πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-11289

Data truncation during higher to lower type conversion which causes less memory allocation than desired can leads to a buffer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in versions IPQ8074, MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCA8081, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ New Arm Certification Aims to Secure IoT Devices πŸ•΄

A three-tier certification regimen shows adherence to the Platform Security Architecture.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2009-5155

In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.

πŸ“– Read

via "National Vulnerability Database".
⚠ Android nudges passwords closer to the cliff edge with FIDO2 support ⚠

Android's now on board with saying goodbye to passwords: more than a billion devices now support FIDO2.

πŸ“– Read

via "Naked Security".
⚠ Facebook apps secretly sending sensitive data back to the mothership ⚠

New York governor Andrew Cuomo has ordered an investigation into how Facebook is still allowing blabby apps to violate its privacy policies.

πŸ“– Read

via "Naked Security".
❌ The Dark Sides of Modern Cars: Hacking and Data Collection ❌

How features such as infotainment and driver-assist can give others a leg up on car owners.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Mozilla fears encryption law could turn its employees into insider threats ⚠

Mozilla has told the Australian government that its anti-encryption laws could turn its own employees into insider threats.

πŸ“– Read

via "Naked Security".
πŸ•΄ Your Employees Want to Learn. How Should You Teach Them? πŸ•΄

Security practitioners are most likely to stay at organizations that offer career development. Here are eight tips to consider as you plan your course of action.

πŸ“– Read

via "Dark Reading: ".
⚠ ICANN demands DNSSEC to combat DNS hijacking ⚠

DNS security is under serious threat from cyberattackers and domain overseer ICANN wants internet companies to do something about it.

πŸ“– Read

via "Naked Security".
πŸ•΄ Come to Black Hat Asia and See the Future of Cloud Security πŸ•΄

Whether you're looking to perfect your AWS auditing skills or practice the latest cloud exploitation techniques, next month's Black Hat Asia can help you achieve your goals.

πŸ“– Read

via "Dark Reading: ".
❌ Critical WinRAR Flaw Found Actively Being Exploited ❌

The spam campaign is being used to spread a malicious .exe file, taking advantage of a vulnerability in WinRAR which was patched in January.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ A 'Cloudy' Future for OSSEC πŸ•΄

As more organizations move to the public cloud and to DevOps and DevSecOps processes, the open source alternative for host-based intrusion detection is finding new uses.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ TurboTax Hit with Cyberattack, Tax Returns Compromised πŸ•΄

Officials report an unauthorized party obtained tax return data by using credentials obtained from an outside source.

πŸ“– Read

via "Dark Reading: ".
❌ High-Severity SHAREit App Flaws Open Files for the Taking ❌

SHAREit has fixed two flaws in its app that allowed bad actors to authenticate their devices and steal files from a victim's device.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Attackers Continue to Focus on Users, Well-Worn Techniques πŸ•΄

From WannaCry and phishing to credential stuffing and cryptomining, attackers relied on many oldie-but-goodie attacks in 2018, according to a pair of new security threat reports.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How Enterprises Are Developing Secure Applications πŸ•΄

IT security and application development are disparate processes that are increasingly coming together. Here's a look at how that's happening.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Kenna Security and Sonatype Partner for Open Source Vulnerability Intelligence πŸ•΄

The pairing brings Sonatype data on open source components to the Kenna Security platform.

πŸ“– Read

via "Dark Reading: ".
❌ β€˜Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud ❌

A known vulnerability combined with a weakness in bare-metal server reclamation opens the door to powerful, high-impact attacks.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 'Cloudborne': Bare-Metal Cloud Servers Vulnerable to Attack πŸ•΄

Firmware vulnerabilities provide direct access to server hardware, enabling attackers to install malware that can pass from customer to customer.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to cloud-enable Enpass Password Manager πŸ”

Learn how to combine Enpass and Dropbox into a perfect, cloud-ready password manager.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why AI and ML are not cybersecurity solutions--yet πŸ”

AI and ML are often touted as silver bullets, but real-world applications for the technology seem thin on the ground.

πŸ“– Read

via "Security on TechRepublic".