πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Russian Threat Group May Have Devised a 'Man-on-the-Side' Attack πŸ•΄

Data from an intrusion last year suggests Iron Liberty group may have a new trick up its sleeve, Secureworks says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Android Spyware Has Ties to Election Interference πŸ•΄

Recently revealed surveillance-ware comes from a consultant with close ties to Russia's GRU who was sanctioned by the US for election-tampering.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Senate Report: US Election Security 'Sorely Lacking' in 2016 πŸ•΄

Senate Intelligence Committee report released today cites weaknesses, but finds no evidence of vote-tampering.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-0202

The Apache Storm Logviewer daemon exposes HTTP-accessible endpoints to read/search log files on hosts running Storm. In Apache Storm versions 0.9.1-incubating to 1.2.2, it is possible to read files off the host's file system that were not intended to be accessible via these endpoints.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-11779

In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.

πŸ“– Read

via "National Vulnerability Database".
⚠ S2 Ep1: FaceApp, logic bombs and stranger danger – Naked Security Podcast ⚠

We’re finally back with Series 2 of the Naked Security Podcast. While you’ve been missing us, we’ve been working out how to improve the show and kitting out a dedicated studio. You’ll now find longer episodes with more opportunities to get involved. Send us your general cybersecurity questions and join the discussion via social media […]

πŸ“– Read

via "Naked Security".
⚠ Browser plug-ins peddled personal data from over 4m browsers ⚠

Nacho Analytics gathered data like passwords, tax and prescription data from browser add-ons - and those who bought it can keep it.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2018-20856

An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-20855

An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-20854

An issue was discovered in the Linux kernel before 4.20. drivers/phy/mscc/phy-ocelot-serdes.c has an off-by-one error with a resultant ctrl->phys out-of-bounds read.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ What Every Security Team Should Know About Internet Threats πŸ•΄

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

πŸ“– Read

via "Dark Reading: ".
⚠ BlueKeep guides make imminent public exploit more likely ⚠

A public exploit for Microsoft's BlueKeep vulnerability is just days away. In fact, for those with deep pockets, it's already here.

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Q&A: Inside the Black Hat NOC πŸ•΄

Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.

πŸ“– Read

via "Dark Reading: ".
⚠ Happy SysAdminDay 2019! ⚠

Hey sysadmin, nice tee.

πŸ“– Read

via "Naked Security".
πŸ•΄ 3 Takeaways from the First American Financial Breach πŸ•΄

Data leaks from business logic flaws are not well understood and difficult to identify before they reach production environments. Here's how to find and prevent them.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-20857

Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Black Hat Q&A: Inside the Black Hat NOC πŸ•΄

Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.

πŸ“– Read

via "Dark Reading: ".
πŸ” 66% of SMBs don't believe they are vulnerable to cyberattacks πŸ”

SMBs aren't prioritizing cybersecurity prevention strategies, even though they are at risk of attack, according to a Keeper Security report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Sysadmins need to know – how DO you pronounce β€œsudo”? ⚠

We take on one of #SysAdminDay's thorny issues.

πŸ“– Read

via "Naked Security".
πŸ•΄ FormGet Storage Bucket Leaks Passport Scans, Bank Details πŸ•΄

Exposed files include mortgage and loan information, passport and driver's license scans, internal corporate files, and shipping labels.

πŸ“– Read

via "Dark Reading: ".