πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Businesses beware: Spearphishing attacks aim to change payroll direct deposits πŸ”

Malicious actors are politely asking potential victims to directly deposit money in their accounts, according to a new Vade Security report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How iOS App Permissions Open Holes for Hackers πŸ•΄

The permissions iOS apps request from users can turn the devices into spy tools and provide a toehold into the enterprise network, according to new research.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to use SSH as a VPN with sshuttle πŸ”

You don't need a VPN server running on a remote host to create a VPN tunnel. With the help of a simple tool, you can create that tunnel with ease.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ True Cybersecurity Means a Proactive Response πŸ•΄

Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to change the default SSH port on your data center Linux servers πŸ”

Don't let those data center Linux servers use the default SSH port. Gain a bit of a security edge by configuring the daemon to use a non-standard port.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2014-3603

The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

πŸ“– Read

via "National Vulnerability Database".
❌ Facebook and Amazon are Locked in a Blame Game Over Leaked Data: Who’s Really To Blame? ❌

After two databases were discovered leaking Facebook data, Facebook and Amazon are both pointing fingers - but researchers say the onus lies on all parties involved as data collection continues to grow.

πŸ“– Read

via "Threatpost".
❌ This Preinstalled Mobile Security App Delivered Vulnerabilities, Not Protection ❌

No. 4 global phone maker, Xiaomi, preinstalled a security app called β€˜Guard Provider’ that had a major flaw.

πŸ“– Read

via "Threatpost".
πŸ•΄ 3 Lessons Security Leaders Can Learn from Theranos πŸ•΄

Theranos flamed out in spectacular fashion, but you can still learn from the company's "worst practices."

πŸ“– Read

via "Dark Reading: ".
πŸ” Collaboration, Actionable Governance Needed to Secure Healthcare Sector πŸ”

Organizations recently responded to a senator who's hoping to develop a strategy for reducing cybersecurity vulnerabilities in the healthcare sector.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Patched Apache Vulnerability Could Still Cause Problems πŸ•΄

More than 2 million Apache HTTP servers remain at risk for a critical privilege escalation vulnerability.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New, Improved BEC Campaigns Target HR and Finance πŸ•΄

Spearphishing campaigns from new and established business email compromise (BEC) gangs are stealing from companies using multiple tactics.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Third Parties in Spotlight as More Facebook Data Leaks πŸ•΄

Two third-party services left Facebook user data exposed online -- in one case, 540 million records of user comments -- highlighting the ease with which third-party developers can access data and the risk of lax security.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Threat Group Employs Amazon-Style Fulfillment Model to Distribute Malware πŸ•΄

The operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Python-Based Bot Scanner Gorging on Recon Intel πŸ•΄

Discovered by AT&T AlienLabs, new malware Xwo seeking default creds and misconfigurations in MySQL and MongoDB, among other services

πŸ“– Read

via "Dark Reading: ".
⚠ New law will punish social media companies for users’ violent content ⚠

Australian law makers have responded very quickly to the Christchurch shootings.

πŸ“– Read

via "Naked Security".
⚠ Nvidia patches severe bugs in edge computing modules ⚠

Nvidia has released 13 patches targeting two low-end embedded computing boards.

πŸ“– Read

via "Naked Security".
⚠ Hoax! Nope, hackers aren’t posting invisible sexual videos on your wall ⚠

A Facebook hoax from 2011 is doing the rounds again. Don't fall for it, do something useful instead.

πŸ“– Read

via "Naked Security".
πŸ” How to enable two-factor authentication for SSH in Fedora Linux πŸ”

Any machine that allows SSH login would benefit from the addition of two-factor authentication.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to avoid document-based malware attacks πŸ”

Some 59% of all malicious files detected in the first quarter of 2019 were documents, according to a Barracuda Networks report. Here's how to protect yourself against this growing threat.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Half of online banks allow hackers to steal your money πŸ”

All online banks risk giving attackers unauthorized access to personal data, funds, and sensitive information, according to Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".