πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in 'Incognito Mode' πŸ–‹οΈ

Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled users by tracking their surfing activity who thought that their internet use remained private when using the β€œincognito” or β€œprivate” mode on web browsers.The class-action lawsuit sought at least $5 billion in damages. The settlement terms were not disclosed.The plaintiffs had

πŸ“– Read

via "The Hacker News".
πŸ“” Australian Court Service Hacked, Hearing Recordings at Risk πŸ“”

Court Services Victoria said the incident may have compromised recordings involving people whose identities are protected

πŸ“– Read

via "Infosecurity Magazine".
πŸ“’ Google settles $5 billion privacy lawsuit ahead of cookie phase-out πŸ“’

Google has agreed to settle a $5 billion lawsuit over claims the it covertly tracked millions of users

πŸ“– Read

via "ITPro".
πŸ“’ Generative AI poses a β€œmajor risk” to UK national security as report warns over risk of radicalization πŸ“’

Terrorism tsar John Hall has called for new laws to mitigate the risks of generative AI

πŸ“– Read

via "ITPro".
πŸ“’ Hackers use LinkedIn to target UK nuclear waste firm πŸ“’

Radioactive Waste Management said attackers have leveraged LinkedIn in a spear phishing campaign

πŸ“– Read

via "ITPro".
πŸ•΄ 10 Years After Yahoo Breach, What's Changed? (Not Much) πŸ•΄

Yahoo customers suffered the largest data breaches in history by some measures. But a decade on, experts warn, we still haven't learned our lesson.

πŸ“– Read

via "Dark Reading".
πŸ›  Stegano 0.11.3 πŸ› 

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

πŸ“– Read

via "Packet Storm Security".
πŸ“” Over $80m in Crypto Stolen in Cyber-Attack on Orbit Chain πŸ“”

Orbit Chain said that the stolen cryptocurrency currently remains unmoved

πŸ“– Read

via "Infosecurity Magazine".
πŸ“’ Russia-linked group could be behind Australian state court cyber attack πŸ“’

A ransomware group was able to gain access to a database containing courtroom recordings of trials between November and December

πŸ“– Read

via "ITPro".
πŸ•΄ Startups Scramble to Build Immediate AI Security πŸ•΄

AI may be inherently insecure, but only a handful of startups have put forward real visions to mitigate AI's threats and keep data private.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Localization Mandates, AI Regs to Pose Major Data Challenges in 2024 πŸ•΄

With more than three-quarters of countries adopting some form of data localization and, soon, three-quarters of people worldwide protected by privacy rules, companies need to take care.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CISO Planning for 2024 May Struggle When It Comes to AI πŸ•΄

Artificial intelligence (AI) is constantly evolving. How can security executives plan for something so unpredictable?

πŸ“– Read

via "Dark Reading".
πŸ•΄ Israel Battles Spike in Wartime Hacktivist, OT Cyberattacks πŸ•΄

Israel's cybersecurity industry made strides in the past year despite the backdrop of the war in Gaza.

πŸ“– Read

via "Dark Reading".
πŸ›  RansomLord Anti-Ransomware Exploit Tool 2 πŸ› 

RansomLord is a proof-of-concept tool that automates the creation of PE files, used to compromise ransomware pre-encryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Google Settles Lawsuit Over Tracking 'Incognito Mode' Chrome Users πŸ•΄

Google tracked privacy-conscious Internet users, and now it's paying for it.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cybercriminals Share Millions of Stolen Records During Holiday Break πŸ•΄

The "Leaksmus" event on the Dark Web exposed some 50 million records containing sensitive information from people all around the world.

πŸ“– Read

via "Dark Reading".
‼️CVE-2024-0185‼️

A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboardteacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB249443.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-0186‼️

A vulnerability classified as problematic has been found in HuiRan Host Reseller System up to 2.0.0. Affected is an unknown function of the file userindexfindpass?do4 of the component HTTP POST Request Handler. The manipulation leads to weak password recovery. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB249444.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2023-32831‼️

In wlan driver, there is a possible PIN crack due to use of insufficiently random values. This could lead to local information disclosure with no execution privileges needed. User interaction is not needed for exploitation. Patch ID WCNCR00325055 Issue ID MSV868.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2023-32872‼️

In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID ALPS08308607 Issue ID ALPS08308607.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2023-32874‼️

In Modem IMS Stack, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID MOLY01161803 Issue ID MOLY01161803 MSV893.

πŸ“– Read more

Via "National Vulnerability Database"