πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Hackers take aim at Fortune 500 companies on the Dark Web πŸ”

Dark Web listings with the potential to harm the enterprise are up 20% since 2016, according to Bromium.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Windows 10 passwords won't expire: Why Microsoft says this will make your account safer πŸ”

Changing passwords frequently is not only a pain, but also unsafe, according to Microsoft. Here's why the company's decision to remove password expirations is a good one.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Inside the Criminal Businesses Built to Target Enterprises πŸ•΄

Researchers witness an increase in buying and selling targeted hacking services, custom malware, and corporate network access on the Dark Web.

πŸ“– Read

via "Dark Reading: ".
❌ High-Severity Bug in Cisco Industrial Enterprise Tool Allows RCE ❌

Bug allows for a remote attacker to execute arbitrary code on industrial, enterprise tools.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cyber Talent Gap? Don't Think Like Tinder! πŸ•΄

If your company truly is a great place to work, make sure your help-wanted ads steer clear of these common job-listing cliches.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Security Scams Set to Sweep This Summer πŸ•΄

Experts share the cybersecurity threats to watch for and advice to stay protected.

πŸ“– Read

via "Dark Reading: ".
❌ AMCA Healthcare Hack Widens Again, Reaching 20.1M Victims ❌

OPKO subsidiary BioReference joins Quest and LabCorp in the supply-chain incident.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-9839

An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the 'm_id' parameter), any user with REPORTER access or above is able to view any private issue's details (summary, description, steps to reproduce, additional information) when cloning it. By checking the 'Copy issue notes' and 'Copy attachments' checkboxes and completing the clone operation, this data also becomes public (except private notes).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-8047

vtiger CRM 7.0.1 is affected by one reflected Cross-Site Scripting (XSS) vulnerability affecting version 7.0.1 and probably prior versions. This vulnerability could allow remote unauthenticated attackers to inject arbitrary web script or HTML via index.php?module=Contacts&view=List (app parameter).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ ADT Teams Up with SonicWall for SMB Security Services πŸ•΄

More than half of all SMBs plan to rely on third party providers for their security tools and services, according to IDC.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Senior Executives More Involved with SOC Operations, Report Finds πŸ•΄

But they are still subject to the same alert fatigue and false-positive issues their junior employees face.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Feds Make New Arrest in Darkode Case πŸ•΄

Another American was arrested and charged alongside three international suspects who remain at large, according to newly unsealed indictment.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cisco Buys Sentryo πŸ•΄

Cisco is adding the French company's network visibility products to its IoT network lineup.

πŸ“– Read

via "Dark Reading: ".
⚠ The FBI is sitting on more than 641m photos of people’s faces ⚠

Its already massive facial recognition databases have ballooned, and government watchdog GAO found that the FBI isn't checking accuracy.

πŸ“– Read

via "Naked Security".
⚠ Researchers eavesdrop on smartphone finger taps ⚠

Researchers have been experimenting with a novel way to eavesdrop on what you're typing on your smartphone - by listening to the taps of your fingers.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Minefield of Corporate Email πŸ•΄

Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.

πŸ“– Read

via "Dark Reading: ".
⚠ What’s the best approach to patching vulnerabilities? ⚠

Researchers ask: with only 1 in 20 vulnerabilities exploited, what's the best approach to patching?

πŸ“– Read

via "Naked Security".
⚠ Action required! Exim mail servers need urgent patching ⚠

Researchers have discovered another dangerous security hole hiding in recent, unpatched versions of the internet’s most popular mail server, Exim.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five: 6/7 Edition πŸ”

The latest trade secret case, a more strict privacy bill for New York State, and the European Data Protection Supervisor's warning - catch up on the week's news with this recap!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Learn the Latest Hacking Techniques at Black Hat Trainings Virginia πŸ•΄

At Black Hat's upcoming Trainings-only October event you'll have opportunities to get up to speed on the newest hacking tricks for operating systems and cloud providers.

πŸ“– Read

via "Dark Reading: ".
❌ Troy Hunt: β€˜Messy’ Password Problem Isn’t Getting Better ❌

Poor password hygiene continues to plague the security industry, Troy Hunt said during Infosecurity Europe.

πŸ“– Read

via "Threatpost".