πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Executive Branch Makes Significant Progress As DMARC Deadline Nears πŸ•΄

The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.

πŸ“– Read

via "Dark Reading: ".
πŸ” You can now trade oil and wheat on the blockchain, as commodities hit the platform πŸ”

In an effort to increase transparency and prevent fraud, blockchain may be the next platform for trading goods.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Data Manipulation: How Security Pros Can Respond to an Emerging Threat πŸ•΄

Industry leaders are scrambling to address the issue, which will take new thinking to overcome.

πŸ“– Read

via "Dark Reading: ".
❌ Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution ❌

Microsoft said that it's working on a fix for a zero-day flaw in its JET Database Engine.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ US Approves Cyber Weapons Against Foreign Enemies πŸ•΄

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Security Training Hacks to Increase Cyber IQ Org-Wide πŸ•΄

Move beyond generic, annual security awareness training with these important tips.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-7203

gitolite before commit fa06a34 might allow local users to read arbitrary files in repositories via vectors related to the user umask when running gitolite setup.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4451

gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware πŸ•΄

Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.

πŸ“– Read

via "Dark Reading: ".
❌ Delphi Packer Looks for Human Behavior Before Deploying Payload ❌

Many different threat actors are using this crypting service/tool for their operations, possibly buying it from the developer itself.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Twitter Flaw Exposed Direct Messages To External Developers ❌

The company said it has issued a patch for the issue, which has been ongoing since May 2017.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” 10 signs you aren't cut out to be a cybersecurity specialist πŸ”

A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?

πŸ“– Read

via "Security on TechRepublic".
πŸ” 10 signs you aren't cut out to be a cybersecurity specialist πŸ”

A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The 'Opsec Fail' That Helped Unmask a North Korean State Hacker πŸ•΄

How Park Jin Hyok - charged by the US government for alleged computer crimes for the Sony, Bank of Bangladesh, WannaCry cyberattacks - inadvertently blew his cover via email accounts.

πŸ“– Read

via "Dark Reading: ".
❌ Critical Vulnerability Found in Cisco Video Surveillance Manager ❌

Cisco has patched vulnerability in its video surveillance manager software that could give an unauthenticated, remote attacker the ability to execute arbitrary commands on targeted systems.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” ProTip: Automate setting a firmware password on Apple computers πŸ”

Securing Mac computers means more than just protecting the data. Limiting the ways a user can gain access to a device--including bypassing the existing OS or resetting account passwords is easily enabled with a simple command.

πŸ“– Read

via "Security on TechRepublic".
❌ Podcast: Two Billion IoT Devices Still Vulnerable to BlueBorne Bug ❌

Up to two billion devices are still vulnerable to the BlueBorne IoT attack - and may not ever get a patch.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Monday review – the hot 19 stories of the week ⚠

From iOS security updates to Netflix phishing attacks, catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ iTunes is assigning you a β€˜trust score’ based on emails and phone calls ⚠

It's just a number to detect fraud, not a Black Mirror-esque score that's going to rate us all as social misfits unworthy of wedding invitations.

πŸ“– Read

via "Naked Security".
⚠ Police accidentally tweet bookmarks that reveal surveilled groups ⚠

The Massachusetts State Police (MSP) accidentally spilled some of its opsec onto Twitter last week, uploading a screenshot that revealed browser bookmarks.

πŸ“– Read

via "Naked Security".
⚠ App developers are STILL allowed to read your Gmails ⚠

Google is still allowing third-party developers access to access its users’ Gmail data, it said in a letter to Senators last week.

πŸ“– Read

via "Naked Security".