πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Man drives 3,300 miles to talk to YouTube about deleted video ⚠

It turns out that his wife deleted his "rambling", get-rich-quick video. The man was arrested for alleged threats.

πŸ“– Read

via "Naked Security".
πŸ•΄ 4 Reasons to Take an 'Inside Out' View of Security πŸ•΄

When you approach security from the inside out, you're protecting your data by determining the most vital applications and using a risk-based strategy, which focuses on the most valuable and vulnerable assets.

πŸ“– Read

via "Dark Reading: ".
❌ GlitchPOS Malware Peddled to Steal Credit Card Numbers ❌

A new malware targeting point of sale systems, GlitchPOS, has been spotted on a crimeware forum.

πŸ“– Read

via "Threatpost".
❌ Cisco Patches Critical β€˜Default Password’ Bug ❌

Vulnerability allows adversaries to access monitoring system used for gathering info on operating systems and hardware.

πŸ“– Read

via "Threatpost".
πŸ•΄ Businesses Increase Investments in AI and Machine Learning πŸ•΄

More than three-quarters of IT pros say they feel safer for having done so, according to a new report.

πŸ“– Read

via "Dark Reading: ".
πŸ” Businesses don't get how AI cybersecurity tools work, but plan to use them anyway πŸ”

Some 71% of businesses plan to use AI and machine learning in their security tools this year, though over half aren't sure what that tech really does, according to Webroot.

πŸ“– Read

via "Security on TechRepublic".
⚠ Serious Security: What we can all learn from #PiDay ⚠

Pi Day isn't just about circles or special numbers - there are some cybersecurity lessons in there, too, and here they are...

πŸ“– Read

via "Naked Security".
πŸ•΄ Join Your Peers at the Black Hat Asia Executive Summit πŸ•΄

There's still time to apply for Black Hat's focused high-level networking and knowledge-sharing event in Singapore next week!

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Prosecutors Investigate Facebook's Data-Sharing Deals πŸ•΄

The news follows a long, tumultuous period of scandal around Facebook and its privacy practices.

πŸ“– Read

via "Dark Reading: ".
πŸ” FTC Considering Making Changes to GLB Act’s Safeguards, Privacy Rule πŸ”

New amendments to the rules, proposed last week and largely based on the New York State Department of Financial Services’ Cybersecurity Regulation, would better protect customer information held by financial institutions.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2018-20801 (highcharts)

In js/parts/SvgRenderer.js in Highcharts JS before 6.1.0, the use of backtracking regular expressions permitted an attacker to conduct a denial of service attack against the SVGRenderer component, aka ReDoS.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Anomaly Detection Techniques: Defining Normal πŸ•΄

The challenge is identifying suspicious events in training sets where no anomalies are encountered. Part two of a two-part series.

πŸ“– Read

via "Dark Reading: ".
πŸ” ​Securing the mobile enterprise means thinking outside the VPN box πŸ”

As employees access clouds and apps untethered to corporate networks, managers must create new security architectures.

πŸ“– Read

via "Security on TechRepublic".
❌ Zero-Days in Counter-Strike Client Used to Build Major Botnet ❌

A full 39 percent of Counter-Strike 1.6 game servers on Steam were found to be malicious.

πŸ“– Read

via "Threatpost".
❌ IMAP-Based Attacks Compromising Accounts at β€˜Unprecedented Scale’ ❌

Attackers are increasingly using insecure legacy protocols, like IMAP, to bypass multi-factor authentication in password spraying campaigns.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-12215

Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12214

Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12213

Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12212

Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12211

Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-12210

Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".