πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-12389

Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12388

Mozilla developers and community members reported memory safety bugs present in Firefox 62. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Solving Security: Repetition or Redundancy? πŸ•΄

To effectively defend against today's risks and threats, organizations must examine their failings as well as their successes.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Turkish Group Using Phishing Emails to Hijack Popular Instagram Profiles πŸ•΄

In some cases, attackers have demanded ransom, nude photos/videos of victims in exchange for stolen account, Trend Micro says.

πŸ“– Read

via "Dark Reading: ".
⚠ The β€œMomo challenge” – why it’s time to stop the hype [VIDEO] ⚠

What's the real deal with the "Momo challenge"?

πŸ“– Read

via "Naked Security".
πŸ” Using your Office 365 Secure Score πŸ”

Office 365, Microsoft 365 and the Security Graph are coming together at last.

πŸ“– Read

via "Security on TechRepublic".
⚠ Dow Jones Watchlist of risky businesses exposed on public server ⚠

A company with access to the Dow Jones Watchlist of risky people and businesses left it on a public AWS server without a password.

πŸ“– Read

via "Naked Security".
⚠ Disgruntled dev blames crypto-wallet for losing cryptocoins ⚠

Warith Al Maawali is blaming wallet vendor Coinomi for the loss of $65,000 in bitcoin. Coinomi countered by blaming him for blackmail.

πŸ“– Read

via "Naked Security".
⚠ For sale: iPhone hacking tool, one previous (not very careful) owner ⚠

At $100, the old-gen iPhone encryption-cracking tools are a bargain to hackers looking to pick up leftover forensics or police Wi-Fi data.

πŸ“– Read

via "Naked Security".
⚠ Data-tracking Chrome flaw triggered by viewing PDFs ⚠

Researchers have spotted an unusual β€˜trackware’ attack triggered by a viewing a PDF inside the Chrome browser.

πŸ“– Read

via "Naked Security".
πŸ•΄ Encryption Offers Safe Haven for Criminals and Malware πŸ•΄

The same encryption that secures private enterprise data also provides security to malware authors and criminal networks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Pros Agree: Cloud Adoption Outpaces Security πŸ•΄

Oftentimes, responsibility for securing the cloud falls to IT instead of the security organization, researchers report.

πŸ“– Read

via "Dark Reading: ".
πŸ” Your systems, their profit: How IT rights can be abused for shadow mining of cryptocurrency πŸ”

IT professionals have the know-how and requisite privileges to deploy Bitcoin miners, and to cover their tracks. Could your organization be at risk?

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why ransomware attacks are growing more targeted πŸ”

Ransomware attacks in 2018 used Remote Desktop Protocol (RDP) as a main attack vector, according to a Webroot report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Security Experts, Not Users, Are the Weakest Link πŸ•΄

CISOs: Stop abdicating responsibility for problems with users - it's part of your job.

πŸ“– Read

via "Dark Reading: ".
❌ Necurs Botnet Evolves to Hide in the Shadows, with New Payloads ❌

Using an on-again, off-again strategy of C2 communication helps it hide from researchers.

πŸ“– Read

via "Threatpost".
⚠ The Momo Challenge urban legend – what on earth is going on? ⚠

Why you shouldn't worry about the Momo Challenge, and what we can learn from it.

πŸ“– Read

via "Naked Security".
πŸ•΄ Dow Jones Leak Exposes Watchlist Database πŸ•΄

The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 3/1 Edition πŸ”

News on a new data privacy bill, the FTC's latest $5.7M fine, and hacking Instagram profiles - catch up on the week's infosec news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Podcast: RSA Conference 2019 Preview ❌

The Threatpost team talks about the biggest cybersecurity stories, trends and research we'll see at RSA this year.

πŸ“– Read

via "Threatpost".