy!

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-0715

Pivotal Cloud Foundry Elastic Runtime version 1.4.0 through 1.4.5, 1.5.0 through 1.5.11 and 1.6.0 through 1.6.11 is vulnerable to a remote information disclosure. It was found that original mitigation configuration instructions provided as part of CVE-2016-0708 were incomplete and could leave PHP Buildpack, Staticfile Buildpack and potentially other custom Buildpack applications vulnerable to remote information disclosure. Affected applications use automated buildpack detection, serve files directly from the root of the application and have a buildpack that matched after the Java Buildpack in the system buildpack priority when Java Buildpack versions 2.0 through 3.4 were present.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Key to Stealing a Tesla Model S πŸ•΄

A team of hackers finds it's possible to steal a Tesla Model S by cloning the key fob.

πŸ“– Read

via "Dark Reading: ".
❌ Millions of Records Exposed in Veeam Misconfigured Server ❌

Exposed data included names, emails addresses and IP addresses.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Bad Actors Sizing Up Systems Via Lightweight Recon Malware ❌

These stealthy downloaders initially infect systems and then only install additional malware on systems of interest.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Here's what happens during a social engineering cyber-attack πŸ”

BioCatch's VP Frances Zelazny explains each step of social engineering hacks, low-tech cyberattacks that have a big impact on business.

πŸ“– Read

via "Security on TechRepublic".
☒ Microsoft patches recent ALPC zero-day in September 2018 Patch Tuesday updates ☒

Microsoft engineers patch 62 vulnerabilities, including 17 rated 'Critical'

πŸ“– Read

via "Latest topics for ZDNet in Security".
πŸ•΄ Mirai, Gafgyt Botnets Resurface with New Tricks πŸ•΄

A new version of Mirai exploits the Apache Struts flaw linked to the Equifax breach, while Gafgyt targets an old flaw in SonicWall.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Patches Three Actively Exploited Bugs as Part of Patch Tuesday ❌

Microsoft's September Patch Tuesday release tackles three vulnerabilities actively being exploited in the wild.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Microsoft Patches 61 Vulns, One Under Active Attack πŸ•΄

CVE-2018-8440, which was publicly disclosed on Twitter in August, has already been used in a malware campaign.

πŸ“– Read

via "Dark Reading: ".
❌ Threatlist: Email Attacks Surge, Targeting Execs ❌

Overall, the number of email fraud attacks per targeted company rose 25 percent from the previous quarter (to 35 on average) and 85 percent from the year-ago quarter.

πŸ“– Read

via "The first stop for security news | Threatpost ".
☒ Judge rules cryptocurrency ICO scam case falls under securities law ☒

Judge rules that initial coin offerings are "securities" and SEC can go after ICO scammers for securities fraud under US securities laws.

πŸ“– Read

via "Latest topics for ZDNet in Security".
☒ Australia's Consumer Data Right rules to be shaped around banking ☒

With banking the first sector to be overhauled under the impending Consumer Data Right, the ACCC will be shaping its rules framework on the new data-sharing requirements of financial sector.

πŸ“– Read

via "Latest topics for ZDNet in Security".
☒ Publication of PoC in popular WordPress plugin leads to scans for vulnerable sites ☒

WordPress security firm Defiant reports "very noticeable uptick" in scans for vulnerable plugin installations.

πŸ“– Read

via "Latest topics for ZDNet in Security".
πŸ’‘ My Health Record needs to be compared to fax-based reality: AMA πŸ’‘

The Australian Medical Association has said privacy experts are comparing My Health Record with a utopian ideal, not a doctor's lived reality.

πŸ“– Read

via "Latest topics for ZDNet in Security".
πŸ’‘ Adobe patch update tackles six critical vulnerabilities in ColdFusion πŸ’‘

The worst vulnerabilities lead to arbitrary code execution.

πŸ“– Read

via "Latest topics for ZDNet in Security".
πŸ’‘ Data management firm Veeam mismanages own data, leaks 445m records πŸ’‘

The server was reportedly available for anyone to access and lacked any form of protection against intrusion.

πŸ“– Read

via "Latest topics for ZDNet in Security".
⚠ Vizio to send class notices through the TVs that spied on viewers ⚠

Millions of smart TVs may soon be forced to admit to viewers that they spied on them, and then sold their data.

πŸ“– Read

via "Naked Security".
πŸ’‘ Apricorn Aegis Secure Key 3NX: The best flash drive for business users πŸ’‘

Business users looking for a USB flash drive that offers built-in encryption and a broad range of storage capacities, all at an affordable price need look no further.

πŸ“– Read

via "Latest topics for ZDNet in Security".
πŸ’‘ OpenSSL 1.1.1 out with TLS 1.3 support and "complete rewrite" of RNG component πŸ’‘

TLS 1.3 brings speed improvements and better cryptography to OpenSSL, the most popular open source cryptography library on the market

πŸ“– Read

via "Latest topics for ZDNet in Security".
πŸ” Why behavioral biometrics are the next hot security technology πŸ”

Biometrics, from fingerprints to iris- and facial-recognition, are advancing, with behavioral biometrics quickly becoming the security access of choice, says BioCatch VP Frances Zelazny.

πŸ“– Read

via "Security on TechRepublic".