πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-1107

IBM Marketing Platform 9.1.0, 9.1.2, 10.0, and 10.1 exposes sensitive information in the headers that could be used by an authenticated attacker in further attacks against the system. IBM X-Force ID: 120906.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Serverless Computing from the Inside Out πŸ•΄

The biggest 'serverless' risks don't stem from the technonology itself. They occur when organizations respond to the adoption from the outside in.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Verizon Media, Uber, PayPal Top List of Companies Paying Bug Bounties πŸ•΄

A new report from HackerOne lists the top five companies running bug-hunting programs on the ethical hacking platform.

πŸ“– Read

via "Dark Reading: ".
πŸ” Medical Debt Collector Poised to Shutter Following 2018 Breach πŸ”

A data breach and mounting cybersecurity consulting costs, legal requirements, and regulatory obligations, proved too much for this company to come back from.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Google Releases Open Source Tool For Computational Privacy ❌

Google's new multi-party computation tool allows companies to work together with confidential data sets.

πŸ“– Read

via "Threatpost".
πŸ•΄ Critical Firefox Vuln Used in Targeted Attacks πŸ•΄

Mozilla has released patches for the bug reported by Coinbase.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ With GDPR's 'Right of Access,' Who Really Has Access? πŸ•΄

How a security researcher learned organizations willingly hand over sensitive data with little to no identity verification.

πŸ“– Read

via "Dark Reading: ".
❌ Feds: Cyberattack on NASA’s JPL Threatened Mission-Control Data ❌

Rampant security-operations bungling allowed cyberattackers to infiltrate JPL's network, which carries human mission data.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-14395

Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user's browser via reflected XSS.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-14394

OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Inside the FBI's Fight Against Cybercrime πŸ•΄

Heavily outnumbered and outpaced by their targets, small FBI cybersquads have been quietly notching up major wins against online criminals operating out of home and abroad.

πŸ“– Read

via "Dark Reading: ".
⚠ β€œDeeply personal medical” records exposed online ⚠

The Facebook ad agency xSocialMedia exposed 150K medical histories, along with identifying information for the people involved.

πŸ“– Read

via "Naked Security".
⚠ Facebook’s Libra cryptocurrency is big news but will it be secure? ⚠

Unless you’ve been under a rock, you’ll know that earlier this week Facebook announced plans for a new global cryptocurrency for absolutely everyone called Libra.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Hunt for Vulnerabilities πŸ•΄

A road map for improving the update process will help reduce the risks from vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why tech was key to the KGB being good at espionage πŸ”

The KGB Espionage Museum's Agne Urbaityte explains various technologies and methods of eavesdropping used by the intelligence service, including Deadly Kiss and cameras in rings.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybersecurity Accountability Spread Thin in the C-Suite πŸ•΄

While cybersecurity discussions have permeated board meetings, the democratization of accountability has a long way to go.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to respond to phishing emails: 6 steps for G Suite admins πŸ”

Here are steps G Suite administrators should take when a phishing email gets through to an account.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How KGB agents were invisible spies πŸ”

Dan Patterson interviews the KGB Espionage Museum's Agne Urbaityte about how agents in the field would blend in with their environment in order to spy.

πŸ“– Read

via "Security on TechRepublic".
⚠ Google launches new Chrome protection from bad URLs ⚠

The "Suspicious Site Reporter" extension lets users easily report dubious sites, while a new warning flags potential typosquatting pages.

πŸ“– Read

via "Naked Security".
⚠ Update Firefox now! Zero-day found in the wild ⚠

Mozilla has fixed a critical zero-day bug in the latest point releases of the Firefox web browser.

πŸ“– Read

via "Naked Security".
πŸ” KGB agents' wearables: Watches, cufflinks, shoes, and more πŸ”

The KGB Espionage Museum's curator Agne Urbaityte describes how agents concealed spying devices in what they wore when working in the field.

πŸ“– Read

via "Security on TechRepublic".