πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Ransomware Sees Triple-Digit Spike in Corporate Detections ❌

A pair of reports released at Black Hat mark the huge shift away from targeting consumers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Yes, FaceApp Really Could Be Sending Your Data to Russia πŸ•΄

FaceApp has an unprecedented level of access to data from 150 million users. What could its endgame be? We unpack three potential risks.

πŸ“– Read

via "Dark Reading: ".
πŸ” Russian phishing campaign using AWS to host landing pages designed to avoid detection πŸ”

Assets used as part of phishing campaigns are being hosted on AWS, with heavy XOR obfuscation to limit detection, according to a Proofpoint report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Ransomware attacks on businesses up 365% this year πŸ”

Cybercriminals are increasingly targeting businesses with ransomware instead of consumers for a bigger payout, according to Malwarebytes.

πŸ“– Read

via "Security on TechRepublic".
⚠ Update your iPhone – remote control holes revealed by researchers ⚠

You might not think your phone is as exposed as an internet server - but it's handling plenty of untrusted data from unknown sources!

πŸ“– Read

via "Naked Security".
❌ Researchers Bypass Apple FaceID Using Biometrics β€˜Achilles Heel’ ❌

Researchers were able to bypass Apple's FaceID using a pair of glasses with tape on the lenses.

πŸ“– Read

via "Threatpost".
πŸ” Huawei doesn't see open source as the fix for spying accusations (but they should) πŸ”

The closed-source, opaque operation of network equipment makes spying accusations difficult to disprove. This could be solved by opening the software stack, but Huawei CSO Andy Purdy disagrees.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2014-8184 (liblouis)

A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Siemens S7 PLCs Share Same Crypto Key Pair, Researchers Find πŸ•΄

Researchers at Black Hat USA reveal how security authentication weaknesses in popular Siemens ICS family let them control a PLC.

πŸ“– Read

via "Dark Reading: ".
❌ Critical RCE Bug Found Lurking in Avaya VoIP Phones ❌

The vulnerability is a decade old with a public exploit, yet remained unpatched in one of the phone giant's most popular models.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says ❌

LAS VEGAS – Supply-chain attacks have nabbed headlines lately thanks to high-profile incidents like the Wipro news last April, where attackers were able to compromise the staffing agency’s network and pivot to their customers. That incident pointed out that supply-chain risk should be thought of in a much more holistic fashion than it usually is, […]

πŸ“– Read

via "Threatpost".
❌ State Farm Falls Victim to Credential-Stuffing Attack ❌

The insurance giant serves at least 83 million U.S. households.

πŸ“– Read

via "Threatpost".
πŸ” Using GDPR Subject Access Requests to Harvest Data πŸ”

In a talk at this year's Black Hat an Oxford University student explained how he used GDPR Access Requests and a Python script to steal a slew of sensitive information on another person.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Ransomware Shifts Focus from Consumers to Businesses πŸ•΄

In addition, ransomware seems likely to continue its evolution in the second half of 2019.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9292

6kbbs 7.1 and 8.0 allows CSRF via portalchannel_ajax.php (id or code parameter) or admin.php (fileids parameter).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Behavioral Data Shaped a Security Training Makeover πŸ•΄

A new program leveraged behavioral data of employees to determine when they excelled at security and where they needed improvement.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Equifax CISO: 'Trust Starts and Ends with You' πŸ•΄

Organizational culture is key to good enterprise security posture, Jamil Farshchi told Black Hat attendees.

πŸ“– Read

via "Dark Reading: ".
❌ Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward ❌

Apple is opening its once-private bug bounty program to all researchers, as well as boosting vulnerability payouts and expanding the product scope to include MacOS.

πŸ“– Read

via "Threatpost".
πŸ” Black Hat 2019: Social media influence campaigns, ATM hacking, and big business πŸ”

TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Black Hat 2019 trends: Social media influence campaigns, big business, ATM hacking πŸ”

TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Microsoft's new vulnerability tracking service is about IT productivity πŸ”

With so many threats and vulnerabilities to deal with, just knowing which actions you should prioritize can be hard. The new Threat & Vulnerability Management service from Microsoft should help.

πŸ“– Read

via "Security on TechRepublic".