πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Microsoft wants to kill the password using FIDO2 security for better authentication πŸ”

Andrew Conway, general manager for Microsoft 365 Security, discusses how to prevent credential theft by relying on biometric security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Handling endpoint security without overwhelming professionals with information overload πŸ”

Chris Bell, director of product management at Secureworks, describes the difficult balance to strike for presenting actionable information to security professionals without exhausting them with information overload.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Barracuda leverages Microsoft Azure to deliver application security to customers πŸ”

Nitzan Miron, VP of application security services at Barracuda Networks, discusses the Azure-delivered WAF-as-a-Service product offering announced at Microsoft Ignite 2019

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2008-7291

gri before 2.12.18 generates temporary files in an insecure way.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-7272

FireGPG before 0.6 handle userΓ―ΒΏΒ½s passphrase and decrypted cleartext insecurely by writing pre-encrypted cleartext and the user's passphrase to disk which may result in the compromise of secure communication or a usersΓ―ΒΏΒ½s private key.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-5083

In JON 2.1.x before 2.1.2 SP1, users can obtain unauthorized security information about private resources managed by JBoss ON.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-3278

frysk packages through 2008-08-05 as shipped in Red Hat Enterprise Linux 5 are built with an insecure RPATH set in the ELF header of multiple binaries in /usr/bin/f* (e.g. fcore, fcatch, fstack, fstep, ...) shipped in the package. A local attacker can exploit this vulnerability by running arbitrary code as another user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-6745

clamav 0.91.2 suffers from a floating point exception when using ScanOLE2.

πŸ“– Read

via "National Vulnerability Database".
⚠ Another Facebook hoax: Robbers still throwing eggs at car windows? ⚠

Bandits? Egg hurling?! Up to 92.5% visibility obscured??!! Don't share this turkey, but do let us know if you decide to test your wipers!

πŸ“– Read

via "Naked Security".
⚠ Leak of 4,000 Facebook documents heaps more trouble on internet giant ⚠

This week’s bold rebrand of Facebook to FACEBOOK can’t hide the growing sense that nobody is happy with the company right now.

πŸ“– Read

via "Naked Security".
⚠ IT services pro hacked former client’s email ⚠

An IT project manager has pleaded guilty to accessing the email account of a former client's CEO, said reports this week.

πŸ“– Read

via "Naked Security".
❌ Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials ❌

Attackers could access Wi-Fi credentials due to a problem in initial configuration of the smart doorbell device.

πŸ“– Read

via "Threatpost".
❌ News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails ❌

From voice assistant hacks to insider threats, Threatpost editors break down this week's biggest news.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Small-Business Password Managers πŸ•΄

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 9 Principles to Simplify Security πŸ•΄

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ring Flaw Underscores Impact of IoT Vulnerabilities πŸ•΄

A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

πŸ“– Read

via "Dark Reading: ".
❌ Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers ❌

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories.

πŸ“– Read

via "Threatpost".
πŸ•΄ Hospital Cyberattacks Linked to Increase in Heart Attack Mortality πŸ•΄

Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.

πŸ“– Read

via "Dark Reading: ".
❌ Art Imitates Life: Lessons from the Final Season of Mr. Robot ❌

Unlike Elliot, real-world adversaries don’t have lofty ideals nor do they suffer crises of conscience.

πŸ“– Read

via "Threatpost".
πŸ•΄ Bugcrowd Pays Out Over $500K in Bounties in One Week πŸ•΄

In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 4 Ways to Soothe a Stressed-Out Incident Response Team πŸ•΄

IR teams are under tremendous pressure, often working long hours and putting their needs aside amid a security crisis. Their care is just as important as policy and procedure.

πŸ“– Read

via "Dark Reading: ".