πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2016-10769

cPanel before 60.0.25 allows an open redirect via /cgi-sys/FormMail-clone.cgi (SEC-162).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10768

cPanel before 60.0.25 allows file-overwrite operations during preparation for MySQL upgrades (SEC-161).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10767

cPanel before 60.0.25 allows stored XSS in the WHM Repair Mailbox Permissions interface (SEC-159).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Fighting Back Against Mobile Fraudsters πŸ•΄

The first step toward identifying and preventing mobile fraud threats is acknowledging that mobile security requires a unique solution.

πŸ“– Read

via "Dark Reading: ".
❌ Google and ARM Tackle Android Bugs with Memory-Tagging ❌

Buffer overflows, race conditions, use-after-free and more account for more than half of all vulnerabilities in the Android platform.

πŸ“– Read

via "Threatpost".
❌ Microsoft Lab Offers $300K For Working Azure Exploits ❌

Microsoft says its Azure Security Lab will allow researchers to attack its cloud environment in a customer-safe way.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2016-10766 (edx-platform)

edx-platform before 2016-06-06 allows CSRF.

πŸ“– Read

via "National Vulnerability Database".
❌ Puzzling Gwmndy Botnet Focuses on Low-Volume Proxy Connections ❌

After infecting Fiberhome routers, its sole purpose seems to be setting up SOCKS5 proxies.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Opens Azure Security Lab, Raises Top Azure Bounty to $40K πŸ•΄

Microsoft has invited security experts to 'come and do their worst' to mimic cybercriminals in the Azure Security Lab.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Database of 200M-Plus Potential 'Sextortion' Victims Published πŸ•΄

Researchers have discovered a botnet (and the database it feeds on) dedicated to extortion schemes.

πŸ“– Read

via "Dark Reading: ".
❌ E3 Website Leaks Private Addresses for Thousands of Journalists ❌

Personal data of 2,000 journalists was found publicly accessible on a spreadsheet on the website for popular trade show E3.

πŸ“– Read

via "Threatpost".
πŸ•΄ Destructive Malware Attacks Up 200% in 2019 πŸ•΄

Organizations hit with destructive malware can lose more than 12,000 machines and face $200 million or more in costs, IBM X-Force reports.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Used in Multimillion-Dollar Attacks Gets More Automated πŸ•΄

The authors of MegaCortex appear to have traded security for convenience and speed, say researchers at Accenture iDefense.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Mimecast Rejected Over 67 Million Emails. Here's What It Learned πŸ•΄

New research warns that security pros must guard against updates to older malware and more manipulative social-engineering techniques.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Securing DevOps Is About People and Culture πŸ•΄

Preconceived notions and divisions make building security into the software development life cycle an uphill battle for many organizations.

πŸ“– Read

via "Dark Reading: ".
⚠ Attackers ransom bookseller’s exposed MongoDB database ⚠

Another database has fallen to extortion hackers, this time containing 2.1 million records belonging to Mexican bookseller, LibrerΓ­a PorrΓΊa.

πŸ“– Read

via "Naked Security".
⚠ GitHub β€˜encourages’ hacking, says lawsuit following Capital One breach ⚠

The class action charges Capital One and GitHub, charging it with being "friendly" (at least) toward hacking and for the hackers' posts.

πŸ“– Read

via "Naked Security".
πŸ•΄ Hollywood-Style Hacker Fight πŸ•΄

What movies much? Here's what happens when two hackers try to outhack each other.

πŸ“– Read

via "Dark Reading: ".
⚠ Fake Dell support rep admits to talking US colleges out of $874,000 ⚠

His victims: UCSD and a Pennsylvania university. He hid out in Kenya for nearly 8 months before being nabbed.

πŸ“– Read

via "Naked Security".
⚠ Baldr malware unpicked with a little help from crooks’ bad opsec ⚠

New research from Sophos takes an exhaustive look at the Baldr password stealer.

πŸ“– Read

via "Naked Security".
πŸ•΄ Security & the Infinite Capacity to Rationalize πŸ•΄

To improve the security posture of our organizations, we must open our eyes to rationalization and put an end to it with logic. Here's how.

πŸ“– Read

via "Dark Reading: ".