πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Black Hat Q&A: Bruce Schneier Calls For Public-Interest Technologists πŸ•΄

Ahead of his 2019 Black Hat USA talk, cybersecurity luminary Bruce Schneier explains why it's so important for tech experts to be actively involved in setting public policy.

πŸ“– Read

via "Dark Reading: ".
⚠ Brave browser concerned that Client Hints could be abused for tracking ⚠

Privacy-focused browser Brave has criticised an industry proposal it says would make browser fingerprinting easier.

πŸ“– Read

via "Naked Security".
⚠ CEO told to hand back 757,000 fraudulently obtained IP addresses ⚠

A company accused of fraudulently obtaining 757,000 IPv4 addresses has been ordered to hand them back.

πŸ“– Read

via "Naked Security".
πŸ•΄ How a Manufacturing Firm Recovered from a Devastating Ransomware Attack πŸ•΄

The infamous Ryuk ransomware slammed a small company that makes heavy-duty vehicle alternators for government and emergency fleet. Here's what happened.

πŸ“– Read

via "Dark Reading: ".
❌ ZombieLoad: How Intel’s Latest Side Channel Bug Was Discovered and Disclosed ❌

Daniel Gruss, the researcher behind Spectre, Meltdown - and most recently, ZombieLoad - Intel CPU side channel attacks, gives an inside look into how he discovered the flaws.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 Signs of the Rising Threat of Magecart Attacks in 2019 πŸ•΄

Magecart attacks continue to grow in momentum. Here are the stats and stories that show what's behind the mayhem.

πŸ“– Read

via "Dark Reading: ".
❌ Slack Bug Allows Remote File Hijacking, Malware Injection ❌

An attacker can supply a malicious hyperlink in order to secretly alter the download path for files shared in a Slack channel.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2015-9287 (the_university_of_cambridge_web_authentication_system_apache_authentication_agent)

Directory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field ("kid") of the IdP's HTTP response message ("WLS-Response") can be manipulated by an attacker. The "kid" field is not signed like the rest of the message, and manipulation is therefore trivial. The "kid" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Killer SecOps Skills: Soft Is the New Hard πŸ•΄

The sooner we give mindsets and tool sets equal bearing, the better. We must put SOC team members through rigorous training for emergency situations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Financial Sector Under Siege πŸ•΄

The old take-the-money-and-run approach has been replaced by siege tactics such as DDOS attacks and land-and-expand campaigns with multiple points of persistence and increased dwell time.

πŸ“– Read

via "Dark Reading: ".
❌ Behind the Naming of ZombieLoad and Other Intel Spectre-Like Flaws ❌

A lot of thought and meaning goes into the naming of infamous CPU side channel flaws, like ZombieLoad, Spectre and Meltdown.

πŸ“– Read

via "Threatpost".
❌ Salesforce Woes Linger as Admins Clean Up After Service Outage ❌

An accidental permissions snafu caused a massive outage for all Salesforce customers that continues to affect some businesses.

πŸ“– Read

via "Threatpost".
πŸ•΄ 97% of Americans Can't Ace a Basic Security Test πŸ•΄

Still, a new Google study uncovers a bit of good news, too.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-12270

In Valve Steam 1528829181 BETA, it is possible to perform a homograph / homoglyph attack to create fake URLs in the client, which may trick users into visiting unintended web sites.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How has GDPR actually affected businesses? πŸ”

The EU's General Data Protection Regulation is now a year old, and has resulted in financial repercussions and changes to how businesses handle data.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The current cybersecurity landscape of guerrilla warfare πŸ”

A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The current cybersecurity landscape of guerrilla warfare πŸ”

A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” California Consumer Privacy Act Amendment Blocked by Lawmakers πŸ”

SB 561, a contested amendment to the California Consumer Privacy Act that could have expanded the right of consumers to sue companies over their handling of personal data, has been shelved by the state for now, likely giving businesses a sigh a relief.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Windows 10 Update Bricks PCs, Microsoft Offers Workarounds ❌

A glitch in Microsoft's Windows 10 update is causing systems to freeze after users tried to use the System Reboot function. Luckily, workarounds exist.

πŸ“– Read

via "Threatpost".
❌ Sharing Threat Intelligence: Time for an Overhaul ❌

All too often, information-sharing is limited to vertical market silos; to build better defenses, it's time to take a broader view beyond the ISAC.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Trickbot Variant Uses URL Redirection to Spread πŸ•΄

Switch in tactic is the latest attempt by operators of the prolific banking Trojan to slip past detection mechanisms.

πŸ“– Read

via "Dark Reading: ".