πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ GAO Finds Deficiencies in Systems for Handling National Debt πŸ•΄

IT systems at the Bureau of the Fiscal Service and the Federal Reserve Bank show vulnerabilities that could lead them open to exploitation and breach.

πŸ“– Read

via "Dark Reading: ".
❌ Grindr Poses National Security Risk, U.S. Gov Says ❌

According to a report, Grindr's Chinese owners are selling the platform after concerns were raised about user data handling.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-2752

A potential security vulnerability caused by incomplete obfuscation of application configuration information was discovered in Tommy Hilfiger TH24/7 Android app versions 2.0.0.11, 2.0.1.14, 2.1.0.16, and 2.2.0.19. HP has no access to customer data as a result of this issue.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-2748

A potential security vulnerability caused by the use of insecure (http) transactions during login has been identified with early versions of the Isaac Mizrahi Smartwatch mobile app. HP has no access to customer data as a result of this issue.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18364

phpFK lite has XSS via the faq.php, members.php, or search.php query string or the user.php user parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Threat Hunting 101: Not Mission Impossible for the Resource-Challenged πŸ•΄

How small and medium-sized businesses can leverage native features of the operating system and freely available, high-quality hunting resources to overcome financial limitations.

πŸ“– Read

via "Dark Reading: ".
πŸ” Breaking Down Singapore's New Data Protection Trustmark Certification πŸ”

A new certification, launched by a division of the country's government this week, is designed to help organizations demonstrate "accountable and responsible data protection practices."

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 87% of Cloud Pros Say Visibility Masks Security πŸ•΄

The majority of cloud IT professionals find a direct link between network visibility and business value, new data shows.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-9166 (netiq_edirectory)

NetIQ eDirectory versions prior to 9.0.2, under some circumstances, could be susceptible to downgrade of communication security.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ New Shodan Tool Warns Organizations of Their Internet-Exposed Devices πŸ•΄

Shodan Monitor is free to members of the popular Internet search engine.

πŸ“– Read

via "Dark Reading: ".
❌ FTC Demands Broadband Providers Reveal Data Handling Practices ❌

The FTC is ordering seven companies - including AT&T, T-Mobile, Comcast and more - to outline what data they collect, what they use the data for, and how transparent they're being with consumers.

πŸ“– Read

via "Threatpost".
❌ Cisco Releases Flood of Patches for IOS XE and Small Business Routers ❌

The networking giant issued 27 patches impacting a wide range of its products running the ISO XE software.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Things To Know About the Ransomware That Hit Norsk Hydro πŸ•΄

In just one week, 'LockerGoga' has cost the Norwegian aluminum maker $40 million as it struggles to recover operations across Europe and North America.

πŸ“– Read

via "Dark Reading: ".
πŸ” Apple Pay: A cheat sheet πŸ”

Apple Pay is a mobile payment solution that's accepted by millions of retailers in various countries. This guide covers what you need to know to use Apple Pay.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-18365

The Management Console in GitHub Enterprise 2.8.x before 2.8.7 has a deserialization issue that allows unauthenticated remote attackers to execute arbitrary code. This occurs because the enterprise session secret is always the same, and can be found in the product's source code. By sending a crafted cookie signed with this secret, one can call Marshal.load with arbitrary data, which is a problem because the Marshal data format allows Ruby objects.

πŸ“– Read

via "National Vulnerability Database".
⚠ Firefox brings Lockbox password manager to Android’s autofill ⚠

All your saved Firefox passwords, now happily inserting themselves into your Android-verse!

πŸ“– Read

via "Naked Security".
⚠ Broadband providers told to explain how they handle consumer data ⚠

The FTC launched a broad inquiry to find out what data they collect, why, who they share it with, and how consumers can change or delete it.

πŸ“– Read

via "Naked Security".
πŸ•΄ Inside Cyber Battlefields, the Newest Domain of War πŸ•΄

In his Black Hat Asia keynote, Mikko Hypponen explored implications of "the next arms race" and why cyber will present challenges never before seen in warfare.

πŸ“– Read

via "Dark Reading: ".
⚠ Spyware app exposes private photos, hosting provider steps in ⚠

A hosting company has taken down a database owned by a mobile spying app after it was found displaying phone owners' intimate images online.

πŸ“– Read

via "Naked Security".
πŸ” Is crowdsourcing cybersecurity the answer to CISOs' problems? πŸ”

More than half of organizations now run bug bounty and other crowdsourced options to avoid data breaches, according to a Bugcrowd report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Employee mistakes and system errors are a larger threat to data security than hackers or insiders πŸ”

Employee mistakes were ranked as the highest risk in the 2019 Global Encryption Trends Study, though employee-owned devices on company networks deserve more security scrutiny.

πŸ“– Read

via "Security on TechRepublic".