πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ RSAC 2019: Joomla! Mail Flaw Exploited to Create Mass Phishing Infrastructure ❌

The Jmail Breaker attack leverages an old vulnerability in Joomla! along with a newly found flaw in the mail module.

πŸ“– Read

via "Threatpost".
πŸ•΄ Axonius' 'Unsexy' Tool Wins RSAC Innovation Sandbox πŸ•΄

Judges award top honor to new company solving an old, unsolved problem: asset discovery and management.

πŸ“– Read

via "Dark Reading: ".
⚠ Companies are flying blind on cybersecurity ⚠

IT managers are flying blind in the battle to protect their companies from cyber attacks, according to a new Sophos survey.

πŸ“– Read

via "Naked Security".
πŸ” The public sector is a cyberattack magnet, manual processes are to blame πŸ”

More than half (51%) of respondents said their security teams spend more time on manual processes than handling vulnerabilities, according to a Tenable and Ponemon report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Artificial Intelligence: The Terminator of Malware πŸ•΄

Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Questions to Ask While Buying a Connected Car πŸ•΄

Here are six questions to keep in mind when you walk into the showroom to buy a networked car.

πŸ“– Read

via "Dark Reading: ".
πŸ” Insider cyberthreats in government agencies hit all-time high, report says πŸ”

Untrained insiders and foreign governments create huge cybersecurity risks in government agencies, according to a SolarWinds report.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-15361

UltraVNC revision 1198 has a buffer underflow vulnerability in VNC client code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1199.

πŸ“– Read

via "National Vulnerability Database".
❌ RSA Conference: BEC Scammer Gang Takes Aim at Boy Scouts, Other Nonprofts ❌

A scammer ring dubbed Scarlet Widow has targeted nonprofits, schools and universities with an array of business email compromise (BEC) attacks over the past few months.

πŸ“– Read

via "Threatpost".
πŸ•΄ Lazarus Research Highlights Threat from North Korea πŸ•΄

A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to use the Microsoft Authenticator app on an Apple Watch πŸ”

You can turn to your trusty Apple Watch to log into websites that use your Microsoft Account. Here's how.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Care and Feeding of Your SIEM πŸ•΄

Six simple steps to mitigate the grunt work and keep your organization safe.

πŸ“– Read

via "Dark Reading: ".
πŸ” PHI of 45,000 Exposed Following Third Party Data Misuse πŸ”

The incident stems from an employee at a vendor working with the medical center improperly disclosing patient data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ RSA Conference 2019: How to Be Better, on Trust, AI and IoT ❌

Tuesday's keynotes kicking off RSA tackled both light and dark visions of the future, the imperative to become obsessed with trust, IoT and AI, and they even featured Helen Mirren and a flash mob.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybercriminals Target Young Gamers πŸ•΄

Deceptive and inappropriate tactics are prevalent in free gaming apps, according to a new report to be released at the RSA Conference.

πŸ“– Read

via "Dark Reading: ".
⚠ Facebook criticised for misuse of phone numbers provided for security ⚠

Facebook admits it's using numbers supplied for 2FA for more than security, and you can't turn it off.

πŸ“– Read

via "Naked Security".
πŸ•΄ Trust, or Lack of It, Is a Key Theme on RSAC Keynote Stage πŸ•΄

Neither machines nor humans might be entirely trustworthy, but the cooperation of the two might be the answer to issues of misinformation, deep fake videos, and other issues of trust, say security leaders.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-11793

When parsing a JSON payload with deeply nested JSON structures, the parser in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.1, 1.6.0 to 1.6.1, and 1.7.0 might overflow the stack due to unbounded recursion. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses πŸ•΄

Problem lies in the manner in which Word handles integer overflow errors in OLE file format, Mimecast says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Consumers Care About Privacy, but Not Enough to Act on It πŸ•΄

People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.

πŸ“– Read

via "Dark Reading: ".
⚠ Ep. 022 – Plaintext passwords, cryptocoin criminality and the Momo monstrosity [PODCAST] ⚠

Here's the latest episode of the Naked Security podcast - listen now!

πŸ“– Read

via "Naked Security".