πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Chronicle Releases Chapter One: Backstory πŸ•΄

Google spinoff Alphabet rolls out a new cloud-based security data platform that ultimately could displace some security tools in organizations.

πŸ“– Read

via "Dark Reading: ".
❌ BSides SF 2019: Remote-Root Bug in Logitech Harmony Hub Patched and Explained ❌

Users of Logitech’s Harmony Hub get long-awaited answers about the critical bugs that left their home networks wide open to attack.

πŸ“– Read

via "Threatpost".
πŸ” Employees are the biggest risk to enterprise mobile device security, report says πŸ”

While mobile security risks have skyrocketed, 85% of organizations say they aren't doing enough to stay protected, according to a Verizon report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Apple gets bug for free, while world sees first $1m bug hunter ⚠

An Argentinian has garnered $1m in bug bounties, while a German researcher has given up on getting any bounty at all from Apple.

πŸ“– Read

via "Naked Security".
❌ RSAC 2019: Microsoft Zero-Day Allows Exploits to Sneak Past Sandboxes ❌

Researchers say that Microsoft won't issue a patch for the issue.

πŸ“– Read

via "Threatpost".
⚠ Windows IoT Core exploitable via ethernet ⚠

Microsoft's IoT version of Windows is vulnerable to an exploit that could give an attacker complete control of the system.

πŸ“– Read

via "Naked Security".
❌ RSAC 2019: Malicious Emailed URLs See Triple-Digit Increase ❌

At least 463,546 malicious URLs contained in the 28.4 million analyzed emails made it through to corporate in-boxes in Q4 of 2018.

πŸ“– Read

via "Threatpost".
❌ RSAC 2019: Picking Apart the Foreshadow Attack ❌

Raoul Strackx, one of the researchers who discovered the Foreshadow speculative execution vulnerability, talks at RSA about the Catch-22 issue when it comes to fixing speculative execution flaws.

πŸ“– Read

via "Threatpost".
⚠ Update now! Critical Adobe ColdFusion flaw now being exploited ⚠

Adobe has issued an urgent patch for a critical flaw in the ColdFusion web development platform it says is being exploited in the wild.

πŸ“– Read

via "Naked Security".
⚠ Comcast security nightmare: default β€˜0000’ PIN on everybody’s account ⚠

It didn't require an account PIN to switch carriers. Everybody uses 0000, it said, making it easier for customers… and phone hijackers.

πŸ“– Read

via "Naked Security".
πŸ•΄ Incident Response: Having a Plan Isn't Enough πŸ•΄

Data shows organizations neglect to review and update breach response plans as employees and processes change, putting data at risk.

πŸ“– Read

via "Dark Reading: ".
❌ RSAC 2019: Most Consumers Say β€˜No’ to Cumbersome Data Privacy Practices ❌

Consumer confidence in companies keeping their data safe is at an all-time low, but password hygiene and not reading EULAs and app permissions remain big problems.

πŸ“– Read

via "Threatpost".
πŸ•΄ Organizations Taking Less Time to Detect Breaches πŸ•΄

But by the time they became aware, attackers have been on their networks for more than six months, new 2018 data shows.

πŸ“– Read

via "Dark Reading: ".
❌ RSAC 2019: Joomla! Mail Flaw Exploited to Create Mass Phishing Infrastructure ❌

The Jmail Breaker attack leverages an old vulnerability in Joomla! along with a newly found flaw in the mail module.

πŸ“– Read

via "Threatpost".
πŸ•΄ Axonius' 'Unsexy' Tool Wins RSAC Innovation Sandbox πŸ•΄

Judges award top honor to new company solving an old, unsolved problem: asset discovery and management.

πŸ“– Read

via "Dark Reading: ".
⚠ Companies are flying blind on cybersecurity ⚠

IT managers are flying blind in the battle to protect their companies from cyber attacks, according to a new Sophos survey.

πŸ“– Read

via "Naked Security".
πŸ” The public sector is a cyberattack magnet, manual processes are to blame πŸ”

More than half (51%) of respondents said their security teams spend more time on manual processes than handling vulnerabilities, according to a Tenable and Ponemon report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Artificial Intelligence: The Terminator of Malware πŸ•΄

Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Questions to Ask While Buying a Connected Car πŸ•΄

Here are six questions to keep in mind when you walk into the showroom to buy a networked car.

πŸ“– Read

via "Dark Reading: ".
πŸ” Insider cyberthreats in government agencies hit all-time high, report says πŸ”

Untrained insiders and foreign governments create huge cybersecurity risks in government agencies, according to a SolarWinds report.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-15361

UltraVNC revision 1198 has a buffer underflow vulnerability in VNC client code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1199.

πŸ“– Read

via "National Vulnerability Database".