πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-26050 β€Ό

SaferVPN for Windows Ver 5.0.3.3 through 5.0.4.15 could allow local privilege escalation from low privileged users to SYSTEM via a crafted openssl configuration file. This issue is similar to CVE-2019-12572.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27637 β€Ό

The R programming languageÒ€ℒs default package manager CRAN is affected by a path traversal vulnerability that can lead to server compromise. This vulnerability affects packages installed via the R CMD install cli command or the install.packages() function from the interpreter. Update to version 4.0.3

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-16146 β€Ό

Espressif ESP-IDF 2.x, 3.0.x through 3.0.9, 3.1.x through 3.1.7, 3.2.x through 3.2.3, 3.3.x through 3.3.2, and 4.0.x through 4.0.1 has a Buffer Overflow in BluFi provisioning in btc_blufi_recv_handler function in blufi_prf.c. An attacker can send a crafted BluFi protocol Write Attribute command to characteristic 0xFF01. With manipulated packet fields, there is a buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas πŸ•΄

It's past time to begin charting insider risk indicators that identify risky behavior and stop it in its tracks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security πŸ•΄

How two traditionally disparate security disciplines can be united.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New Tool Sheds Light on AppleScript-Obfuscated Malware πŸ•΄

The AEVT decompiler helped researchers analyze a cryptominer campaign that used AppleScript for obfuscation and will help reverse engineers focused on other Mac OS malware.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cartoon: Shakin' It Up at the Office πŸ•΄

And the winner of our December cartoon caption contest is ...

πŸ“– Read

via "Dark Reading".
πŸ•΄ SolarWinds Hack Lessons Learned: Finding the Next Supply Chain Attack πŸ•΄

The SolarWinds supply chain compromise won't be the last of its kind. Vendors and enterprises alike must learn and refine their detection efforts to find the next such attack.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Malware Developers Refresh Their Attack Tools πŸ•΄

Cisco analyzes the latest version of the LokiBot malware for stealing credentials, finding that its developers have added more misdirection and anti-analysis features.

πŸ“– Read

via "Dark Reading".
πŸ•΄ When It Comes To Security Tools, More Isn't More πŸ•΄

Organizations that focus on optimizing their tools, cutting down on tool sprawl, and taking a strategic approach to transitioning to the cloud are poised for success.

πŸ“– Read

via "Dark Reading".
πŸ•΄ IoT Vendor Ubiquiti Suffers Data Breach πŸ•΄

Cloud provider hosting "certain" IT systems attacked, company says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Intel's New vPro Processors Aim to Help Defend Against Ransomware πŸ•΄

The newest Intel Core vPro mobile platform gives PC hardware a direct role in detecting ransomware attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Russian Hacker Sentenced to 12 Years for Role in Breaches of JP Morgan, Others πŸ•΄

Crimes netted him $19 million overall.

πŸ“– Read

via "Dark Reading".
πŸ•΄ SolarWinds Hires Chris Krebs and Alex Stamos for Breach Recovery πŸ•΄

The former US cybersecurity official and former Facebook security chief will help SolarWinds respond to its recent attack and improve security.

πŸ“– Read

via "Dark Reading".
❌ Ethical Hackers Breach U.N., Access 100,000 Private Records ❌

Researchers informed organization of a flaw that exposed GitHub credentials through the organization’s vulnerability disclosure program.

πŸ“– Read

via "Threat Post".
❌ Europol Reveals Dismantling of β€˜Largest’ Underground Marketplace ❌

Europol announced a wide-ranging investigation that led to the arrest of the alleged DarkMarket operator and the seizure of the marketplace's infrastructure, including more than 20 servers.

πŸ“– Read

via "Threat Post".
πŸ•΄ Security Operations Struggle to Defend Value, Keep Workers πŸ•΄

Companies continue to value security operations centers but the economics are increasingly challenging, with high analyst turnover and questions raised over return on investment.

πŸ“– Read

via "Dark Reading".
πŸ›  Flawfinder 2.0.15 πŸ› 

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

πŸ“– Read

via "Packet Storm Security".
πŸ›  GNU Privacy Guard 2.2.27 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Read

via "Packet Storm Security".
🦿 CES 2021: All of the business tech news you need to know 🦿

Don't miss TechRepublic's CES 2021 coverage, which includes product announcements from Lenovo, Samsung, LG, and Dell about PCs, laptops, software, robots, monitors, and TVs.

πŸ“– Read

via "Tech Republic".
🦿 5 best languages for cloud engineers to learn 🦿

Whether you're trying to break into the role or are already a cloud engineer, these programming languages are a must for maintaining an edge over the competition.

πŸ“– Read

via "Tech Republic".