πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2015-9306

The wp-ultimate-csv-importer plugin before 3.8.1 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-9305

The wp-google-map-plugin plugin before 2.3.7 for WordPress has XSS related to the add_query_arg() and remove_query_arg() functions.

πŸ“– Read

via "National Vulnerability Database".
❌ Tips for Successful Zero-Trust Implementation ❌

"Never trust, always verify" is a solid security concept -- but it's important to realize that putting it into practice can be complex.

πŸ“– Read

via "Threatpost".
πŸ” Apple Opens Bug Bounty Program to All, Changes Payout Structure πŸ”

At Black Hat, the head of Apple’s Security Engineering team announced new enhancements to its bug bounty program, including one vulnerability that could fetch a researcher $1M.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ More Focus on Security as Payment Technologies Proliferate πŸ•΄

Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9304

The ultimate-member plugin before 1.3.18 for WordPress has XSS via text input.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-9303

The simple-share-buttons-adder plugin before 6.0.0 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Pros, Congress Reps Talk National Cybersecurity at DEF CON πŸ•΄

Cybersecurity and government leaders discussed why Congress is unprepared for a major cyberattack and how the two parties can collaborate.

πŸ“– Read

via "Dark Reading: ".
❌ 4 Dating Apps Pinpoint Users’ Precise Locations – and Leak the Data ❌

Grindr, Romeo, Recon and 3fun were found to expose users' exact locations, just by knowing a user name.

πŸ“– Read

via "Threatpost".
πŸ•΄ Hackers Can Hurt Victims with Noise πŸ•΄

Research presented at DEF CON shows that attackers can hijack Wi-Fi- and Bluetooth-connected speakers to produce damaging sounds.

πŸ“– Read

via "Dark Reading: ".
❌ AT&T, T-Mobile, Sprint, Verizon Blasted For Data Privacy Policies ❌

A U.S. senator is giving the four telecommunications companies until Sept. 4 to outline how they plan to better protect customer data privacy.

πŸ“– Read

via "Threatpost".
πŸ•΄ FBI Plans to Monitor Social Media May Spark Privacy Issues πŸ•΄

A new initiative to pull data from social media platforms may clash with policies prohibiting the use of information for mass surveillance.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Flaws Discovered in 40 Microsoft-Certified Device Drivers πŸ•΄

Attackers can use vulnerable drivers to escalate privilege and execute malicious code in every part of the system.

πŸ“– Read

via "Dark Reading: ".
πŸ” Famous con man Frank Abagnale: Crime is 4,000 times easier today πŸ”

Frank Abagnale, the real life inspiration behind the Spielberg hit movie, "Catch Me If You Can" talks to TechRepublic's Karen Roby about cybersecurity, passwords and where executives go wrong.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Researchers Show How SQLite Can Be Modified to Attack Apps πŸ•΄

New technique involves query hijacking to trigger a wide range of memory safety issues within the widely used database engine, Check Point says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Famous con man Frank Abagnale: Crime is 4,000 times easier today πŸ”

Frank Abagnale, the real life inspiration behind the Spielberg hit, "Catch Me If You Can" talks to TechRepublic's Karen Roby about cybersecurity, passwords and where executives go wrong.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DEF CON Voting Village: It's About 'Risk' πŸ•΄

DHS, security experts worry about nation-state or other actors waging a disruptive or other attack on the 2020 election to sow distrust of the election process.

πŸ“– Read

via "Dark Reading: ".
⚠ Android users menaced by pre-installed malware ⚠

Google Project Zero researcher Maddie Stone has found a new and concerning route for malware to find its way on to Android devices - malicious apps that have been factory pre-installed.

πŸ“– Read

via "Naked Security".
πŸ•΄ Moving on Up: Ready to Climb to the Cloud? πŸ•΄

Among the complications: traditional security tools work poorly or not at all in the cloud, and if a company screws up, the whole Internet will know.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Moving on Up: Ready for Your Apps to Live in the Cloud? πŸ•΄

Among the complications: traditional security tools work poorly or not at all in the cloud, and if a company screws up, the whole Internet will know.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".