πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Black Hat 2019: WhatsApp Users Still Open to Message Manipulation ❌

Attack vectors disclosed last year are still fully exploitable, researchers demoed at Black Hat USA 2019.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep3: Ransomware, surveillance and data theft – Naked Security Podcast ⚠

Episode 3 of the podcast is now live. This week, host Anna Brading is joined by Paul Ducklin, Mark Stockley and Ben Jones.

πŸ“– Read

via "Naked Security".
⚠ More than 2m AT&T phones illegally unlocked by bribed insiders ⚠

The alleged, now indicted ringleader paid more than $1m in bribes to insiders who planted malware and hardware for remote unlocking.

πŸ“– Read

via "Naked Security".
⚠ Twitter may have shared your data with its ad partners without your permission ⚠

Some user data, such as country and device type, was exposed to some advertisers for over a year.

πŸ“– Read

via "Naked Security".
πŸ•΄ Slow Your Roll Before Disclosing a Security Incident πŸ•΄

Transparency rules, but taking the right amount of time to figure out what happened will go a long way toward setting the record straight.

πŸ“– Read

via "Dark Reading: ".
⚠ Cisco 220 Series Smart Switch owners told to apply urgent patch ⚠

Businesses running any of Cisco’s 220 Series Smart Switches have some urgent patching work on their hands.

πŸ“– Read

via "Naked Security".
πŸ•΄ WhatsApp Messages Can Be Intercepted, Manipulated πŸ•΄

Check Point security researchers demonstrate how a dangerous security weakness in the messaging application can be abused to spread fake news and carry out online scams.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Enterprises Must Be Wary of Ransomware Targeting Network File Shares & Cloud Assets πŸ•΄

New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.

πŸ“– Read

via "Dark Reading: ".
❌ The Threat in the Cloud: Phishing Abuses Amazon AWS S3 Buckets ❌

An ongoing campaign is hosting its phishing landing pages on enterprise-class public cloud storage services -- a nascent trend meant to throw defenders off.

πŸ“– Read

via "Threatpost".
❌ Ransomware Sees Triple-Digit Spike in Corporate Detections ❌

A pair of reports released at Black Hat mark the huge shift away from targeting consumers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Yes, FaceApp Really Could Be Sending Your Data to Russia πŸ•΄

FaceApp has an unprecedented level of access to data from 150 million users. What could its endgame be? We unpack three potential risks.

πŸ“– Read

via "Dark Reading: ".
πŸ” Russian phishing campaign using AWS to host landing pages designed to avoid detection πŸ”

Assets used as part of phishing campaigns are being hosted on AWS, with heavy XOR obfuscation to limit detection, according to a Proofpoint report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Ransomware attacks on businesses up 365% this year πŸ”

Cybercriminals are increasingly targeting businesses with ransomware instead of consumers for a bigger payout, according to Malwarebytes.

πŸ“– Read

via "Security on TechRepublic".
⚠ Update your iPhone – remote control holes revealed by researchers ⚠

You might not think your phone is as exposed as an internet server - but it's handling plenty of untrusted data from unknown sources!

πŸ“– Read

via "Naked Security".
❌ Researchers Bypass Apple FaceID Using Biometrics β€˜Achilles Heel’ ❌

Researchers were able to bypass Apple's FaceID using a pair of glasses with tape on the lenses.

πŸ“– Read

via "Threatpost".
πŸ” Huawei doesn't see open source as the fix for spying accusations (but they should) πŸ”

The closed-source, opaque operation of network equipment makes spying accusations difficult to disprove. This could be solved by opening the software stack, but Huawei CSO Andy Purdy disagrees.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2014-8184 (liblouis)

A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Siemens S7 PLCs Share Same Crypto Key Pair, Researchers Find πŸ•΄

Researchers at Black Hat USA reveal how security authentication weaknesses in popular Siemens ICS family let them control a PLC.

πŸ“– Read

via "Dark Reading: ".
❌ Critical RCE Bug Found Lurking in Avaya VoIP Phones ❌

The vulnerability is a decade old with a public exploit, yet remained unpatched in one of the phone giant's most popular models.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says ❌

LAS VEGAS – Supply-chain attacks have nabbed headlines lately thanks to high-profile incidents like the Wipro news last April, where attackers were able to compromise the staffing agency’s network and pivot to their customers. That incident pointed out that supply-chain risk should be thought of in a much more holistic fashion than it usually is, […]

πŸ“– Read

via "Threatpost".
❌ State Farm Falls Victim to Credential-Stuffing Attack ❌

The insurance giant serves at least 83 million U.S. households.

πŸ“– Read

via "Threatpost".