πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ New Xbash Malware a Cocktail of Malicious Functions πŸ•΄

The new malware tool targeting Windows and Linux systems combines cryptomining, ransomware, botnet, and self-propagation capabilities.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-2872

Insufficient security checks exist in the recovery procedure used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A HTTP request can allow for a user to perform a firmware upgrade using a crafted image. Before any firmware upgrades in this image are flashed to the device, binaries as well as arguments to shell commands contained in the image are executed with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-2857

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-2856

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-2854

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

πŸ“– Read

via "National Vulnerability Database".
⚠ State Department scores an F on 2FA security ⚠

Senators have discovered that the State Department is breaking the law by not using multi-factor authentication in its emails.

πŸ“– Read

via "Naked Security".
⚠ 91 β€œchild friendly” Android apps accused of exploitation ⚠

New Mexico's AG filed a lawsuit accusing a popular app maker, plus Google's and Twitter's ad platforms, of illegally collecting kids' data.

πŸ“– Read

via "Naked Security".
⚠ Hackers selling research phished from universities on WhatsApp ⚠

Millions of documents have been stolen from top UK universities and are being sold over WhatsApp for as little as Β£2.

πŸ“– Read

via "Naked Security".
❌ Insiders Continue to be Data Theft’s Best Friend ❌

The enemy within the enterprise is often employees who are either malicious or unwittingly allowing attackers inside a protected network.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Overhauling the 3 Pillars of Security Operations πŸ•΄

Modern apps and the cloud mean that organizations must now rethink older security practices.

πŸ“– Read

via "Dark Reading: ".
❌ Dangerous Pegasus Spyware Has Spread to 45 Countries ❌

The malicious spyware has also been found in use in countries known for targeting human rights.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Android Security Bulletin September 2018: What you need to know πŸ”

Another month where Android finds itself with a mixture of Critical and High vulnerabilities. Jack Wallen offers highlights.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ GovPayNow Leak of 14M+ Records Dates Back to 2012 πŸ•΄

Thousands of US state and local governments use the service to process online payments for everything from traffic tickets to court fines.

πŸ“– Read

via "Dark Reading: ".
πŸ” Oops! Google accidentally changed the battery settings for a bunch of Android users πŸ”

The battery saver feature was turned on as an 'internal experiment,' which Google has since rolled back.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Websites are attacked 58 times a day, even when patched properly πŸ”

More than half (55%) of malware infected sites were running on their latest core versions when they were attacked, according to a recent SiteLock report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Symantec Offers Free Website Security Services for Midterm Elections πŸ•΄

Security vendor offers US election jurisdictions its Project Dolphin phishing/website spoofing-detection service and security resources.

πŸ“– Read

via "Dark Reading: ".
❌ State Government Online Payment Service Exposes 14M Customers ❌

Outdated security practices made it simple to access other people's receipts for everything from traffic tickets to paying bail.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” The top 11 phishing email subject lines SMBs should look out for πŸ”

Phishing is the biggest threat facing SMBs, according to the 2018 Webroot SMB Pulse Report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Top 5 Security Threats & Mitigations for Industrial Networks πŸ•΄

While vastly different than their IT counterparts, operational technology environments share common risks and best practices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ IoT Threats Triple Since 2017 πŸ•΄

Rapidly evolving malware is posing an ever-greater threat to the IoT - and business users of the Internet.

πŸ“– Read

via "Dark Reading: ".
⚠ Intel releases firmware update for ME flaw ⚠

It’s only September and yet 2018 is well on its way to being remembered as the year of fixing flaws we didn’t realise were possible in hardware we’d never heard of.

πŸ“– Read

via "Naked Security".