πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ TRISIS Group, Known for Physical Destruction, Targets U.S. Electric Companies ❌

XENOTIME, a destructive APT linked to Russia, has broadened its target set beyond Middle East oil and gas.

πŸ“– Read

via "Threatpost".
πŸ•΄ Better Cybersecurity Research Requires More Data Sharing πŸ•΄

Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.

πŸ“– Read

via "Dark Reading: ".
❌ News Wrap: Amazon Privacy and Telegram DDoS Attack ❌

Threatpost editors Tara Seals and Lindsey O'Donnell discuss a recent lawsuit against Amazon for its privacy policies, a Telegram DDoS attack and more.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-8252

Kernel can inject faults in computations during the execution of TrustZone leading to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SM7150, Snapdragon_High_Med_2016, SXR1130

πŸ“– Read

via "National Vulnerability Database".
❌ ThreatList: Ransomware Trojans Picking Up Steam in 2019 ❌

Attackers continue to push the boundaries with modular trojans and ransomware attacks, a new report found.

πŸ“– Read

via "Threatpost".
πŸ•΄ Common Hacker Tool Hit with Hackable Vulnerability πŸ•΄

A researcher has found a significant exploit in one of the most frequently used text editors.

πŸ“– Read

via "Dark Reading: ".
❌ Ransomware: A Persistent Scourge Requiring Corporate Action Now ❌

ASCO is the latest headline-making organization to be hit by ransomware, prompting many companies to consider what to do to minimize their risk.

πŸ“– Read

via "Threatpost".
πŸ•΄ 10 Notable Security Acquisitions of 2019 (So Far) πŸ•΄

In a year when security companies have been snapped up left and right, these deals stand out from the chaos.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-7472

The "Count per Day" plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 21 stories of the week ⚠

From the GoldBrute botnet to Microsoft's battle with irresponsibly disclosed bugs - and everything in between. It's your weekly roundup.

πŸ“– Read

via "Naked Security".
⚠ Widely used medical infusion pump can be remotely hijacked ⚠

These vulnerable infusion pumps can be remotely hacked to alter the delivery of IV fluids and medications such as painkillers or insulin.

πŸ“– Read

via "Naked Security".
⚠ I’d like to add you to my professional network of people to spy on ⚠

A deepfake was reportedly spotted in the wild: LinkedIn's well-connected, young, attractive Eurasia/Russia expert "Katie Jones."

πŸ“– Read

via "Naked Security".
⚠ Privacy foul for soccer league app that eavesdropped on users ⚠

The LaLiga app used phones' GPS and microphones to sniff out bars that were broadcasting soccer matches illegally.

πŸ“– Read

via "Naked Security".
⚠ Yubico recalls FIPS Yubikey tokens after flaw found ⚠

Security token maker Yubico has issued an important advisory affecting high-end versions of its YubiKey authentication key.

πŸ“– Read

via "Naked Security".
πŸ•΄ Find Your Next Favorite Cybersecurity Tool at the Black Hat USA Arsenal πŸ•΄

Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Life-Changing Magic of Tidying Up the Cloud πŸ•΄

Most companies' cloud security operations would benefit significantly from clean-up, alignment, and organization.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers πŸ•΄

The attackers behind the Triton, or Xenotime, intrusions into critical infrastructure (CI) safety systems are testing their skills against electric power companies. Options for defense are still limited, however.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2009-5157 (wag54g2_firmware)

On Linksys WAG54G2 1.00.10 devices, there is authenticated command injection via shell metacharacters in the setup.cgi c4_ping_ipaddr variable.

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Pushes Azure Users to Patch Linux Systems ❌

Microsoft is urging users to patch every Exim installation in their organization and make sure that they are updated to the most recent version, Exim version 4.92.

πŸ“– Read

via "Threatpost".
πŸ” Business travelers, beware: Hackers looking over your shoulder can cause data breaches πŸ”

Some 80% of business travelers say visual hacking is a threat, according to a 3M report.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-10239

A privilege escalation vulnerability in the "support access" feature on Infoblox NIOS 6.8 through 8.4.1 could allow a locally authenticated administrator to temporarily gain additional privileges on an affected device and perform actions within the super user scope. The vulnerability is due to a weakness in the "support access" password generation algorithm. A locally authenticated administrative user may be able to exploit this vulnerability if the "support access" feature is enabled, they know the support access code for the current session, and they know the algorithm to generate the support access password from the support access code. "Support access" is disabled by default. When enabled, the access will be automatically disabled (and support access code will expire) after the 24 hours.

πŸ“– Read

via "National Vulnerability Database".