πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Thunderclap Flaws Shatter Peripheral Security ❌

Many machines, including almost all Apple laptops and desktops produced since 2011, are vulnerable to data exfiltration via weaponized peripherals.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” New detection method identifies cryptomining and other fileless malware attacks πŸ”

SentinelOne and Intel announced a new method to detect cryptomining and cryptojacking attacks using hardware-based detection technology.

πŸ“– Read

via "Security on TechRepublic".
❌ Cisco Patches High-Severity Webex Vulnerability For Third Time ❌

Third time's hopefully a charm for Cisco, which has patched a high-severity flaw once again in its Webex video conferencing platform.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Ring Doorbell Flaw Opens Door to Spying ❌

Researchers are urging Ring users to update to the latest version of the smart doorbell after a serious flaw triggered privacy concerns.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Card-Skimming Scripts Hide Behind Google Analytics, Angular ❌

The campaign is marked by a significant level of customization, with an β€œindividualized yet very consistent approach to every compromise.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Whose Line Is It? When Voice Phishing Attacks Get Sneaky πŸ•΄

Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is GLBA Compliance? Understanding the Data Protection Requirements of the Gramm-Leach-Bliley Act in 2019 πŸ”

Learn about what GLBA means for data protection and how to achieve GLBA compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Software vulnerabilities are becoming more numerous, less understood πŸ”

Operating a database of software vulnerabilities is a challenging undertaking, according to private vulnerability database operator Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Stay Ahead of the Curve by Using AI in Compliance πŸ•΄

Although human oversight is required, advanced technologies built on AI will become pivotal in building safer financial markets and a safer world.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Former Albany College Student Charged with Computer Damage πŸ•΄

Vishwanath Akuthota has been accused of using a 'USB killer device' to destroy dozens of computers, officials report.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ European Security Firm to Offer Free Hacking Toolkit πŸ•΄

CQTools suite includes both exploit kits and information-extraction functions, its developers say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Booter Owner Pleads Guilty in Federal Court πŸ•΄

Illinois man offered "DDoS for hire" services that hit millions of victims.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Intel Focuses on Data Center, Firmware Security Ahead of RSAC πŸ•΄

The new Intel SGX Card is intended to extend application memory security using Intel SGX in existing data center infrastructure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Persistent Attackers Rarely Use Bespoke Malware πŸ•΄

Study of the Bronze Union group-also known as APT27 or Emissary Panda-underscores how most advanced persistent threat (APT) groups now use administrative tools or slight variants of well-known tools.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ More Than 22,000 Vulns Were Disclosed in 2018, 27% Without Fixes πŸ•΄

As in previous years, input validation vulnerabilities accounted for a substantial proportion of total, Risk Based Security report shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ IoT, APIs, and Criminal Bots Pose Evolving Dangers πŸ•΄

A pair of reports reach similar conclusions about some of the threats growing in cyberspace and the industries likely to be most affected.

πŸ“– Read

via "Dark Reading: ".
⚠ US pushed Russian troll factory offline during US midterm elections ⚠

The US blocked internet access to Russian trolls who, they say, were trying to spread FUD.

πŸ“– Read

via "Naked Security".
⚠ US House and Senate debate new data privacy law ⚠

A steady stream of hair-raising revelations about the treatment of users' data by Facebook, et al. is pushing Congress to do *something.*

πŸ“– Read

via "Naked Security".
⚠ Thunderclap: Apple Macs at risk from malicious Thunderbolt peripherals ⚠

Researchers have revealed how malicious Thunderbolt and PCI Express (PCIe) peripherals could be used to compromise computers running macOS, Windows, Linux and FreeBSD.

πŸ“– Read

via "Naked Security".
πŸ•΄ Find your New Favorite Security Tool in the Black Hat Asia Arsenal πŸ•΄

From data exfiltration over FM radio to open-source cybersecurity training suites, Black Hat Asia's Arsenal offers live demos of the latest security tools.

πŸ“– Read

via "Dark Reading: ".
❌ Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers ❌

Cisco said that CVE-2019-1663, which has a CVSS score of 9.8, allows unauthenticated, remote attackers to execute arbitrary code.

πŸ“– Read

via "Threatpost | The first stop for security news".