πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Update your iPhone – remote control holes revealed by researchers ⚠

You might not think your phone is as exposed as an internet server - but it's handling plenty of untrusted data from unknown sources!

πŸ“– Read

via "Naked Security".
❌ Researchers Bypass Apple FaceID Using Biometrics β€˜Achilles Heel’ ❌

Researchers were able to bypass Apple's FaceID using a pair of glasses with tape on the lenses.

πŸ“– Read

via "Threatpost".
πŸ” Huawei doesn't see open source as the fix for spying accusations (but they should) πŸ”

The closed-source, opaque operation of network equipment makes spying accusations difficult to disprove. This could be solved by opening the software stack, but Huawei CSO Andy Purdy disagrees.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2014-8184 (liblouis)

A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Siemens S7 PLCs Share Same Crypto Key Pair, Researchers Find πŸ•΄

Researchers at Black Hat USA reveal how security authentication weaknesses in popular Siemens ICS family let them control a PLC.

πŸ“– Read

via "Dark Reading: ".
❌ Critical RCE Bug Found Lurking in Avaya VoIP Phones ❌

The vulnerability is a decade old with a public exploit, yet remained unpatched in one of the phone giant's most popular models.

πŸ“– Read

via "Threatpost".
❌ Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says ❌

LAS VEGAS – Supply-chain attacks have nabbed headlines lately thanks to high-profile incidents like the Wipro news last April, where attackers were able to compromise the staffing agency’s network and pivot to their customers. That incident pointed out that supply-chain risk should be thought of in a much more holistic fashion than it usually is, […]

πŸ“– Read

via "Threatpost".
❌ State Farm Falls Victim to Credential-Stuffing Attack ❌

The insurance giant serves at least 83 million U.S. households.

πŸ“– Read

via "Threatpost".
πŸ” Using GDPR Subject Access Requests to Harvest Data πŸ”

In a talk at this year's Black Hat an Oxford University student explained how he used GDPR Access Requests and a Python script to steal a slew of sensitive information on another person.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Ransomware Shifts Focus from Consumers to Businesses πŸ•΄

In addition, ransomware seems likely to continue its evolution in the second half of 2019.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9292

6kbbs 7.1 and 8.0 allows CSRF via portalchannel_ajax.php (id or code parameter) or admin.php (fileids parameter).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Behavioral Data Shaped a Security Training Makeover πŸ•΄

A new program leveraged behavioral data of employees to determine when they excelled at security and where they needed improvement.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Equifax CISO: 'Trust Starts and Ends with You' πŸ•΄

Organizational culture is key to good enterprise security posture, Jamil Farshchi told Black Hat attendees.

πŸ“– Read

via "Dark Reading: ".
❌ Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward ❌

Apple is opening its once-private bug bounty program to all researchers, as well as boosting vulnerability payouts and expanding the product scope to include MacOS.

πŸ“– Read

via "Threatpost".
πŸ” Black Hat 2019: Social media influence campaigns, ATM hacking, and big business πŸ”

TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Black Hat 2019 trends: Social media influence campaigns, big business, ATM hacking πŸ”

TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Microsoft's new vulnerability tracking service is about IT productivity πŸ”

With so many threats and vulnerabilities to deal with, just knowing which actions you should prioritize can be hard. The new Threat & Vulnerability Management service from Microsoft should help.

πŸ“– Read

via "Security on TechRepublic".
⚠ Your Skype Translator calls may be heard by humans ⚠

A Skype Translator insider claims it's good because humans are listening in and helping to train its artificial intelligence.

πŸ“– Read

via "Naked Security".
❌ Election Security Threats: From Misinformation to Voting Machine Flaws ❌

From insecure voting machines to social media misinformation, governments have alot to think about when it comes to securing elections.

πŸ“– Read

via "Threatpost".
⚠ Parents, it’s time to delete Pet Chat from your child’s LeapPad ⚠

LeapFrog has done lots to fix the security of the LeapPad. Now all that's left is for parents to scrape Pet Chat off of older tablets.

πŸ“– Read

via "Naked Security".
⚠ Instagram boots ad partner for location tracking and scraping stories ⚠

A β€œpreferred Facebook Marketing Partner” is alleged to have tracked millions of Instagram users' locations and stories.

πŸ“– Read

via "Naked Security".