πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ When zombie malware leads to big-money ransomware attacks ⚠

SophosLabs investigates SystemBC, a malware utility for launching fileless malware attacks, including big-money ransomware.

πŸ“– Read

via "Naked Security".
🦿 How to protect your organization following the SolarWinds compromise 🦿

Whether your organization uses the vulnerable SolarWinds software or you want to defend yourself against similar exploits, here are recommendations from four sources.

πŸ“– Read

via "Tech Republic".
❌ 3M Users Targeted by Malicious Facebook, Insta Browser Add-Ons ❌

Researchers identify malware existing in popular add-ons for Facebook, Vimeo, Instagram and others that are commonly used in browsers from Google and Microsoft.

πŸ“– Read

via "Threat Post".
❌ Code42 Incydr Series: Bringing Shadow IT into the light with Code42 Incydr ❌

The massive shift to remote work has turbocharged the shadow IT problem.

πŸ“– Read

via "Threat Post".
❌ Cryptologists Crack Zodiac Killer’s 340 Cipher ❌

The Zodiac’s serial killer’s 340 cipher, which couldn’t be solved for 50 years, has been cracked by a remote team of mathematicians.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-22083 β€Ό

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function.

πŸ“– Read

via "National Vulnerability Database".
🦿 The worst bugs in the top programming languages 🦿

A heatmap shows PHP has the most flaws followed by C++, then Java, .Net, JavaScript, and Python in Veracode's annual security report.

πŸ“– Read

via "Tech Republic".
πŸ•΄ 51% of WFH Parents Say Children Have Accessed Work Accounts πŸ•΄

In addition, 14% of surveyed parents who are working from home say their children have access to their work devices, new data shows.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Rising to the Challenge: Perspectives from Security Leaders on 2020 and Beyond πŸ•΄

For those who work in the security industry 2020 has been a particularly challenging year. Chris Price talks to five industry leaders from different perspectives in the sector about how they coped with COVID and asks them to look forward to 2021.

πŸ“– Read

via "Dark Reading".
πŸ›  Zed Attack Proxy 2.10.0 Cross Platform Package πŸ› 

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Read

via "Packet Storm Security".
πŸ” DoppelPaymer Ransomware Gang Threatening Victims πŸ”

In a recent FBI note the agency outlined how DoppelPaymer ransomware attacks have impacted critical infrastructure - and the lengths the attackers have gone to get paid.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ CISA: SolarWinds Not the Only Initial Attack Vector in Massive Breach πŸ•΄

Agency says it has "evidence of additional initial access vectors" besides SolarWinds' Orion software.

πŸ“– Read

via "Dark Reading".
🦿 How to quickly encrypt text for Apple Mail 🦿

Jack Wallen shows you how easy it can be to encrypt text to be sent via email, using Apple Mail and the GPG Suite.

πŸ“– Read

via "Tech Republic".
❌ RubyGems Packages Laced with Bitcoin-Stealing Malware ❌

Two malicious software building blocks that could be baked into web applications prey on unsuspecting users.

πŸ“– Read

via "Threat Post".
❌ Air-Gap Attack Turns Memory Modules into Wi-Fi Radios ❌

Attack turns SDRAM buses into a Wi-Fi radio to leak data from air-gapped computers.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-15292 β€Ό

Lack of validation on data read from guest memory in IntPeGetDirectory, IntPeParseUnwindData, IntLogExceptionRecord, IntKsymExpandSymbol and IntLixTaskDumpTree may lead to out-of-bounds read or it could cause DoS due to integer-overflor (IntPeGetDirectory), TOCTOU (IntPeParseUnwindData) or insufficient validations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15294 β€Ό

Compiler Optimization Removal or Modification of Security-critical Code vulnerability in IntPeParseUnwindData() results in multiple dereferences to the same pointer. If the pointer is located in memory-mapped from the guest space, this may cause a race-condition where the generated code would dereference the same address twice, thus obtaining different values, which may lead to arbitrary code execution. This issue affects: Bitdefender Hypervisor Introspection versions prior to 1.132.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15293 β€Ό

Memory corruption in IntLixCrashDumpDmesg, IntLixTaskFetchCmdLine, IntLixFileReadDentry and IntLixFileGetPath due to insufficient guest-data input validation may lead to denial of service conditions.

πŸ“– Read

via "National Vulnerability Database".
❌ Police Vouch for Hacker Who Guessed Trump’s Twitter Password ❌

No charges for Dutch ethical hacker Victor Gevers who prosecutors say did actually access Trump’s Twitter account by guessing his password, β€œMAGA2020!” last October.

πŸ“– Read

via "Threat Post".
πŸ•΄ XDR 101: What's the Big Deal About Extended Detection & Response? πŸ•΄

Extended Detection and Response (XDR) could be the security management technology of your dreams...or not. What makes this technical 'evolution' so interesting to so many companies?

πŸ“– Read

via "Dark Reading".
🦿 How using tactical literacy makes it harder for cybercriminals to fool end users 🦿

End users just want to do their job, not become cybersecurity experts. When providing users with cybersecurity help, keep these tips in mind.

πŸ“– Read

via "Tech Republic".