πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 78% of Consumers Say Online Companies Must Protect Their Info πŸ•΄

Yet 68% of US consumers agree they also must do more to protect their own information.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Poorly Configured Server Exposes Most Panama Citizens' Data πŸ•΄

Compromised information includes full names, birth dates, national ID numbers, medical insurance numbers, and other personal data.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9287

Directory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field ("kid") of the IdP's HTTP response message ("WLS-Response") can be manipulated by an attacker. The "kid" field is not signed like the rest of the message, and manipulation is therefore trivial. The "kid" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.

πŸ“– Read

via "National Vulnerability Database".
πŸ” FTC Backs Federal Privacy Law As Long As It Can Enforce It πŸ”

The FTC told Congress last week that if a national privacy law gets passed, it wants more resources and greater authority to impose penalties under it.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Attacks on JavaScript Services Leak Info From Websites πŸ•΄

Three marketing tools, including the Best Of The Web security logomark, were compromised in supply chain attacks, allegedly leaving website customers leaking their users' sensitive information.

πŸ“– Read

via "Dark Reading: ".
❌ Twitter Leaks Apple iOS Users’ Location Data to Ad Partner ❌

A Twitter glitch "inadvertently" leaked iOS users' location data to an unnamed partner.

πŸ“– Read

via "Threatpost".
πŸ•΄ LockerGoga, MegaCortex Ransomware Share Unlikely Traits πŸ•΄

New form of ransomware MegaCortex shares commonalities with LockerGoga, enterprise malware recently seen in major cyberattacks.

πŸ“– Read

via "Dark Reading: ".
❌ Pair of Cisco Bugs, One Unpatched, Affect Millions of Devices ❌

The two high-severity bugs impact a wide array of enterprise, military and government networks.

πŸ“– Read

via "Threatpost".
πŸ•΄ Thrangrycat Claws Cisco Customer Security πŸ•΄

A linked pair of vulnerabilities could allow an attacker to take over many different types of Cisco networking components.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Korean APT Adds Rare Bluetooth Device-Harvester Tool πŸ•΄

ScarCruft has evolved into a skilled and resourceful threat group, new research shows.

πŸ“– Read

via "Dark Reading: ".
⚠ Feds hook ELECTRICFISH, new Windows malware from North Korea ⚠

The FBI and Department of Homeland Security have identified a new strain of malware from North Korea, representing the latest in a long line of cyber attacks from the country

πŸ“– Read

via "Naked Security".
⚠ Windows 10 brings password-free access another step closer ⚠

Microsoft has put another nail in the password’s coffin by winning a certification that will make it easier to log into Windows machines. 

πŸ“– Read

via "Naked Security".
⚠ White label SOS panic buttons can be hacked via SMS ⚠

A Chinese white-label panic alarm used by elderly and vulnerable people can be remotely controlled by sending it simple SMS commands.

πŸ“– Read

via "Naked Security".
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
⚠ Update WhatsApp now! One call could give spies access to your phone ⚠

A WhatsApp zero-day has allowed an β€œadvanced cyber actor” to successfully install spyware on victims' phones with no more than a phone call.

πŸ“– Read

via "Naked Security".
❌ Cynet: An Autonomous Security Platform for Any Size Organization ❌

Cynet  protects the entire internal environment – including hosts, files, users and the network.

πŸ“– Read

via "Threatpost".
❌ WhatsApp Zero-Day Exploited in Targeted Spyware Attacks ❌

WhatsApp has patched a vulnerability that allowed attackers to install spyware on victims' phones.

πŸ“– Read

via "Threatpost".
πŸ” How to securely delete files in Linux with srm πŸ”

Don't entrust the deletion of sensitive data to the standard tools. Install this handy data wipe command for a more secure removal.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Slack vulnerability allows attackers to intercept, modify downloads πŸ”

Improper handling of a custom URI creates a vulnerability for users of the Slack Desktop client on Windows.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Why AI Will Create Far More Jobs Than It Replaces πŸ•΄

Just as spreadsheets and personal computers created a job boom in the '70s, so too will artificial intelligence spur security analysts' ability to defend against advanced threats.

πŸ“– Read

via "Dark Reading: ".
❌ Linux Kernel Flaw Allows Remote Code-Execution ❌

The bug is remotely exploitable without authentication or user interaction.

πŸ“– Read

via "Threatpost".