πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to create a business-driven cybersecurity strategy: 3 tips πŸ”

Companies achieve better results with a business-driven cybersecurity strategy, according to new survey results from consulting firm PwC.

πŸ“– Read

via "Security on TechRepublic".
⚠ Microsoft fixes Intel ZombieLoad bug with Patch Tuesday updates ⚠

May 2019 Patch Tuesday fixed 79 vulnerabilities, 19 of which are classed as Critical. Here's a summary of the most notable ones. 

πŸ“– Read

via "Naked Security".
⚠ UPDATE NOW! Critical, remote, β€˜wormable’ Windows vulnerability ⚠

Microsoft has fixed an RDP vulnerability that can be exploited remotely, without authentication and used to run arbitrary code.

πŸ“– Read

via "Naked Security".
πŸ•΄ Brush Up on the Latest Security Techniques at Black Hat USA πŸ•΄

Learn to set malware lures, pinpoint unintentional but identifying human behaviors, and detect industrial control system attacks via sensor noise.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why cybersecurity pros want to share information to combat threats πŸ”

Security professionals are willing to share intel with their peers and the government if such sharing improved their ability to detect cyber threats, according to an IronNet survey.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 71% of medical devices still run on Windows 7, Windows 2008, and Windows mobile πŸ”

Medical IoT devices carry significant cybersecurity risks, according to a Forescout report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Windows 10 Migration: Getting It Right πŸ•΄

The transition to Windows 10 doesn't need to be a sprint. Organizations can still take advantage of the security in Windows 7 while gaining added management flexibility from the newer OS.

πŸ“– Read

via "Dark Reading: ".
❌ Billions of Malicious Bots Take to Cipher-Stunting to Hide ❌

Attackers have been tampering with TLS signatures at a scale never before seen using a technique called cipher-stunting.

πŸ“– Read

via "Threatpost".
πŸ” How to create a secure website: 4 tips πŸ”

A major gap exists between the perception and reality of online security safety, according to Google Registry and The Harris Poll.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2016-7151

Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86_insn_reg_intel in arch/X86/X86Mapping.c.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10719

TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-9919

An issue was discovered in Bilboplanet 2.0. Stored XSS exists in the fullname parameter to signup.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-9918

An issue was discovered in Bilboplanet 2.0. Stored XSS exists in the user_id parameter to signup.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-9917

An issue was discovered in Bilboplanet 2.0. There is a stored XSS vulnerability when adding a tag via the user/?page=tribes tags parameter.

πŸ“– Read

via "National Vulnerability Database".
❌ Intel ZombieLoad Side-Channel Attack: 10 Takeaways ❌

Here are 10 top takeaways from Intel's most recent class of Spectre-like speculative execution vulnerabilities, disclosed this week.

πŸ“– Read

via "Threatpost".
πŸ•΄ Two Ransomware Recovery Firms Typically Pay Hackers πŸ•΄

Companies promising the safe return of data sans ransom payment secretly pass Bitcoin to attackers and charge clients added fees.

πŸ“– Read

via "Dark Reading: ".
πŸ” Tech news roundup: Microsoft Office 365, Facebook scandal, and AI adoption πŸ”

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the highest paying internships for 2019.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Tech news roundup: Microsoft Office 365, Facebook scandal, and AI adoption πŸ”

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the highest paying internships for 2019.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why MDS vulnerabilities present a threat as serious as Spectre and Meltdown πŸ”

Microarchitectural Data Sampling are CPU side-channel vulnerabilities that allow attackers to view in-flight data from CPU-internal buffers. Learn more about MDS attacks in this comprehensive guide.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Spectre and Meltdown explained: A comprehensive guide for professionals πŸ”

Staying up to date on Spectre and Meltdown can be challenging. This guide includes in-depth explanations about these uniquely dangerous security vulnerabilities and the best mitigation solutions.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2016-7043

It has been reported that KIE server and Busitess Central before version 7.21.0.Final contain username and password as plaintext Java properties. Any app deployed on the same server would have access to these properties, thus granting access to ther services.

πŸ“– Read

via "National Vulnerability Database".