πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Data Breach Lessons from the Trenches ❌

How companies can identify their own insecure data, remediate data breaches and proactively secure data against future attacks.

πŸ“– Read

via "Threatpost".
⚠ Monday review – the hot 23 stories of the week ⚠

From RDP BlueKeep's message for admins to Medtronic's recall of hackable insulin pumps - and everything in between.

πŸ“– Read

via "Naked Security".
⚠ New Year’s eve gaming DDoSer lulz himself into a 27-month sentence ⚠

Back in 2014, @DerpTrolling said he attacked sites simply based on requests from people who tweeted suggested targets.

πŸ“– Read

via "Naked Security".
⚠ ISPs call Mozilla β€˜Internet Villain’ for promoting DNS privacy ⚠

ISPA has shortlisted Mozilla for the sort of award that, on the face of it, no tech company should be keen to win - 2019’s Internet Villain.

πŸ“– Read

via "Naked Security".
πŸ•΄ 7 Hot Cybersecurity Trends to Be Highlighted at Black Hat πŸ•΄

Just some of the research and ideas worth checking out at this year's 'security summer camp.'

πŸ“– Read

via "Dark Reading: ".
⚠ Privacy and security risks as Sign In with Apple tweaks Open ID protocol ⚠

An open letter from the OpenID Foundation says that Apple introduced potential risks when it diverged from the OpenID Connect protocol.

πŸ“– Read

via "Naked Security".
πŸ” How to use multiplexing to speed up the SSH πŸ”

Improve the speed SSH can run commands on remote servers with the help of multiplexing.

πŸ“– Read

via "Security on TechRepublic".
⚠ Researchers hack VR worlds ⚠

Hackers just infiltrated virtual reality, enabling them to manipulate users' immersive 3D worlds.

πŸ“– Read

via "Naked Security".
πŸ” British Airways hit with Β£183M GDPR fineβ€”could your business be next? πŸ”

GDPR fines are finally coming down, and companies must be prepared to comply with the regulations or pay up.

πŸ“– Read

via "Security on TechRepublic".
❌ Post-Data Breach, British Airways Slapped With Record $230M Fine ❌

A proposed $230 million fine on British Airways after a data breach would be the biggest GDPR penalty yet.

πŸ“– Read

via "Threatpost".
πŸ” Why Apple should follow Microsoft's move to get rid of passwords πŸ”

Apple is testing biometric authentication as a new way of signing in to iCloud.com.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Smash-and-Grab Crime Threatens Enterprise Security πŸ•΄

Getting your company smartphone or laptop stolen from your car isn't just a hassle; it can have large regulatory ramifications, too. Visibility is the answer.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-11563

An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.7. A carefully constructed email could be used to inject and execute arbitrary stylesheet or JavaScript code in a logged in customer's browser in the context of the OTRS customer panel application.

πŸ“– Read

via "National Vulnerability Database".
❌ Apple Patches iMessage Bug That Bricks iPhones with Out-of-Date Software ❌

Google Project Zero finds Apple iMessage bug that bricks iPhones running older versions of the company's iOS software.

πŸ“– Read

via "Threatpost".
πŸ•΄ Broadcom Moves Forward on Symantec Acquisition πŸ•΄

Reports indicate a deal could be made by mid-July as Broadcom secures financing for the purchase.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-8408 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of setting a SMB folder for the video clippings recorded by the device. It seems that the GET parameters passed in this request (to test if SMB credentials and hostname sent to the device work properly) result in being passed as commands to a "system" API in the function and thus result in command injection on the device. If the firmware version is dissected using binwalk tool, we obtain a cramfs-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "cgibox" is the one that has the vulnerable function "sub_7EAFC" that receives the values sent by the GET request. If we open this binary in IDA-pro we will notice that this follows a ARM little endian format. The function sub_7EAFC in IDA pro is identified to be receiving the values sent in the GET request and the value set in GET parameter "user" is extracted in function sub_7E49C which is then passed to the vulnerable system API call.

πŸ“– Read

via "National Vulnerability Database".
❌ GoBotKR Targets Pirate Torrents to Build a DDoS Botnet ❌

The authors have tweaked a known piece of malware to specifically target Korean TV fans.

πŸ“– Read

via "Threatpost".
πŸ•΄ NIST Sets Draft Guidelines for Government AI πŸ•΄

This is the first formal step in writing the standards that will guide the implementation of AI technologies within the federal government.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Britain Looks to Levy Record GDPR Fine Against British Airways πŸ•΄

The penalty is a sign of things to come, say experts.

πŸ“– Read

via "Dark Reading: ".
❌ Rules-Based Policy Approaches Need to Go ❌

A zero-trust model is the only way to keep up with today's digital complexities.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-8417 (dcs-1100_firmware, dcs-1130_firmware)

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device requires that a user logging into the device provide a username and password. However, the device allows D-Link apps on the mobile devices and desktop to communicate with the device without any authentication. As a part of that communication, the device uses custom version of base64 encoding to pass data back and forth between the apps and the device. However, the same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third party to retrieve the device's password without any authentication by sending just 1 UDP packet with custom base64 encoding. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".