πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” State of Washington has new laws and the Air National Guard to help secure 2018 midterm election πŸ”

Washington state aims to stay protected this election season via anti-hacking efforts of the Air National Guard, as well as strengthened audit procedures

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Inside the Dark Web's 'Help Wanted' Ads πŸ•΄

How cybercriminals recruit everyone from car drivers to corporate insiders and pay them according to the risk they assume.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-9069

A use-after-free in nsINode::ReplaceOrInsertBefore during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox < 50.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Apache Access Vulnerability Could Affect Thousands of Applications πŸ•΄

A recently discovered issue with a common file access method could be a major new attack surface for malware authors.

πŸ“– Read

via "Dark Reading: ".
❌ GreyEnergy Spy APT Mounts Sophisticated Effort Against Critical Infrastructure ❌

The group is a successor to BlackEnergy and a subset of the TeleBots gang--and its activity is potentially a prelude to a much more destructive attack.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Tumblr Privacy Bug Could Have Exposed Sensitive Account Data ❌

Tumblr stressed that there is no evidence the security bug was being abused or that unprotected account data was accessed.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Apple to US users: Here's how you can now see what personal data we hold on you πŸ”

Apple's privacy tools now go beyond Europe, so more now get to download the personal data it has collected.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why cloud security is the top IT budget priority for 2019 πŸ”

Research from Threat Stack found that 54% of companies are worried about outgrowing their current security solutions.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 7 Ways A Collaboration System Could Wreck Your IT Security πŸ•΄

The same traits that make collaboration systems so useful for team communications can help hackers, too.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why digital transformation puts you at greater risk for cyberattacks πŸ”

Companies that do not keep up with their digital transformation initiatives may see a $1 million or more loss due to cyberattacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 ways to maximize customers' data security πŸ”

Customers are starting to get the message that their data is valuable. Tom Merritt offers five suggestions to ensure your customers' data isn't vulnerable to attack.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Former Equifax Manager Sentenced for Insider Trading πŸ•΄

Sudhakar Bonthu bought and sold Equifax stock options prior to the public disclosure of its 2017 data breach.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 ways to maximize customer data security πŸ”

Customers are starting to get the message that their data is valuable. Tom Merritt offers five suggestions to ensure your customers' data isn't vulnerable to attack.

πŸ“– Read

via "Security on TechRepublic".
❌ New APT Could Signal Reemergence of Notorious Comment Crew ❌

A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crew's proprietary code.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ New Security Woes for Popular IoT Protocols πŸ•΄

Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How to Get Consumers to Forgive You for a Breach πŸ•΄

It starts with already-established trust, a new survey shows.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-4633

Multiple SQL injection vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow (1) remote attackers to execute arbitrary SQL commands via the number parameter to opac-tags_subject.pl in the OPAC interface or (2) remote authenticated users to execute arbitrary SQL commands via the Filter or (3) Criteria parameter to reports/borrowers_out.pl in the Staff interface.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-4632

Multiple directory traversal vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.

πŸ“– Read

via "National Vulnerability Database".