πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Cybersecurity pros can't handle all the threat tasks alone, expert says 🦿

Having an AI tool to help can ease the burden on cybersecurity teams, which are struggling to keep up with constant and more serious threats.

πŸ“– Read

via "Tech Republic".
🦿 Cybersecurity: Blaming users is not the answer 🦿

A punitive approach toward employees reporting data breaches intensifies problems.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-12514 β€Ό

Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12513 β€Ό

Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12525 β€Ό

M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12511 β€Ό

Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12512 β€Ό

Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Cybersecurity Newbs Can Start Out on the Right Foot πŸ•΄

Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Speed of Digital Transformation May Lead to Greater App Vulnerabilities πŸ•΄

The fastest-moving industries are struggling to produce secure code, according to AppSec experts.

πŸ“– Read

via "Dark Reading".
❌ Amazon Kindle RCE Attack Starts with an Email ❌

The "KindleDrip" attack would have allowed attackers to siphon money from unsuspecting victims.

πŸ“– Read

via "Threat Post".
❌ Microsoft Edge, Google Chrome Roll Out Password Protection Tools ❌

The new tools on Chrome and Edge will make it easier for browser users to discover - and change - compromised passwords.

πŸ“– Read

via "Threat Post".
🦿 Microsoft President urges tech leaders to follow lessons from Apollo missions and "War Games" 🦿

President Brad Smith said that national security is threatened by the industry's inability to learn lessons from the past.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Intel Confirms Unauthorized Access of Earnings-Related Data πŸ•΄

News likely contributed to slide of over 9% in chipmaker's stock at one point Friday.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Comparing Different AI Approaches to Email Security πŸ•΄

Get to know the difference between "supervised" and "unsupervised" machine learning.

πŸ“– Read

via "Dark Reading".
πŸ›  AIDE 0.17 πŸ› 

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Logwatch 7.5.5 πŸ› 

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

πŸ“– Read

via "Packet Storm Security".
⚠ US administration adds β€œsubliminal” ad to White House website ⚠

Hiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!

πŸ“– Read

via "Naked Security".
πŸ•΄ How to Better Secure Your Microsoft 365 Environment πŸ•΄

Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments.

πŸ“– Read

via "Dark Reading".
⚠ Naked Security Live – Don’t let digital jokes turn into digital disasters ⚠

Here's the latest Naked Security Live video - watch and enjoy!

πŸ“– Read

via "Naked Security".
🦿 2021 predictions: Quantifying and prioritizing cyber and business risk 🦿

Every new year brings new challenges surrounding risk management. Learn how to protect your company and its assets with these tips from an industry insider.

πŸ“– Read

via "Tech Republic".
🦿 Analysts question viability of last-minute executive order from Trump on IaaS companies' foreign users 🦿

In response to the Solar Winds attack, the order forces cloud companies to keep the names, addresses, emails, credit card numbers, and more, any time cloud services are used.

πŸ“– Read

via "Tech Republic".