πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Apple Pledges Privacy, Beefs Up Security at Developer Confab πŸ•΄

The company hits back at the data economy - and fellow tech giants Facebook and Google - by announcing its own single sign-on service. A host of other iterative security improvements are on their way as well.

πŸ“– Read

via "Dark Reading: ".
⚠ Microsoft’s battle with SandboxEscaper zero days turns into grim Groundhog Day ⚠

Why is SandboxEscaper releasing vulnerabilities in such an irresponsible way? It matters not - Microsoft must patch what’s in front of it whatever the backstory.

πŸ“– Read

via "Naked Security".
πŸ•΄ SQL Injection Attacks Represent Two-Third of All Web App Attacks πŸ•΄

When Local File Inclusion attacks are counted, nearly nine in 10 attacks are related to input validation failures, Akamai report shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” Blockchain for drugs: IBM, Walmart pilot prescription medication tracking πŸ”

KPMG and Merck are among the companies that will collaborate in an FDA program to evaluate using blockchain to protect pharmaceutical products.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Blockchain projects: 7 mistakes to avoid πŸ”

Successful blockchain projects require CIOs to be aware of the technology's capabilities and limitations, according to Gartner.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Black Hat Q&A: Defending Against Cheaper, Accessible 'Deepfake' Tech πŸ•΄

ZeroFox's Matt and Mike Price discuss their work researching cybersecurity responses to the rising tide of 'deepfake' videos.

πŸ“– Read

via "Dark Reading: ".
❌ High-Severity Cisco Flaw in IOS XE Enables Device Takeover ❌

A high-severity flaw could give attackers full control of Cisco routers or switches.

πŸ“– Read

via "Threatpost".
⚠ Vim devs fix system-pwning text editor bug ⚠

Diehard text editor users everywhere breathed a sigh of relief this week as the open source community fixed a bug in one of the most venerable *nix programs: Vim.

πŸ“– Read

via "Naked Security".
πŸ” Ransomware rebounding in popularity as cryptojacking loses steam πŸ”

Hackers are going back to the tried-and-true method of simply demanding ransoms be paid in cryptocurrencies, rather than trying to covertly mine them.

πŸ“– Read

via "Security on TechRepublic".
⚠ Backpacker claims to find a network of hidden webcams in farm stay ⚠

In the bug repellent gizmo, in the shower, in the little birds glued to the footboardβ€”all hiding webcams, alleges the Dutch backpacker.

πŸ“– Read

via "Naked Security".
⚠ Facebook keeps deepfake of Mark Zuckerberg ⚠

"Whoever controls the data, controls the future," says the evil Zuck, who, according to the platform's current policy, won't be taken down.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Rise of "Purple Teaming" πŸ•΄

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

πŸ“– Read

via "Dark Reading: ".
❌ Telegram CEO Fingers China State Actors for DDoS Attack ❌

Durov took to Twitter to hint that Beijing tried to take Telegram offline to disrupt the Hong Kong protests.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Rise of "Purple Teaming" πŸ•΄

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

πŸ“– Read

via "Dark Reading: ".
πŸ” Magecart attack: What it is, how it works, and how to prevent it πŸ”

Learn how to combat this web-based card skimming attack.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Google Adds Two-Factor Authentication For Its Apps on iOS πŸ•΄

Android-based two-factor authentication now works for Google applications on iPad and iPhone.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Truths About BEC Scams πŸ•΄

Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The CISO's Drive to Consolidation πŸ•΄

Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-12147

Insufficient input validation in HECI subsystem in Intel(R) CSME before version 11.21.55, Intel? Server Platform Services before version 4.0 and Intel? Trusted Execution Engine Firmware before version 3.1.55 may allow a privileged user to potentially enable escalation of privileges via local access.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Hospital medical equipment contains potentially lethal vulnerability πŸ”

A vulnerability in the Windows CE-powered Alaris Gateway Workstation allows attackers to modify dosage rates for infusion pumps, which can have lethal results.

πŸ“– Read

via "Security on TechRepublic".
❌ Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk ❌

The critical bug in a connected medical device can allow an attacker to remotely manipulate hospital pumps, either to withhold meds or dispense too much.

πŸ“– Read

via "Threatpost".