πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs ❌

Wake-on-LAN and ARP pinging have expanded Ryuk's reach into corporate LANs -- and its operators' monetization abilities.

πŸ“– Read

via "Threatpost".
πŸ•΄ Sumo Logic Buys JASK Labs to Tackle SOC Challenges πŸ•΄

Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ First Bluekeep Exploit Found in the Wild πŸ•΄

Crashing honeypots alerted the researcher who found the Bluekeep vulnerability.

πŸ“– Read

via "Dark Reading: ".
⚠ Apple developers – get this update to protect the rest of us! ⚠

Know any Apple developers? Make sure they're signed up to Apple's security advisories, and getting their developer updates.

πŸ“– Read

via "Naked Security".
πŸ” Don’t Believe the FUD from the DLP Wannabes: Digital Guardian Supports macOS πŸ”



πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam ❌

Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2005-4890

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

πŸ“– Read

via "National Vulnerability Database".
❌ Magecart Groups Attack Simultaneous Sites in Card-Theft Frenzy ❌

Stealing payment-card data and PII from e-commerce sites has become so lucrative that some are being targeted by multiple groups at the same time.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Tools Focus on Insider Risk, Data Protection at Ignite 2019 πŸ•΄

New tools and updates aimed at addressing ongoing challenges with insider threats and sensitive data classification.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2010-3662

TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows SQL Injection on the backend.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Security Setting Ironically Increases Risks for Office for Mac Users πŸ•΄

Excel's handling of an old macro format gives unauthenticated remote attackers a way to take control of vulnerable systems, Carnegie Mellon's CERT/CC says.

πŸ“– Read

via "Dark Reading: ".
⚠ Police interrogate Alexa for clues in fatal spear-stabbing ⚠

A friend heard a couple arguing but couldn't make out what it was about. Police hope that Alexa might have a better idea.

πŸ“– Read

via "Naked Security".
❌ Eye Clinic Breach Reveals Data of 20,000 Patients ❌

Incident that exposed emails to a PayPal scam once again highlights the persistent nature of third-party security risk.

πŸ“– Read

via "Threatpost".
⚠ Florida city sends $742K to fraudsters as it bites the BEC hook ⚠

β€œHere's our new bank account number,” the scammers said. When the real construction firm sent their invoice, payment was made to the crooks.

πŸ“– Read

via "Naked Security".
⚠ Google patches bug that let nearby hackers send malware to your phone ⚠

Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victim's phone

πŸ“– Read

via "Naked Security".
πŸ•΄ Enterprise Web Security: Risky Business πŸ•΄

Web development is at much more risk than commonly perceived. As attackers eye the enterprise, third-party code provides an easy way in.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 additional ways to fend off ransomware πŸ”

In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.

πŸ“– Read

via "Security on TechRepublic".
❌ Trump, Putin and Politics Name-Dropped to Peddle Malware ❌

Cybercriminals are leveraging political names and figures for social engineering as the elections loom.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 additional ways to fend off ransomware πŸ”

In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2010-0737 (jboss_operations_network)

A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-0398 (autokey)

The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.

πŸ“– Read

via "National Vulnerability Database".