πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ ThreatList: Half of All Attacks Aim at Supply Chain ❌

Attackers these days want to β€˜own’ your entire system, including partners and suppliers.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-6049

Detcon Sitewatch Gateway, all versions without cellular, an attacker can edit settings on the device using a specially crafted URL.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-6047

Detcon Sitewatch Gateway, all versions without cellular, Passwords are presented in plaintext in a file that is accessible without authentication.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18364 (phpfk)

phpFK lite has XSS via the faq.php, members.php, or search.php query string or the user.php user parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Major Mobile Financial Apps Harbor Built-in Vulnerabilities πŸ•΄

A wide variety of financial services companies' apps suffer from poor programing practices and unshielded data.

πŸ“– Read

via "Dark Reading: ".
⚠ Patch Android now! April updates fixes three critical flaws ⚠

Android’s April update includes two critical CVE-level patches among a total of 11 affecting handsets running versions 7, 8, and 9.

πŸ“– Read

via "Naked Security".
⚠ 2m credit cards ripped off from restaurant chain, sold on the dark web ⚠

PoS malware affected some Buca di Beppo, Earl of Sandwich, Planet Hollywood, Chicken Guy!, Mixology and Tequila Taqueria locations.

πŸ“– Read

via "Naked Security".
⚠ Is your hard drive exposed online? ⚠

Over 13,500 internet-connected storage devices have been exposed online by users who didn't set passwords for them.

πŸ“– Read

via "Naked Security".
⚠ Researchers trick Tesla’s Autopilot into driving into oncoming traffic ⚠

They placed unobtrusive stickers that drivers wouldn't see but would fool autopilot into thinking the lane was veering off to the left.

πŸ“– Read

via "Naked Security".
πŸ” Why insider security threats are on the rise and so difficult to detect πŸ”

Some 73% of IT professionals said insider attacks have become more frequent in the past year, according to a Bitglass report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why businesses are at risk over poor data privacy practices πŸ”

Multiple data sources, data sharing agreements, and data inventory are some of the challenges of managing data privacy cited in a survey from Integris Software.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 6 Essential Skills Cybersecurity Pros Need to Develop in 2019 πŸ•΄

In a time of disruption in the security and tech worlds, cybersecurity professionals can't afford to become complacent - even in the face of a skills shortage.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Financial Firms Scrutinize Third-Party Supplier Risk πŸ•΄

But executives aren't confident in the accuracy of cybersecurity assessment data received from their vendors, a new study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Aqua Security Closes $62M in Funding πŸ•΄

Aqua Security Closes $62M in Funding

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Aqua Security Closes $62M in Funding πŸ•΄

Aqua Security Closes $62M in Funding

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Georgia Tech Cyberattack Exposes Data of 1.3 Million People πŸ•΄

Names, addresses, Social Security numbers, and birth dates may have been pilfered in the attack.

πŸ“– Read

via "Dark Reading: ".
πŸ” Permission bloat on iOS can lead to theft of sensitive data, study says πŸ”

Applications requesting access to photos for first-use setup retain that permission unless manually revoked, putting companies at risk, according to a Wandera report.

πŸ“– Read

via "Security on TechRepublic".
❌ OceanLotus APT Uses Steganography to Shroud Payloads ❌

The OceanLotus APT is using two new loaders which use steganography to read their encrypted payloads.

πŸ“– Read

via "Threatpost".
πŸ•΄ In Security, Programmers Aren't Perfect πŸ•΄

Software developers and their managers must change their perception of secure coding from being an optional feature to being a requirement that is factored into design from the beginning.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Chinese National Carries Malware Into Mar-a-Lago πŸ•΄

A Chinese woman arrested for entering the grounds of Mar-a-Lago under false pretenses was carrying electronic equipment holding malware.

πŸ“– Read

via "Dark Reading: ".
❌ How to Maximize the Value of Your Cybersecurity Investment ❌

Maximizing your security investment starts with hiring the right talent, harvesting data, spotting trends in logs and more.

πŸ“– Read

via "Threatpost".