πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2018-15556

The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user "root" and an empty password by using the enabled onboard UART headers.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-5028

Insufficient data validation in V8 in Google Chrome prior to 56.0.2924.76 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Report: Still Work To Be Done Safeguarding Federal Agencies πŸ”

Many federal agencies are unprepared to "confront the dynamic cyber threats of today," according to a Senate investigation this week.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ How Hackers Infiltrate Open Source Projects πŸ•΄

The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.

πŸ“– Read

via "Dark Reading: ".
❌ Scammers Prey on Instagram Vanity and β€˜Verified Account’ Status ❌

Hackers are stealing Instagram credentials through a tricky phishing scam that asks victims to apply for exclusive verified account status.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 Ways to Mitigate Supply Chain Attacks πŸ•΄

Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Inside MLS, the New Protocol for Secure Enterprise Messaging πŸ•΄

As personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security.

πŸ“– Read

via "Dark Reading: ".
❌ Leaky Amazon S3 Buckets Expose Data of Netflix, TD Bank ❌

Netflix, TD Bank, and Ford were only a few of the companies whose data was exposed by three leaky Amazon S3 buckets owned by Attunity.

πŸ“– Read

via "Threatpost".
πŸ•΄ Former Equifax CIO Sentenced to Prison for Insider Trading πŸ•΄

Jun Ying is the second Equifax employee found guilty of insider trading related to the massive 2017 data breach.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ NIST Issues IoT Risk Guidelines πŸ•΄

A new report offers the first step toward understanding and managing IoT cybersecurity risks.

πŸ“– Read

via "Dark Reading: ".
❌ Smart Lock Turns Out to be Not So Smart, or Secure ❌

Pentesters say a keyless smart lock made by U-tec, called Ultraloq, is neither ultra or secure.

πŸ“– Read

via "Threatpost".
πŸ•΄ Chronicle Folds into Google πŸ•΄

Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Exploit for Microsoft Excel Power Query πŸ•΄

Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.

πŸ“– Read

via "Dark Reading: ".
⚠ Cryptocurrency phish dials back the fear, cranks up the politeness ⚠

Spammers and scammers are getting better at spelling and grammar - so make sure you aren't relying on language alone to spot phishes...

πŸ“– Read

via "Naked Security".
⚠ Google Maps shortcut turns into 100-car mud pie in farmer’s field ⚠

Trying to save 20 minutes, 100 drivers took a Google Maps shortcut... into a field, where the mud-stuck cars then caused a 2-hour delay.

πŸ“– Read

via "Naked Security".
⚠ Mozilla’s bizarre robo-surfer project demonstrates ad snooping ⚠

In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that you're someone else.

πŸ“– Read

via "Naked Security".
⚠ $50 DeepNude app undresses women with a single click ⚠

"I'm not a voyeur, I'm a technology enthusiast,” says the creator, who combined deepfake AI with a need for cash to get ka-CHING!

πŸ“– Read

via "Naked Security".
❌ Death of the VPN: Enterprise Security Needs New Foundations ❌

Twenty years in, enterprise VPNs occupy a uniquely solid position in a changing landscape.

πŸ“– Read

via "Threatpost".
πŸ•΄ Black Hat USA's New Micro Summits Deliver Focused, Practical Security Insights πŸ•΄

This year Black Hat USA is introducing special half-day programs focused on important topics that combine subject matter expertise with networking opportunities.

πŸ“– Read

via "Dark Reading: ".
πŸ” How SMBs can better protect sensitive data against cyberattacks πŸ”

Know your enemy and know your risk are two pieces of advice offered in a new report from security company eSentire.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy πŸ•΄

Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.

πŸ“– Read

via "Dark Reading: ".