πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” The top 11 phishing email subject lines SMBs should look out for πŸ”

Phishing is the biggest threat facing SMBs, according to the 2018 Webroot SMB Pulse Report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Top 5 Security Threats & Mitigations for Industrial Networks πŸ•΄

While vastly different than their IT counterparts, operational technology environments share common risks and best practices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ IoT Threats Triple Since 2017 πŸ•΄

Rapidly evolving malware is posing an ever-greater threat to the IoT - and business users of the Internet.

πŸ“– Read

via "Dark Reading: ".
⚠ Intel releases firmware update for ME flaw ⚠

It’s only September and yet 2018 is well on its way to being remembered as the year of fixing flaws we didn’t realise were possible in hardware we’d never heard of.

πŸ“– Read

via "Naked Security".
❌ ThreatList: Malware Samples Targeting IoT More Than Double in 2018 ❌

A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices – from Mikrotik routers to dishwashers.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Websites Attack Attempts Rose in Q2 πŸ•΄

New data shows hackers hit websites, on average, every 25 minutes.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-15844

In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing the function for writing device values into flash, uninitialized memory can be written to flash.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-15828

In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while accessing the keystore in LK, an integer overflow vulnerability exists which may potentially lead to a buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-15825

In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing a gpt update, an out of bounds memory access may potentially occur.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-15818

In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while loading a user application in qseecom, an integer overflow could potentially occur if the application partition size is rounded up to page_size.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Security Costs of Cloud-Native Applications πŸ•΄

More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack πŸ•΄

Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-6913

Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.3-rev28 allows remote attackers to inject arbitrary web script or HTML via the event attribute in a time tag.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-3912

Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.

πŸ“– Read

via "National Vulnerability Database".
⚠ How Facebook wants to protect political campaigners from hacking ⚠

The social network is trying to protect candidates, elected officials and their staff from "hackers and foreign adversaries".

πŸ“– Read

via "Naked Security".
πŸ” The 5 biggest blockchain myths, debunked πŸ”

Blockchain stands to revolutionize many industries, but many people are still unsure of how the distributed ledger technology underpinning Bitcoin works.

πŸ“– Read

via "Security on TechRepublic".
⚠ Years on, third party apps still exposing Grindr users’ locations ⚠

A third party app can use Grindr’s distance data to pinpoint a users location down to a room within a house.

πŸ“– Read

via "Naked Security".
⚠ Here we Mongo again! Millions of records exposed by insecure database ⚠

Another day, another poorly configured MongoDB database.

πŸ“– Read

via "Naked Security".
⚠ iOS 12 is here: these are the security features you need to know about ⚠

One year to the day after iOS 11 appeared, Apple yesterday released its replacement, iOS 12.

πŸ“– Read

via "Naked Security".
❌ XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins ❌

A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ A Hybrid Solution to Taming SOC Alert Overload ❌

Technology can free analysts from the burden of manual and tedious tasks so they can operate at the highest level of their abilities.

πŸ“– Read

via "The first stop for security news | Threatpost ".