πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-18364 (phpfk)

phpFK lite has XSS via the faq.php, members.php, or search.php query string or the user.php user parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Major Mobile Financial Apps Harbor Built-in Vulnerabilities πŸ•΄

A wide variety of financial services companies' apps suffer from poor programing practices and unshielded data.

πŸ“– Read

via "Dark Reading: ".
⚠ Patch Android now! April updates fixes three critical flaws ⚠

Android’s April update includes two critical CVE-level patches among a total of 11 affecting handsets running versions 7, 8, and 9.

πŸ“– Read

via "Naked Security".
⚠ 2m credit cards ripped off from restaurant chain, sold on the dark web ⚠

PoS malware affected some Buca di Beppo, Earl of Sandwich, Planet Hollywood, Chicken Guy!, Mixology and Tequila Taqueria locations.

πŸ“– Read

via "Naked Security".
⚠ Is your hard drive exposed online? ⚠

Over 13,500 internet-connected storage devices have been exposed online by users who didn't set passwords for them.

πŸ“– Read

via "Naked Security".
⚠ Researchers trick Tesla’s Autopilot into driving into oncoming traffic ⚠

They placed unobtrusive stickers that drivers wouldn't see but would fool autopilot into thinking the lane was veering off to the left.

πŸ“– Read

via "Naked Security".
πŸ” Why insider security threats are on the rise and so difficult to detect πŸ”

Some 73% of IT professionals said insider attacks have become more frequent in the past year, according to a Bitglass report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why businesses are at risk over poor data privacy practices πŸ”

Multiple data sources, data sharing agreements, and data inventory are some of the challenges of managing data privacy cited in a survey from Integris Software.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 6 Essential Skills Cybersecurity Pros Need to Develop in 2019 πŸ•΄

In a time of disruption in the security and tech worlds, cybersecurity professionals can't afford to become complacent - even in the face of a skills shortage.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Financial Firms Scrutinize Third-Party Supplier Risk πŸ•΄

But executives aren't confident in the accuracy of cybersecurity assessment data received from their vendors, a new study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Aqua Security Closes $62M in Funding πŸ•΄

Aqua Security Closes $62M in Funding

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Aqua Security Closes $62M in Funding πŸ•΄

Aqua Security Closes $62M in Funding

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Georgia Tech Cyberattack Exposes Data of 1.3 Million People πŸ•΄

Names, addresses, Social Security numbers, and birth dates may have been pilfered in the attack.

πŸ“– Read

via "Dark Reading: ".
πŸ” Permission bloat on iOS can lead to theft of sensitive data, study says πŸ”

Applications requesting access to photos for first-use setup retain that permission unless manually revoked, putting companies at risk, according to a Wandera report.

πŸ“– Read

via "Security on TechRepublic".
❌ OceanLotus APT Uses Steganography to Shroud Payloads ❌

The OceanLotus APT is using two new loaders which use steganography to read their encrypted payloads.

πŸ“– Read

via "Threatpost".
πŸ•΄ In Security, Programmers Aren't Perfect πŸ•΄

Software developers and their managers must change their perception of secure coding from being an optional feature to being a requirement that is factored into design from the beginning.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Chinese National Carries Malware Into Mar-a-Lago πŸ•΄

A Chinese woman arrested for entering the grounds of Mar-a-Lago under false pretenses was carrying electronic equipment holding malware.

πŸ“– Read

via "Dark Reading: ".
❌ How to Maximize the Value of Your Cybersecurity Investment ❌

Maximizing your security investment starts with hiring the right talent, harvesting data, spotting trends in logs and more.

πŸ“– Read

via "Threatpost".
πŸ” What is the Dark Web, and why is it so bad if your information is there? πŸ”

Emily Wilson, vice president of research at Terbium Labs, discusses why consumers and professionals should be concerned if their data is leaked on the Dark Web.

πŸ“– Read

via "Security on TechRepublic".
❌ Facebook Data of Millions Exposed in Leaky Datasets ❌

Researchers say that two publicly exposed dataset are leaking Facebook data- from user names to plaintext passwords.

πŸ“– Read

via "Threatpost".
πŸ” What is the Dark Web, and why is it so bad if your information is there? πŸ”

Emily Wilson, vice president of research at Terbium Labs, discusses why consumers and professionals should be concerned if their data is leaked on the Dark Web.

πŸ“– Read

via "Security on TechRepublic".