πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Cloud Jacking: The Bold New World of Enterprise Cybersecurity πŸ•΄

Increased reliance on cloud computing puts more weight on robust authentication systems to protect data against hijackers.

πŸ“– Read

via "Dark Reading".
🦿 How to check for and stop DDoS attacks on Linux 🦿

Jack Wallen walks you through some of the steps you can take to check for and mitigate distributed denial of service attacks on a Linux server.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-8567 β€Ό

Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8569 β€Ό

Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, is automatically restarted by Kubernetes, and processes the same VolumeSnapshot custom resource after the restart, entering an endless crashloop. Only the volume snapshot feature is affected by this vulnerability. When exploited, users canΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t take snapshots of their volumes or delete the snapshots. All other Kubernetes functionality is not affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8554 β€Ό

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8570 β€Ό

Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8568 β€Ό

Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.

πŸ“– Read

via "National Vulnerability Database".
❌ Einstein Healthcare Network Announces August Breach ❌

Einstein is in violation of the the HHS 60-day breach notification rule, but unlikely to face penalty.

πŸ“– Read

via "Threat Post".
❌ SQL Server Malware Tied to Iranian Software Firm, Researchers Allege ❌

Researchers have traced the origins of a campaign - infecting SQL servers to mine cryptocurrency - back to an Iranian software firm.

πŸ“– Read

via "Threat Post".
🦿 2020 sees huge increase in records exposed in data breaches 🦿

The number of breaches may have fallen, but the number of exposed records hit a high not seen since 2005, says Risk Based Security.

πŸ“– Read

via "Tech Republic".
πŸ” EDPB Issues Draft Guidelines for Data Breach Notifications πŸ”

The guidelines are supposed to help data controllers when it comes to deciding how to handle data breaches and what factors to consider during risk assessment.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Attackers Leave Stolen Credentials Searchable on Google πŸ•΄

Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search.

πŸ“– Read

via "Dark Reading".
🦿 Google: How and when to change your password 🦿

If you've ever been tempted to change your Google account password, but weren't sure how, don't let that confusion stop you. Jack Wallen walks you through the process.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Breach Data Shows Attackers Switched Gears in 2020 πŸ•΄

Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DreamBus, FreakOut Botnets Pose New Threat to Linux Systems πŸ•΄

Researchers from Zscaler and Check Point describe botnets as designed for DDoS attacks, cryptocurrency mining, and other malicious purposes.

πŸ“– Read

via "Dark Reading".
🦿 These Microsoft tools help you reduce, remove or lock down admin access to improve security 🦿

The SolarWinds compromise means you can no longer put off privileged account management.

πŸ“– Read

via "Tech Republic".
🦿 Bosses are using monitoring software to keep tabs on working at home. Privacy rules aren't keeping up 🦿

Worker's union Prospect warned that the UK was at risk of 'sleepwalking into a world of surveillance' as more businesses turn to digital tools to keep tabs on remote workers.

πŸ“– Read

via "Tech Republic".
❌ Threat Actors Can Exploit Windows RDP Servers to Amplify DDoS Attacks ❌

Netscout researchers identify more than 14,000 existing servers that can be abused by β€˜the general attack population’ to flood organizations’ networks with traffic.

πŸ“– Read

via "Threat Post".
⚠ US administration adds β€œsubliminal” ad to White House website ⚠

Hiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!

πŸ“– Read

via "Naked Security".
🦿 The new Microsoft Edge browser will warn you if your password has been leaked online 🦿

The new Edge 88 browser includes tough new security features, including a password generator and a tool for monitoring whether your login details have been exposed to the dark web.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Why North Korea Excels in Cybercrime πŸ•΄

North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.

πŸ“– Read

via "Dark Reading".