πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Employee Accessed, Abused Customer Data at American Express πŸ”

An employee - since terminated - at the financial services corporation is being investigated for fraud after accessing and stealing cardholder data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Why This New Cybergang is Heralding a New Age For BEC ❌

Cybergang Silent Starling is taking BEC to the next level by targeting suppliers and going after their customers.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Silent Starling Attack Group Puts Spin on BEC πŸ•΄

The West African cybergang has successfully infiltrated more than 500 companies using a tactic dubbed 'vendor email compromise.'

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Millions More Embedded Devices Contain Vulnerable IPnet Software πŸ•΄

FDA, DHS issue fresh warnings on easily exploitable URGENT/11 flaws in medical, SCADA systems, industrial controllers, and other devices.

πŸ“– Read

via "Dark Reading: ".
πŸ›  PDFGrab 0.4.4 πŸ› 

pdfgrab is a python script that analyzes pdf files to extract their metadata. You can direct it to analyze a single file, a directory of pdfs, provide it a url, or have it leverage googlesearch to get pdfs at a target site.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Clam AntiVirus Toolkit 0.102.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2019-10212

A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.

πŸ“– Read

via "National Vulnerability Database".
❌ Zendesk Exposes 10,000 Accounts to Unknown Third Party ❌

Zendesk says access occurred in 2016 and that only a small percentage of customers were impacted.

πŸ“– Read

via "Threatpost".
πŸ•΄ Stalkware on the Rise Globally πŸ•΄

Stalkware is being installed on more and more victims' devices, and the trend is only accelerating, according to a new report.

πŸ“– Read

via "Dark Reading: ".
⚠ Ransomware attacks paralyze, and sometimes crush, hospitals ⚠

New attacks on the perennially besieged sector have crippled hospitals in the US and Australia and caused one health clinic to shut down.

πŸ“– Read

via "Naked Security".
πŸ•΄ How the City of Angels Is Tackling Cyber Devilry πŸ•΄

A new mobile app makes a cybersecurity threat lab available to more small businesses in Los Angeles.

πŸ“– Read

via "Dark Reading: ".
⚠ Google’s Password Manager now checks for breached credentials ⚠

Google has taken the next step in its strategy to secure users' passwords. The search giant has taken a password-checking feature released in February as an extension to its Chrome browser and embedded it directly into its password manager service.

πŸ“– Read

via "Naked Security".
πŸ•΄ Cartoon Contest: Second Wind πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
⚠ PDF encryption standard weaknesses uncovered ⚠

Researchers have discovered weaknesses in PDF encryption which could be exploited to reveal the plaintext contents of a file to an attacker.

πŸ“– Read

via "Naked Security".
⚠ No federal privacy law will make it in the US this year, sources say ⚠

Without one, the companies that collect our data will likely face compliance with California's take-no-prisoners law, in effect 1 January 2020.

πŸ“– Read

via "Naked Security".
❌ WhatsApp Flaw Opens Android Devices to Remote Code Execution ❌

A double-free bug could allow an attacker to achieve remote code execution; users are encouraged to update to a patched version of the messaging app.

πŸ“– Read

via "Threatpost".
πŸ•΄ How FISMA Requirements Relate to Firmware Security πŸ•΄

Federal guidelines can help all organizations pragmatically and meaningfully improve their firmware security.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 20M Russians' Personal Tax Records Exposed in Data Leak πŸ•΄

An unprotected Elasticsearch cluster contained personally identifiable information on Russian citizens from 2009 to 2016.

πŸ“– Read

via "Dark Reading: ".
❌ Foxit PDF Reader Vulnerable to 8 High-Severity Flaws ❌

Eight high-severity vulnerabilities exist in the Foxit Reader tool for editing PDF files.

πŸ“– Read

via "Threatpost".
πŸ” Black Hat 2019: Monitoring network operations and managing digital risks πŸ”

Black Hat's Network Operations team members discuss looking for the "bad within the bad." Also, RSA's CTO talks about managing risks to prevent an individual problem from becoming a societal problem.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to protect your organization against insider threats πŸ”

Whether intentionally or unintentionally, employees can pose a significant security risk to company data, according to a new report from data protection firm Code42.

πŸ“– Read

via "Security on TechRepublic".