πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Magecart Strikes Again, Siphoning Payment Info from Newegg ❌

The data breach, hard on the heels of the British Airways breach, shows that Magecart is quickly evolving and shows no signs of slowing down.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Turn the NIST Cybersecurity Framework into Reality: 5 Steps πŸ•΄

Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.

πŸ“– Read

via "Dark Reading: ".
πŸ” Account takeover attacks ramping up, leading to explosion of phishing πŸ”

ATO attacks steal a person's credentials and use them to send emails from their account, according to a recent Barracuda Networks report.

πŸ“– Read

via "Security on TechRepublic".
❌ Cisco Issues New Warning for 6-Month-Old Critical Bug in IOS XE ❌

Vulnerability allowed an unauthenticated remote attacker to log in to a device at the time the system initially boots up.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Turn the NIST Cybersecurity Framework into Reality: 5 Steps πŸ•΄

Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Japanese Cryptocurrency Exchange Hit with $60M Theft πŸ•΄

The incident highlights a broader problem of poor security in cryptocurrency exchanges throughout the country.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 3 Drivers Behind the Increasing Frequency of DDoS Attacks πŸ•΄

What's causing the uptick? Motivation, opportunity, and new capabilities.

πŸ“– Read

via "Dark Reading: ".
⚠ Warning issued as Netflix subscribers hit by phishing attack ⚠

Netflix phishing scammers are at it again, sending emails that try to steal sensitive details from subscribers.

πŸ“– Read

via "Naked Security".
⚠ Bitcoin flaw could have allowed dreaded 51% takeover ⚠

The scenario was always hypothetical but the fact such a thing was even possible until this week has left some in the Bitcoin community feeling alarmed.

πŸ“– Read

via "Naked Security".
πŸ•΄ Executive Branch Makes Significant Progress As DMARC Deadline Nears πŸ•΄

The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.

πŸ“– Read

via "Dark Reading: ".
πŸ” You can now trade oil and wheat on the blockchain, as commodities hit the platform πŸ”

In an effort to increase transparency and prevent fraud, blockchain may be the next platform for trading goods.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Data Manipulation: How Security Pros Can Respond to an Emerging Threat πŸ•΄

Industry leaders are scrambling to address the issue, which will take new thinking to overcome.

πŸ“– Read

via "Dark Reading: ".
❌ Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution ❌

Microsoft said that it's working on a fix for a zero-day flaw in its JET Database Engine.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ US Approves Cyber Weapons Against Foreign Enemies πŸ•΄

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Security Training Hacks to Increase Cyber IQ Org-Wide πŸ•΄

Move beyond generic, annual security awareness training with these important tips.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-7203

gitolite before commit fa06a34 might allow local users to read arbitrary files in repositories via vectors related to the user umask when running gitolite setup.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4451

gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware πŸ•΄

Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.

πŸ“– Read

via "Dark Reading: ".
❌ Delphi Packer Looks for Human Behavior Before Deploying Payload ❌

Many different threat actors are using this crypting service/tool for their operations, possibly buying it from the developer itself.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Twitter Flaw Exposed Direct Messages To External Developers ❌

The company said it has issued a patch for the issue, which has been ongoing since May 2017.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” 10 signs you aren't cut out to be a cybersecurity specialist πŸ”

A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?

πŸ“– Read

via "Security on TechRepublic".