πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Latest Android patches fix critical β€˜QualPwn’ Wi-Fi flaws ⚠

The August 2019 security bulletin is out - and two of the critical flaws could allow an attacker to compromise the Android system kernel.

πŸ“– Read

via "Naked Security".
⚠ Banking PINs exposed in Monzo secure storage slip-up ⚠

When is a secure PIN not a secure PIN? When you accidentally store it in your log files.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Key to Enterprisewide Encryption πŸ•΄

Security teams have been slow to embrace enterprisewide encryption, and for good reasons. But the truth is, it doesn't have to be an all-or-nothing endeavor.

πŸ“– Read

via "Dark Reading: ".
❌ Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids ❌

Several serious privacy flaws in a kid's tablet were disclosed this year at Black Hat, which could allow a bad actor to track or send messages to children.

πŸ“– Read

via "Threatpost".
⚠ Don’t fall for fake Equifax settlement sites, warns FTC ⚠

Equifictitious sites popped up within days of Equifax agreeing to pay up to $700m to settle claims over the 2017 data breach.

πŸ“– Read

via "Naked Security".
❌ Security Vulnerabilities Are Increasingly Putting Kids at Risk ❌

A kid's tablet with security vulnerabilities is only the latest privacy faux pas in a children's connected device.

πŸ“– Read

via "Threatpost".
⚠ Scammers recruiting money mules on dating sites is on the rise, says FBI ⚠

It's not longer enough to be wary of flash-in-the-pan "lovers" who ask you to send money; now they're asking you to open accounts for them.

πŸ“– Read

via "Naked Security".
πŸ” Why do so many wireless routers lack basic security protections? πŸ”

Many popular routers include security flaws, but here are some tips on how to secure your wireless router, according to Consumer Reports.

πŸ“– Read

via "Security on TechRepublic".
❌ New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses ❌

Researchers demonstrate a new side-channel attack that bypass mitigations against Spectre and Meltdown.

πŸ“– Read

via "Threatpost".
πŸ•΄ Rethinking Website Spoofing Mitigation πŸ•΄

Deception technology is evolving rapidly, making it easier for organizations to turn the tables on their attackers. Here's how.

πŸ“– Read

via "Dark Reading: ".
⚠ Don’t let the crooks β€˜borrow’ your home router as a hacking server ⚠

Crooks don't have to break *into* your network to benefit - they can bounce *off* it so you take the blame and look like a hacker yourself.

πŸ“– Read

via "Naked Security".
πŸ” How the Air Force used a bug bounty program to hack its own cloud server πŸ”

The Air Force paid out $123,000 to researchers who found vulnerabilities in the organization's move to the cloud. Here's why.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Businesses need to patch for BlueKeep to avoid another WannaCry πŸ”

BitSight is sounding an alarm over the potential for patching to taper off, leaving legacy systems at risk for the potentially potent vulnerability.

πŸ“– Read

via "Security on TechRepublic".
❌ Smominru Cryptominer Scrapes Credentials for Half-Million Machines ❌

The adversaries have retooled with EternalBlue and credential theft to add a new "access mining" revenue stream.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2015-9291 (cpanel)

cPanel before 11.52.0.13 does not prevent arbitrary file-read operations via get_information_for_applications (CPANEL-1221).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5297 (pixman)

An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
❌ Black Hat 2019: Security’s Powerful Cultural Transformation ❌

Dino Dai Zovi, mobile security lead at Square, discusses ongoing transformation in security's role in the workplace during the keynote.

πŸ“– Read

via "Threatpost".
πŸ•΄ Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says πŸ•΄

Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Enterprises Must Be Wary of Ransomware Targeting Network File Shares &Cloud Assets πŸ•΄

New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.

πŸ“– Read

via "Dark Reading: ".
❌ Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights ❌

From government surveillance to domestic abuse, technology is being used in new and disturbing ways that threaten human rights - how can the security industry fight back?

πŸ“– Read

via "Threatpost".
πŸ•΄ North Korean Cyber Ops Reportedly Stole $2B to Fund Weapons Programs πŸ•΄

Unlike many nations, North Korea often engages in cyber operations to generate much-needed cash for the country's coffers. In that respect, its hackers have been extremely successful.

πŸ“– Read

via "Dark Reading: ".