πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Developers and Security Teams Under Pressure to Collaborate πŸ•΄

The challenges and benefits to getting two traditionally adversarial groups on the same page.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Breaking the Endless Cycle of "Perfect" Cybercrimes πŸ•΄

A two-step strategy for creating an attack environment that is more complex, less profitable, and more likely to expose the attacker.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Linux Worm Attacks IoT Devices πŸ•΄

Silex has 'bricked' more than 2,000 Linux-based IoT devices so far.

πŸ“– Read

via "Dark Reading: ".
❌ Google Announces DNS over HTTPS β€˜General Availability’ ❌

Google finalizes its DNS-over-HTTPS service inching toward a world where DNS request are sent via HTTPS and not UDP or TCP.

πŸ“– Read

via "Threatpost".
πŸ•΄ Malware Coming to a Mac Near You? Yes, Say Security Firms πŸ•΄

While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

πŸ“– Read

via "Dark Reading: ".
πŸ” TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download πŸ”

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How organizations face risks by relying too much on cloud vendors for security πŸ”

Many enterprises are too dependent on cloud vendors to secure their critical online data rather than adopting security as a shared responsibility, according to a survey from CyberArk.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA πŸ•΄

Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.

πŸ“– Read

via "Dark Reading: ".
⚠ Are heart electrocardiograms the next big thing in biometrics? ⚠

After fingers, the iris of the eye, ears and even lips, it was probably inevitable that someone would propose the human heart might be the next big thing in biometric security.

πŸ“– Read

via "Naked Security".
⚠ FTC crackdown targets operators behind 1 billion robocalls ⚠

It's a drop in the β€œ4.7 billion robocalls placed per month” bucket, but hey, it's better than nothing!

πŸ“– Read

via "Naked Security".
⚠ YouTube’s antics with kids’ data prompts call for FTC to force change ⚠

Sen. Markey and 2 consumer groups said the Google-owned service must comply with COPPA and should be held accountable for not doing so.

πŸ“– Read

via "Naked Security".
πŸ•΄ Office 365 Multifactor Authentication Done Right πŸ•΄

Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.

πŸ“– Read

via "Dark Reading: ".
πŸ” Will mobile devices replace passwords? πŸ”

Mobile devices could provide a more secure, user-friendly mode of account authentication, according to an IDG and MobileIron report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Tesla 3 navigation system fooled with GPS spoofing ⚠

Cybersecurity researchers have fooled the Tesla Model 3's automatic navigation system into rapidly braking and taking a wrong turn on the highway.

πŸ“– Read

via "Naked Security".
❌ Thousands of IoT Devices Bricked By Silex Malware ❌

A 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week. Threatpost talks to the researcher who discovered the malware.

πŸ“– Read

via "Threatpost".
❌ New Microsoft Excel Attack Vector Surfaces ❌

Researchers have identified security hole in Microsoft Office’s Excel spreadsheet program that allows an attacker to trigger a malware attack on remote systems.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-1893

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152157.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-1892

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152156.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-1828

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150431.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-1827

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150430.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-1826

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150429.

πŸ“– Read

via "National Vulnerability Database".