πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Vast majority of ethical hackers keen to spend more time bug bounty hunting – report πŸ—“οΈ

Bounties and greater independence are prime motives for hackers hoping to do more freelance bug hunting

πŸ“– Read

via "The Daily Swig".
❌ Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw ❌

The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.

πŸ“– Read

via "Threat Post".
πŸ•΄ Snowflake Debuts Cybersecurity Workload to Aid Visibility, Automation πŸ•΄

The tool underpins cybersecurity capabilities including SIEM, SOAR, compliance automation, and vulnerability management.

πŸ“– Read

via "Dark Reading".
❌ Conducting Modern Insider Risk Investigations ❌

Insider Risk Management requires a different approach than to those from external threats. IRM is unique from other domains of security in that the data sources which serve as inputs are as often people as they are tools. Shifting the analystβ€˜s mindset when handling risks presented by insiders requires us to move through the stages of inquiry, investigation, and determining outcomes.

πŸ“– Read

via "Threat Post".
❌ Follina Exploited by State-Sponsored Hackers ❌

A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.

πŸ“– Read

via "Threat Post".
πŸ•΄ CISA Challenges Partners and Public to Push for 'More Than a Password' in New Social Media Campaign πŸ•΄

Nation’s cyber defense agency urges America to enable multifactor authentication.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cybersecurity Industry Leaders Launch Campaign to Close the Cybersecurity Talent Gap πŸ•΄

A coalition of over 25 industry leaders, led by NightDragon and non-profit NextGen Cyber Talent, partner to raise $1 million for collegiate cybersecurity education

πŸ“– Read

via "Dark Reading".
πŸ•΄ CyberRatings.org Announces Test on Cloud Network Firewall πŸ•΄

Fortinet FortiGate-VM receives AAA rating across all five categories in CyberRating's assessment.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Forescout Announces Intent to Acquire Cysiv to Deliver Data-Powered Threat Detection and Response πŸ•΄

Acquisition will leverage Forescout’s automated cybersecurity with Cysiv's cloud-native platform to deliver data-powered analytics for 24/7 threat detection and response.

πŸ“– Read

via "Dark Reading".
❌ Cyber Risk Retainers: Not Another Insurance Policy ❌

The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ HTTP/3 evolves into RFC 9114 – a security advantage, but not without challenges πŸ—“οΈ

The backbone of the internet has received a major upgrade

πŸ“– Read

via "The Daily Swig".
πŸ‘1
πŸ•΄ 7 NFT Scams That Could Be Targeting Your Brand πŸ•΄

Brands should be vigilant to ensure sites and listings promoting NFTs for sale are legitimate and not being used as an instrument by fraudsters to swindle customers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Akamai Launches New Malware Protection for Uploaded Files πŸ•΄

Edge-based solution detects and blocks malicious files uploaded to Web apps and APIs.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Harnessing AI to Proactively Thwart Threats πŸ•΄

By using artificial intelligence to predict how an attacker would carry out their attack, we can deploy defenses and preemptively shut down vulnerable entry points.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-1991 β€Ό

A vulnerability classified as problematic has been found in Fast Food Ordering System 1.0. Affected is the file Master.php of the Master List. The manipulation of the argument Description with the input foo "><img src="" onerror="alert(document.cookie)"> leads to cross site scripting. It is possible to launch the attack remotely but it requires authentication. Exploit details have been disclosed to the public.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ KrebsOnSecurity in New Netflix Series on Cybercrime β™ŸοΈ

Netflix has a new documentary series airing next week -- "Web of Make Believe: Death, Lies & the Internet" -- in which Yours Truly apparently has a decent amount of screen time. The debut episode explores the far-too-common harassment tactic of "swatting" -- wherein fake bomb threats or hostage situations are phoned in to police as part of a scheme to trick them into visiting potentially deadly force on a target’s address.

πŸ“– Read

via "Krebs on Security".
πŸ—“οΈ Google showers top cloud security researchers with kudos and cash πŸ—“οΈ

More than $300,000 was handed out in GCP prize money during 2021

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Enterprise Security Around the Dinner Table πŸ•΄

Enterprise cybersecurity awareness training has evolved to include informal lessons for employees’ family members, and it has many benefits.

πŸ“– Read

via "Dark Reading".
⚠ Know your enemy! Learn how cybercrime adversaries get in… ⚠

Here's how 144 recent attacks actually went down in real life. Don't let this happen to you!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-31025 β€Ό

Discourse is an open source platform for community discussion. Prior to version 2.8.4 on the `stable` branch and 2.9.0beta5 on the `beta` and `tests-passed` branches, inviting users on sites that use single sign-on could bypass the `must_approve_users` check and invites by staff are always approved automatically. The issue is patched in Discourse version 2.8.4 on the `stable` branch and version `2.9.0.beta5` on the `beta` and `tests-passed` branches. As a workaround, disable invites or increase `min_trust_level_to_allow_invite` to reduce the attack surface to more trusted users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29564 β€Ό

Jamf Private Access before 2022-05-16 has Incorrect Access Control, in which an unauthorized user can reach a system in the internal infrastructure, aka WND-44801.

πŸ“– Read

via "National Vulnerability Database".