πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Leak of 4,000 Facebook documents heaps more trouble on internet giant ⚠

This week’s bold rebrand of Facebook to FACEBOOK can’t hide the growing sense that nobody is happy with the company right now.

πŸ“– Read

via "Naked Security".
⚠ IT services pro hacked former client’s email ⚠

An IT project manager has pleaded guilty to accessing the email account of a former client's CEO, said reports this week.

πŸ“– Read

via "Naked Security".
❌ Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials ❌

Attackers could access Wi-Fi credentials due to a problem in initial configuration of the smart doorbell device.

πŸ“– Read

via "Threatpost".
❌ News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails ❌

From voice assistant hacks to insider threats, Threatpost editors break down this week's biggest news.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Small-Business Password Managers πŸ•΄

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 9 Principles to Simplify Security πŸ•΄

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ring Flaw Underscores Impact of IoT Vulnerabilities πŸ•΄

A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

πŸ“– Read

via "Dark Reading: ".
❌ Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers ❌

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories.

πŸ“– Read

via "Threatpost".
πŸ•΄ Hospital Cyberattacks Linked to Increase in Heart Attack Mortality πŸ•΄

Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.

πŸ“– Read

via "Dark Reading: ".
❌ Art Imitates Life: Lessons from the Final Season of Mr. Robot ❌

Unlike Elliot, real-world adversaries don’t have lofty ideals nor do they suffer crises of conscience.

πŸ“– Read

via "Threatpost".
πŸ•΄ Bugcrowd Pays Out Over $500K in Bounties in One Week πŸ•΄

In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 4 Ways to Soothe a Stressed-Out Incident Response Team πŸ•΄

IR teams are under tremendous pressure, often working long hours and putting their needs aside amid a security crisis. Their care is just as important as policy and procedure.

πŸ“– Read

via "Dark Reading: ".
❌ Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone ❌

Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies.

πŸ“– Read

via "Threatpost".
πŸ” VMware rolls out new Carbon Black security suite and Dell partnership πŸ”

The company announced at VMworld 2019 Europe in Barcelona how it will integrate Carbon Black into its suite of tools.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to obscure open ports with knockd πŸ”

Learn how to obfuscate SSH login with port knocking.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to obscure open ports with knockd πŸ”

Learn how to obfuscate SSH login with port knocking.

πŸ“– Read

via "Security on TechRepublic".
❌ Platinum APT Shines Up New Titanium Backdoor ❌

The trojan was observed as the final payload in a sophisticated and complex malware installation code set.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2009-5004

qpid-cpp 1.0 crashes when a large message is sent and the Digest-MD5 mechanism with a security layer is in use .

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-4011

dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS console.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-3614

liboping 1.3.2 allows users reading arbitrary files upon the local system.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2009-3552

In RHEV-M VDC 2.2.0, it was found that the SSL certificate was not verified when using the client-side Red Hat Enterprise Virtualization Manager interface (a Windows Presentation Foundation (WPF) XAML browser application) to connect to the Red Hat Enterprise Virtualization Manager. An attacker on the local network could use this flaw to conduct a man-in-the-middle attack, tricking the user into thinking they are viewing the Red Hat Enterprise Virtualization Manager when the content is actually attacker-controlled, or modifying actions a user requested Red Hat Enterprise Virtualization Manager to perform.

πŸ“– Read

via "National Vulnerability Database".