πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Some Android apps are secretly sharing your data with Facebook ⚠

Apps have been secretly sharing usage data with Facebook, even when users are logged - or don’t have an account at all.

πŸ“– Read

via "Naked Security".
⚠ IoT weaknesses leave hot tub owners in deep water ⚠

It looks as if at least one hot tub maker has left robust security off the to-do list.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Ways to Beat Back BEC Attacks πŸ•΄

Don't assume your employees know how to spot business email compromises - they need some strong training and guidance on how to respond in the event of an attack.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security at the Speed of DevOps: Maturity, Orchestration, and Detection πŸ•΄

Container and microservices technologies, including the orchestrator Kubernetes, create an extraordinary opportunity to build infrastructure and applications that are secure by design.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Magecart Mayhem Continues in OXO Breach πŸ•΄

The home goods company confirmed users' data may have been compromised during multiple time frames over a two-year period.

πŸ“– Read

via "Dark Reading: ".
❌ Intel Patches High-Severity Privilege-Escalation Bugs ❌

Overall, the chip giant patched five vulnerabilities across an array of its products.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” WordPress users beware: These 10 plugins are most vulnerable to attacks πŸ”

WordPress vulnerabilities tripled over the past year, more than any other CMS, according to an Imperva report.

πŸ“– Read

via "Security on TechRepublic".
❌ The Promise and Peril of 5G ❌

As the hype at CES demonstrates, 5G is the newest and shiniest tech bauble out there: but security concerns loom.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Biometrics in 2019: Increased Security or New Attack Vector? ❌

Should we pump the brakes on the roll out of biometric security to first consider whether we are creating new vulnerabilities?

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ ThreatList: WordPress Vulnerabilities Tripled in 2018 ❌

Despite fewer plugins being added to Wordpress last year, the CMS saw an astounding tripling of vulnerabilities in its platform in 2018.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 3 basic things to know about your data, according to Xerox's CISO πŸ”

Dan Patterson interviews Xerox CISO Alissa Abdullah about protecting sensitive data from adversaries. They also discuss the recent Marriott hack, privacy, ransomware, machine learning, and IoT.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cutting Through the Jargon of AI & ML: 5 Key Issues πŸ•΄

Ask the tough questions before you invest in artificial intelligence and machine learning technology. The security of your enterprise depends on it.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ NCSC Launches Nation-State Cyber Threat Protection Program for Businesses πŸ•΄

National Counterintelligence and Security Center (NCSC) released free online security awareness materials for businesses to defend against nation-state hackers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Concerns Limit Remote Work Opportunities πŸ•΄

When companies limit the remote work options that they know will benefit the organization, security concerns are often to blame.

πŸ“– Read

via "Dark Reading: ".
❌ Google Play Boots 85 Malicious Adware Apps ❌

Once downloaded, the fake apps hide themselves on the victim’s device and continue to show a full-screen ad every 15 minutes.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ ICEPick-3PC: A Sophisticated Adware That Collects Data En Masse ❌

Researchers think an organized crime gang is running the massive campaigns, prepping for large-scale follow-on attacks on Android users.

πŸ“– Read

via "Threatpost | The first stop for security news".
ATENTIONβ€Ό New - CVE-2017-15428

Insufficient data validation in V8 builtins string generator could lead to out of bounds read and write access in V8 in Google Chrome prior to 62.0.3202.94 and allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-15405

Inappropriate symlink handling and a race condition in the stateful recovery feature implementation could lead to a persistance established by a malicious code running with root privileges in cryptohomed in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to execute arbitrary code via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-15404

An ability to process crash dumps under root privileges and inappropriate symlinks handling could lead to a local privilege escalation in Crash Reporting in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to perform privilege escalation via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-15403

Insufficient data validation in crosh could lead to a command injection under chronos privileges in Networking in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to execute arbitrary code via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-15402

Using an ID that can be controlled by a compromised renderer which allows any frame to overwrite the page_state of any other frame in the same process in Navigation in Google Chrome on Chrome OS prior to 62.0.3202.74 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".