πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Unpatched Kernel-Level Vuln in IBM Security Tool for Apple MacOS Revealed πŸ•΄

Researchers disclose signedness bug in driver used by IBM Trusteer Rapport endpoint security tool after IBM fails to deliver timely patch.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Business Metrics Security Pros Need to Know πŸ•΄

These days, security has to speak the language of business. These KPIs will get you started.

πŸ“– Read

via "Dark Reading: ".
<b>&#9000; Serial Swatter and Stalker Mir Islam Arrested for Allegedly Dumping Body in River &#9000;</b>

<code>A 22-year-old man convicted of cyberstalking and carrying out numerous bomb threats and swatting attacks β€” including a 2013 swatting incident at my home β€” was arrested Sunday morning in the Philippines after allegedly helping his best friend dump the body of a housemate into a local river.</code><code>Media</code><code>Suspects Troy Woody Jr. (left) and Mir Islam, were arrested in Manila this week for allegedly dumping the body of Woody’s girlfriend in a local river. Image:  Manila Police Dept.</code><code>Police in Manila say 22-year-old U.S citizens Mir Islam and Troy Woody Jr., 21, booked an Uber to pick them up at Woody’s condominium in Mandaluyong City, and when the driver arrived the two men stuffed a large box into the trunk of the vehicle.</code><code>According to the driver, Islam and Woody asked to be driven to a nearby shopping mall, but told the driver along the way to stop at a compound near the Pasig River in Manila, where the two men allegedly dumped the box before getting back in the Uber.</code><code>The Inquirier reports that authorities recovered the box and identified the victim as Tomi Michelle Masters, 23, also a U.S. citizen from Indiana who was reportedly dating Woody and living in the same condo. Masters’ Instagram profile states that she was in a relationship with Woody.</code><code>Brooklyn, NY native Islam, a.k.a. β€œJosh the God,” has a long rap sheet for computer-related crimes. He briefly rose to Internet infamy as one of the core members of UGNazi, an online mischief-making group that claimed credit for hacking and attacking a number of high-profile Web sites.</code><code>On June 25, 2012, Islam and nearly two-dozen others were caught up in an FBI dragnet dubbed Operation Card Shop. The government accused Islam of being a founding member of carders[dot]org β€” a credit card fraud forum β€” trafficking in stolen credit card information, and possessing information for more than 50,000 credit cards.</code><code>Media</code><code>JoshTheGod’s (Mir Islam’s ) Twitter feed, in April 2012 warning fellow carding forum carderprofit members that the forum was being run by the FBI.</code><code>In June 2016, Islam was sentenced to a year in prison for an impressive array of crimes, including stalking people online and posting their personal data on the Internet. Islam also pleaded guilty to reporting phony bomb threats and fake hostage situations at the homes of celebrities and public officials (as well as this author).</code><code>At that 2016 sentencing, Islam’s lawyer argued that his client suffered from multiple psychological disorders, and that he and his co-conspirators orchestrated the swattings of a sense of β€œanarchic libertarianism.”</code><code>Islam was let out of prison under supervised release before serving the whole sentence, but soon was back inside after violating the terms of his release. Earlier this year, Islam filed a typosquatting lawsuit from prison that named Woody Jr. In that bizarre handwritten complaint (PDF), Islam refers to Woody variously as β€œTJ” and β€œJosh,” and says the two men were best friends and have known each other for eight years.</code><code>Media</code><code>An anti-cybersquatting domain dispute filed by Mir Islam earlier this year while in jail. In it, Islam refers to Woody as β€œTJ” and says the two have been best friends for years.</code><code>Troy Woody Jr. describes himself as an β€œearly crypto investor,” but sources say Woody β€” like Islam β€” was a core member of the UGNazi group who went by the nicknames β€œMrOsama,” and β€œEverlife.” His Instagram profile suggests he was in a relationship with Ms. Masters. Both are pictured in the first of the three large photos below, taken from Woody’s Instagram account.</code><code>Media</code><code>The Instagram profile of Troy Woody Jr., a.k.a. β€œtitled,” and β€œMrOsama,” one of two Americans arrested today for allegedly dumping a…
❌ 2018: A Banner Year for Breaches ❌

A look back at the blizzard of breaches that made up 2018.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ San Diego School District Data Breach Hits 500k Students ❌

A phishing attack led to the data breach of students' social security numbers, addresses, and more.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Critical Bug Patched in Schneider Electric Vehicle Charging Station ❌

Vulnerability in electric car charging stations could allow attackers to compromise devices.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ 2019: The Year Ahead in Cybersecurity ❌

What are the top cyber trends to watch out for in 2019? Here's what we're hearing.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Top 2018 Security and Privacy Stories ❌

The top cybersecurity and privacy trends that biggest impact in 2018.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 6 Ways to Anger Attackers on Your Network πŸ•΄

Because you can't hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead.

πŸ“– Read

via "Dark Reading: ".
❌ 19K Orange Livebox Modems Open to Attack ❌

A simple flaw allows attackers to derive WiFi credentials with little effort.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” How to secure your Ubuntu 18.04 Desktop installation with Uncomplicated Firewall πŸ”

Looking for more security on your Ubuntu 18.04 desktops? You can't go wrong with enabling the firewall on the Ubuntu Desktop.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 3 Steps for Cybersecurity Leaders to Bridge the Gender Equality Gap πŸ•΄

By encouraging female participation through education and retaining this interest through an inclusive culture and visible role models, we can begin to close the skill and gender gap in cybersecurity.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-0724

Cross-site scripting (XSS) vulnerability in Q'center Virtual Appliance 1.8.1014 and earlier versions could allow remote attackers to inject Javascript code in the compromised application, a different vulnerability than CVE-2018-0723.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-0723

Cross-site scripting (XSS) vulnerability in Q'center Virtual Appliance 1.8.1014 and earlier versions could allow remote attackers to inject Javascript code in the compromised application, a different vulnerability than CVE-2018-0724.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Spending Spree: What's on Security Investors' Minds for 2019 πŸ•΄

Cybersecurity threats, technology, and investment trends that are poised to dictate venture capital funding in 2019.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attackers Use Google Cloud to Target US, UK Banks πŸ•΄

Employees at financial services firms hit with an email attack campaign abusing a Google Cloud storage service.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-11742

NEC Univerge Sv9100 WebPro 6.00.00 devices have Cleartext Password Storage in the Web UI.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-11741

NEC Univerge Sv9100 WebPro 6.00.00 devices have Predictable Session IDs that result in Account Information Disclosure via Home.htm?sessionId=#####&GOTO(8) URIs.

πŸ“– Read

via "National Vulnerability Database".
❌ FTC Warns of Netflix Phishing Scam Making Rounds ❌

The scam targets Netflix users and asks for payment information.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Toxic Data: How 'Deepfakes' Threaten Cybersecurity πŸ•΄

The joining of 'deep learning' and 'fake news' makes it possible to create audio and video of real people saying words they never spoke or things they never did.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 2018: The Year Machine Intelligence Arrived in Cybersecurity πŸ•΄

Machine intelligence, in its many forms, began having a significant impact on cybersecurity this year - setting the stage for growing intelligence in security automation for 2019.

πŸ“– Read

via "Dark Reading: ".