πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Adobe Patches 47 Critical Flaws in Acrobat and DC ❌

The update includes a security bypass bug that enables privilege escalation.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ 'Short, Brutal Lives': Life Expectancy for Malicious Domains πŸ•΄

Using a cooling-off period for domain names can help catch those registered by known bad actors.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Short, Brutal Lives': Life Expectancy for Malicious Domains πŸ•΄

Using a cooling-off period for domain names can help catch those registered by known bad actors.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9270

XSS exists in the the-holiday-calendar plugin before 1.11.3 for WordPress via the thc-month parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-9269

The export/content.php exportarticle feature in the wordpress-mobile-pack plugin before 2.1.3 2015-06-03 for WordPress allows remote attackers to obtain sensitive information because the content of a privately published post is sent in JSON format.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Why Australia is quickly developing a technology-based human rights problem πŸ”

Human rights advocates have called on the Australian government to protect the rights of all in an era of change, saying tech should serve humanity, not exclude the most vulnerable members of society.

πŸ“– Read

via "Security on TechRepublic".
⚠ Students swap data for coffee at cashless cafe ⚠

In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.

πŸ“– Read

via "Naked Security".
⚠ Suspect forced to unlock iPhone with his face ⚠

The order so far hasn't raised Fifth Amendment objections either, your face being something you are, rather than something you know.

πŸ“– Read

via "Naked Security".
⚠ Lock screen bypass already discovered for Apple’s iOS 12 ⚠

Apple’s iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a device’s contents.

πŸ“– Read

via "Naked Security".
⚠ Hackers demand ransom from hijacked Instagram influencers ⚠

Hackers are taking over high-profile Instagram users’ accounts and holding them to ransom, revealed reports this week.

πŸ“– Read

via "Naked Security".
❌ ThreatList: Password Hygiene Remains Lackluster in Global Businesses ❌

Password-sharing persists, but at least multifactor authentication usage is up.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Google Cracks Down on Malicious Chrome Extensions in Major Update ❌

Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ CISOs: How to Answer the 5 Questions Boards Will Ask You πŸ•΄

As boards learn the importance of cybersecurity, certain issues arise on a regular basis. These tips can help you address them.

πŸ“– Read

via "Dark Reading: ".
❌ Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration ❌

The free online office suite software is used by more than 30 million people and is a ripe target for criminals.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” The dark web is not actually selling your data, report says πŸ”

While many reports have surfaced about the danger of company data being sold on the dark web, this information is actually misleading and inaccurate.

πŸ“– Read

via "Security on TechRepublic".
πŸ” SAP's 'Bring Your Own Node' service makes blockchain network integration easier πŸ”

SAP announced new integration services and two new consortium groups at TechEd Las Vegas.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Stop Saying 'Digital Pearl Harbor' πŸ•΄

Yes, there are serious dangers posed by malevolent nation-states. But the hype is distracting us from the reality of the threats.

πŸ“– Read

via "Dark Reading: ".
❌ Google Patches Critical Vulnerabilities in Android OS ❌

The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ The Award for Most Dangerous Celebrity Goes To ... πŸ•΄

A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.

πŸ“– Read

via "Dark Reading: ".
❌ NOKKI Malware Sports Mysterious Link to Reaper APT Group ❌

The relationship between the malware and the APT group remains somewhat murky.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements πŸ•΄

Two felony counts each carry a maximum 10-year prison sentence.

πŸ“– Read

via "Dark Reading: ".