πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Office for Mac Users Warned of Malicious SYLK Files ❌

Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protections.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2005-2352

I race condition in Temp files was found in gs-gpl before 8.56 addons scripts.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 21 stories of the week ⚠

Roundup: From updating macOS Catalina and old i-devices, to the ransomware attack that took a city offline - and everything in between.

πŸ“– Read

via "Naked Security".
⚠ US grounds Chinese-made drones as part of security review ⚠

The exception: drones being used in emergencies, such as fighting wildfires, search and rescue, and dealing with natural disasters.

πŸ“– Read

via "Naked Security".
❌ BlueKeep Attacks Have Arrived, Are Initially Underwhelming ❌

The first attacks that exploit the zero-day Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential.

πŸ“– Read

via "Threatpost".
⚠ Undercover reporter tells all after working for a Polish troll farm ⚠

Together with her troll colleagues, she managed 200 fake social profiles, promoted clients’ products, and trolled their competitors.

πŸ“– Read

via "Naked Security".
πŸ•΄ New: 2019 State of the Internet / Security: Phishing - Baiting the Hook πŸ•΄

Phishing attacks require two things: a lure and a landing. This Akamai-sponsored report digs deep into how the phishing economy works and ways organizations can protect themselves from the ever-evolving threat.

πŸ“– Read

via "Dark Reading: ".
⚠ Pentagon publishes AI guidelines ⚠

As the specter of warrior robots looms large, the Pentagon has published a set of ethical guidelines for its use of artificial intelligence.

πŸ“– Read

via "Naked Security".
⚠ Russia’s sovereign internet law comes into force ⚠

The new law compels the country’s ISPs to forward all data arriving and departing from their networks through special gateway servers.

πŸ“– Read

via "Naked Security".
πŸ•΄ To Secure Multicloud Environments, First Acknowledge You Have a Problem πŸ•΄

Multicloud environments change rapidly. Organizations need a security framework that is purpose-built for the cloud and that aligns with their digital transformation strategy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How HR and IT Can Partner to Improve Cybersecurity πŸ•΄

With their lens into the human side of business, human resources can be an effective partner is the effort to train employees on awareness and keep an organization secure.

πŸ“– Read

via "Dark Reading: ".
❌ BEC Scam Costs Media Giant Nikkei $29 Million ❌

In September, a Nikkei America employee transferred $29 million to BEC scammers who were purporting to be a Nikkei executive.

πŸ“– Read

via "Threatpost".
❌ Critical Remote Code Execution Flaw Found in Open Source rConfig Utility ❌

The network configuration management utility has two unpatched critical remote code execution vulnerabilities.

πŸ“– Read

via "Threatpost".
❌ Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs ❌

Wake-on-LAN and ARP pinging have expanded Ryuk's reach into corporate LANs -- and its operators' monetization abilities.

πŸ“– Read

via "Threatpost".
πŸ•΄ Sumo Logic Buys JASK Labs to Tackle SOC Challenges πŸ•΄

Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ First Bluekeep Exploit Found in the Wild πŸ•΄

Crashing honeypots alerted the researcher who found the Bluekeep vulnerability.

πŸ“– Read

via "Dark Reading: ".
⚠ Apple developers – get this update to protect the rest of us! ⚠

Know any Apple developers? Make sure they're signed up to Apple's security advisories, and getting their developer updates.

πŸ“– Read

via "Naked Security".
πŸ” Don’t Believe the FUD from the DLP Wannabes: Digital Guardian Supports macOS πŸ”



πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam ❌

Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands.

πŸ“– Read

via "Threatpost".