πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Insiders, Data Theft A Threat To Self-Driving Car Tech πŸ”

Like many companies developing self-driving car technology, Tesla and its embattled CEO Elon Musk continue to fight data theft within its ranks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Focus on Business Priorities Exposing Companies to Avoidable Cyber-Risk πŸ•΄

Despite the growing sophistication of threats and increase compliance requirements, a high percentage of organizations are continuing to compromise their security.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to use SSH as a VPN with sshuttle πŸ”

You don't need a VPN server running on a remote host to create a VPN tunnel. With the help of a simple tool, you can create that tunnel with ease. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-13911

A configuration issue was addressed with additional restrictions. This issue affected versions prior to macOS X El Capitan 10.11.6 Security Update 2018-002, macOS Sierra 10.12.6 Security Update 2018-002, macOS High Sierra 10.13.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5606

Vordel XML Gateway (acquired by Axway) version 7.2.2 could allow remote attackers to cause a denial of service via a specially crafted request.

πŸ“– Read

via "National Vulnerability Database".
❌ Nvidia Fixes 8 High-Severity Flaws Allowing DoS, Code Execution ❌

Nvidia has patched eight high-severity flaws in its Tegra processors, which could enable denial of service and code execution.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2015-5463

AxiomSL's Axiom java applet module (used for editing uploaded Excel files and associated Java RMI services) 9.5.3 and earlier allows remote attackers to (1) access data of other basic users through arbitrary SQL commands, (2) perform a horizontal and vertical privilege escalation, (3) cause a Denial of Service on global application, or (4) write/read/delete arbitrary files on server hosting the application.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5462

AxiomSL's Axiom Google Web Toolkit module 9.5.3 and earlier allows remote attackers to inject HTML into the scoping dashboard features.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5384

AxiomSL's Axiom Google Web Toolkit module 9.5.3 and earlier is vulnerable to a Session Fixation attack.

πŸ“– Read

via "National Vulnerability Database".
⚠ Ep. 026 – Android bloatware, hackable routers and website attacks [PODCAST] ⚠

Here's our latest podcast - enjoy!

πŸ“– Read

via "Naked Security".
❌ SAS 2019 to Tackle APTs, Supply Chains and More ❌

The Security Analyst Summit 2019 heads to Singapore where elite researchers, top cybersecurity firms and global law enforcement agencies fight cybercrime.

πŸ“– Read

via "Threatpost".
⚠ Apache needs a patchy! Carpe Diem, update now ⚠

A flaw in the world’s most popular web server could give an attacker a way to gain full control of Unix-based systems.

πŸ“– Read

via "Naked Security".
⚠ Facebook won’t ask for your email password any more ⚠

What's that you say - Facebook was asking for the password to your email account? Yes, sometimes it was.

πŸ“– Read

via "Naked Security".
⚠ Android banking and finance apps’ security found wanting ⚠

A new report claims that mobile finance apps are littered with security bugs.

πŸ“– Read

via "Naked Security".
⚠ Facebook apps expose millions of users’ Facebook data ⚠

Once more unto the breach, dear Facebook Friends of Friends...

πŸ“– Read

via "Naked Security".
πŸ” How to change the default SSH Port on your data center Linux servers πŸ”

Don't let those data center Linux servers use the default SSH port. Gain a bit of a security edge by configuring the daemon to use a non-standard port. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
❌ BEC Scam Gang London Blue Evolves Tactics, Targets ❌

Business email compromise group London Blue is back with evolved email domain spoofing tactics and a newfound interest in targets in Asia.

πŸ“– Read

via "Threatpost".
⚠ Why β€˜PWNED!’ is appearing on some GPS smartwatches ⚠

Over 20 models of smartwatches, some bought for kids, allow for creeps to eavesdrop and track users, in spite of a ban.

πŸ“– Read

via "Naked Security".
❌ Free Cynet Threat Assessment for Mid-sized and Large Organizations ❌

Have your business try Cynet's Free Threat Assessment that checks for malware, C&C connections, data exfiltration, phishing link access, user credential thefts attempts, etc.

πŸ“– Read

via "Threatpost".
πŸ” Businesses beware: Spearphishing attacks aim to change payroll direct deposits πŸ”

Malicious actors are politely asking potential victims to directly deposit money in their accounts, according to a new Vade Security report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How iOS App Permissions Open Holes for Hackers πŸ•΄

The permissions iOS apps request from users can turn the devices into spy tools and provide a toehold into the enterprise network, according to new research.

πŸ“– Read

via "Dark Reading: ".