πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ The APT Name Game: How Grim Threat Actors Get Goofy Monikers ❌

How do advanced persistent threat groups such as Double Secret Octopus and Anchor Panda get their ridiculous names?

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Half of IoT devices let down by vulnerable apps ⚠

Half of the apps used to control a range of Internet of Things devices are insecure in a variety of ways, researchers found.

πŸ“– Read

via "Naked Security".
⚠ Home DNA kit company says it’s working with the FBI ⚠

FamilyTreeDNA has disclosed that it's opened up more than 1m DNA profiles to the FBI to help find suspects of violent crime.

πŸ“– Read

via "Naked Security".
❌ Remote Desktop Protocol Clients Rife with Remote Code-Execution Flaws ❌

Several flaws in both open-source RDP clients and in Microsoft's own proprietary client make it possible for a malicious RDP server to infect a client computer – which could then allow for an intrusion into the IT network as a whole.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Black Hat USA 2019 Offers a Boatload of New Training Opportunities πŸ•΄

Led by top infosec talent, these cutting-edge courses are an efficient way to get practical, hands-on training in everything from blockchain security to machine learning.

πŸ“– Read

via "Dark Reading: ".
❌ EU Recalls Children’s Smartwatch That Leaks Location Data ❌

The children's smartwatch allows bad actors to track their location and communicate with them, according to the alert.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Taming the Wild, West World of Security Product Testing πŸ•΄

The industry has long needed an open, industry-standard testing framework. NetSecOPEN is working to make that happen.

πŸ“– Read

via "Dark Reading: ".
❌ Google Patches Critical .PNG Image Bug ❌

Eleven critical bugs will be patched as part of the February Android Security Bulletin.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Why your business needs to work with the government to fight cyber warfare πŸ”

The US government will not be able to mitigate a cyber-enabled economic warfare attack without help from the private sector, according to a report from FDD and the Chertoff Group.

πŸ“– Read

via "Security on TechRepublic".
⚠ Ep. 018 – Home invasions, snoopy apps and Android versus iOS [PODCAST] ⚠

Here's the latest Naked Security podcast - give it a listen!

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2017-1202

IBM BigFix Compliance 1.7 through 1.9.91 (TEMA SUAv1 SCA SCM) is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 123677.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-1200

IBM BigFix Compliance 1.7 through 1.9.91 (TEMA SUAv1 SCA SCM) does not validate, or incorrectly validates, a certificate.This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host. IBM X-Force ID: 123675.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-1198

IBM BigFix Compliance 1.7 through 1.9.91 (TEMA SUAv1 SCA SCM) stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 123673.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-1177

IBM BigFix Compliance 1.7 through 1.9.91 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 123429.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-1000282

Haraka version 2.8.8 and earlier comes with a plugin for processing attachments for zip files. Versions 2.8.8 and earlier can be vulnerable to command injection.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ No Sign of 'Material' Nation-State Actor Impact on 2018 US Midterms πŸ•΄

That's the conclusion of a classified postmortem report sent to the White House yesterday by Acting Attorney General and DHS Secretary.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Over 59K Data Breaches Reported in EU Under GDPR πŸ•΄

In addition, 91 reported fines have been imposed since the regulation went into effect last May.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Mitigating the Security Risks of Cloud-Native Applications πŸ•΄

While containers can create more secure application development environments, they also introduce new security challenges that affect security and compliance.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybercriminals Exploit Gmail Feature to Scale Up Attacks πŸ•΄

Criminals are taking advantage of Gmail's 'dots don't matter' feature to set up multiple fraudulent accounts on websites, using variations of the same email address, Agari says.

πŸ“– Read

via "Dark Reading: ".
❌ IoT Scale Flaws Enable Denial of Service, Privacy Issues ❌

Flaws in this connected smart scale might give the diet-challenged a legitimate reason to be nervous about using this vulnerable IoT device.

πŸ“– Read

via "Threatpost | The first stop for security news".