πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2015-5297 (pixman)

An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
❌ Black Hat 2019: Security’s Powerful Cultural Transformation ❌

Dino Dai Zovi, mobile security lead at Square, discusses ongoing transformation in security's role in the workplace during the keynote.

πŸ“– Read

via "Threatpost".
πŸ•΄ Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says πŸ•΄

Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Enterprises Must Be Wary of Ransomware Targeting Network File Shares &Cloud Assets πŸ•΄

New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.

πŸ“– Read

via "Dark Reading: ".
❌ Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights ❌

From government surveillance to domestic abuse, technology is being used in new and disturbing ways that threaten human rights - how can the security industry fight back?

πŸ“– Read

via "Threatpost".
πŸ•΄ North Korean Cyber Ops Reportedly Stole $2B to Fund Weapons Programs πŸ•΄

Unlike many nations, North Korea often engages in cyber operations to generate much-needed cash for the country's coffers. In that respect, its hackers have been extremely successful.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Buttigieg Campaign Adds a CISO πŸ•΄

Democratic presidential hopeful Pete Buttigieg's campaign reportedly may be the first to bring a security exec on board.

πŸ“– Read

via "Dark Reading: ".
πŸ” Hacking for the Greater Good Has Never Been Easier πŸ”

Experts on a panel at Black Hat stressed Wednesday that there's never been a greater need for hackers and public interest technologists to foster a safe digital society.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Researchers Show Vulnerabilities in Facial Recognition πŸ•΄

The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat 2019: Security Culture Is Everyone's Culture πŸ•΄

In his Black Hat USA keynote, Square's Dino Dai Zovi discussed lessons learned throughout his cybersecurity career and why culture trumps strategy.

πŸ“– Read

via "Dark Reading: ".
❌ Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks ❌

Academic researchers carry out attacks on high-end commercial devices as well as narrowband IoT sensors.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack ❌

At Black Hat USA 2019, researchers showed how a previously-disclosed flaw on Windows systems that could allow arbitrary code execution could also impact Hyper-V.

πŸ“– Read

via "Threatpost".
⚠ Microsoft puts another nail in VBScript coffin ⚠

Listen up, VBScript fans: your favourite scripting language's days are numbered.

πŸ“– Read

via "Naked Security".
❌ DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door ❌

A raft of bugs in six popular models can allow a hacker to wreak havoc on a corporate network.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2019: WhatsApp Users Still Open to Message Manipulation ❌

Attack vectors disclosed last year are still fully exploitable, researchers demoed at Black Hat USA 2019.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep3: Ransomware, surveillance and data theft – Naked Security Podcast ⚠

Episode 3 of the podcast is now live. This week, host Anna Brading is joined by Paul Ducklin, Mark Stockley and Ben Jones.

πŸ“– Read

via "Naked Security".
⚠ More than 2m AT&T phones illegally unlocked by bribed insiders ⚠

The alleged, now indicted ringleader paid more than $1m in bribes to insiders who planted malware and hardware for remote unlocking.

πŸ“– Read

via "Naked Security".
⚠ Twitter may have shared your data with its ad partners without your permission ⚠

Some user data, such as country and device type, was exposed to some advertisers for over a year.

πŸ“– Read

via "Naked Security".
πŸ•΄ Slow Your Roll Before Disclosing a Security Incident πŸ•΄

Transparency rules, but taking the right amount of time to figure out what happened will go a long way toward setting the record straight.

πŸ“– Read

via "Dark Reading: ".
⚠ Cisco 220 Series Smart Switch owners told to apply urgent patch ⚠

Businesses running any of Cisco’s 220 Series Smart Switches have some urgent patching work on their hands.

πŸ“– Read

via "Naked Security".
πŸ•΄ WhatsApp Messages Can Be Intercepted, Manipulated πŸ•΄

Check Point security researchers demonstrate how a dangerous security weakness in the messaging application can be abused to spread fake news and carry out online scams.

πŸ“– Read

via "Dark Reading: ".