πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ The SOC Gets a Makeover πŸ•΄

Today's security operations center is all about reducing the number of alerts with emerging technologies - and enhancing old-school human collaboration. Here's how some real-world SOCs are evolving.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why a Healthy Data Diet Is the Secret to Healthy Security πŸ•΄

In the same way that food is fuel to our bodies, data is the fuel on which our security programs run. Here are 10 action items to put on your cybersecurity menu.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Report: Data Breaches Hit Share Prices, Too πŸ•΄

A data breach has a measurable impact on stock price, according to a report looking at incidents from the past six years

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-14026

In Ice Qube Thermal Management Center versions prior to version 4.13, the web application does not properly authenticate users which may allow an attacker to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Take (Industrial) Control: A Look at the 2018 ICS Threat Landscape πŸ•΄

New research sheds light on the biggest threats to strike ICS systems in the first half of 2018, and what's in store for the rest of this year.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Ties Lazarus to North Korea and Major Hacking Conspiracy ❌

The DoJ said a DPRK spy, Park Jin-hyok, was involved in β€œa conspiracy to conduct multiple destructive cyberattacks around the world."

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ The Best Way To Secure US Elections? Paper Ballots πŸ•΄

Voting machines that do not provide a paper trail or cannot be independently audited should immediately be removed, concludes a new report from the National Academies of Sciences, Engineering, and Medicine.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Attacks on Industrial Control Systems on the Rise ❌

The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Dark web sites could be exposed by routine slip-up ⚠

A simple misconfiguration could expose the IP addresses of dark web sites.

πŸ“– Read

via "Naked Security".
⚠ Firefox finally casts Windows XP users adrift ⚠

Mozilla's browser is waving goodbye to millions of XP holdouts.

πŸ“– Read

via "Naked Security".
❌ Top MacOS App Exfiltrates Browser Histories Behind Users’ Backs ❌

A macOS App called Adware Doctor blocks ads, but share’s user browser history with a China-based domain.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Teen hacker admits to SWATting schools, airline flight ⚠

The teenager made bomb threats to schools, and to a flight between the UK and San Francisco while it was in mid-air.

πŸ“– Read

via "Naked Security".
❌ Threat Actors Eyeing IQY Files To Peddle Malspam ❌

The Necurs Botnet, DarkHydrus and other threat actors are turning to the inconspicuous files.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Former NASA contractor arrested on charges of sextorting seven women ⚠

Richard Gregory Bauer allegedly weaseled private information out of the women on Facebook by pretending to be working on a class project.

πŸ“– Read

via "Naked Security".
❌ Threatpost News Wrap Podcast For Sept. 7 ❌

The Threatpost team breaks down the biggest news from the week ended Sept. 7.

πŸ“– Read

via "The first stop for security news | Threatpost ".
ATENTIONβ€Ό New - CVE-2016-9040

An exploitable denial of service exists in the the Joyent SmartOS OS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFSADDENTRIES when used with a 32 bit model. An attacker can cause a buffer to be allocated and never freed. When repeatedly exploit this will result in memory exhaustion, resulting in a full system denial of service.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Role of Incident Response in ICS Security Compliance πŸ•΄

The data-driven nature of IR can provide many of the reporting requirements governing industrial control system safety, finance, consumer privacy, and notifications.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ British Airways Issues Apology for Severe Data Breach πŸ•΄

The airline "is deeply sorry" for its worst-ever cyberattack, which has affected 380,000 customers.

πŸ“– Read

via "Dark Reading: ".
❌ British Airways Website, Mobile App Breach Compromises 380k ❌

The airline said information like name, address and bank card details like CVC code were compromised.

πŸ“– Read

via "The first stop for security news | Threatpost ".
ATENTIONβ€Ό New - CVE-2017-1115

IBM Campaign 9.1, 9.1.2, and 10 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 121153.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-1114

IBM Campaign 9.1, 9.1.2, and 10 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 121152.

πŸ“– Read

via "National Vulnerability Database".