πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to manage site settings in Vivaldi for Android πŸ”

Find out how to enable or disable permissions on a site-by-site basis in the Vivaldi browser.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use per-host SSH configuration πŸ”

Learn how to make your SSH use more efficient and convenient with per-host configurations.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ I'm Setting Up My Company's First Bug-Bounty Program. What Should I Be Thinking About? πŸ•΄

Here are some important points to factor into your vulnerability disclosure policy.

πŸ“– Read

via "Dark Reading: ".
❌ Double Vision: Stealthy Malware Dropper Delivers Dual RATs ❌

A lengthy, multi-stage infection process leads to a duo of payloads, bent on stealing data.

πŸ“– Read

via "Threatpost".
πŸ•΄ I'm Setting Up a Bug-Bounty Program. What Should I be Thinking About? πŸ•΄

Here are some important points to factor into your vulnerability disclosure policy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Symantec, McAfee Patch Privilege Escalation Bugs πŸ•΄

All versions of endpoint protection software from both vendors were susceptible to near identical issue, SafeBreach says.

πŸ“– Read

via "Dark Reading: ".
⚠ Apple fires employee after he texts customer’s pic to his own phone ⚠

An β€œEXTREMELY PERSONAL”, year-old pic, the woman said, that he had to scroll through 5,000 photos to get to. Police are investigating.

πŸ“– Read

via "Naked Security".
⚠ Brave 1.0 launches, extends ad-watching payouts to iOS ⚠

It's showtime: Finally out of beta comes the browser that promises privacy, anonymity and cryptocurrency in exchange for your eyeballs.

πŸ“– Read

via "Naked Security".
⚠ Data thieves blew cover after maxing out victim’s hard drive ⚠

The FTC has reached a settlement with InfoTrax after thieves stole a million sensitive customer records from its servers in 2016.

πŸ“– Read

via "Naked Security".
⚠ How the Linux kernel balances the risks of public bug disclosure ⚠

A serious Wi-Fi flaw shows how Linux handles security in plain sight.

πŸ“– Read

via "Naked Security".
⚠ How ransomware attacks ⚠

A new report reveals what defenders should know about the most prevalent and persistent malware families.

πŸ“– Read

via "Naked Security".
❌ Stealthy Malware Flies Under AV Radar with Advanced Obfuscation ❌

A threat campaign active since January customizes long-used droppers to infect victim machines and lift credentials and other data from browsers, according to Cisco Talos.

πŸ“– Read

via "Threatpost".
πŸ” Traveling for the holidays? Avoid these 5 tech mistakes πŸ”

Wi-Fi hotspots, public charging stations, and travel planning sites seem helpful, but they could actually be a traveler's worst nightmare.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DevSecOps: The Answer to the Cloud Security Skills Gap πŸ•΄

There's a skills and resources gap industrywide, but a DevSecOps approach can go a long way toward closing that gap.

πŸ“– Read

via "Dark Reading: ".
πŸ” How can you protect yourself from hackers? An IBM social engineer offers advice πŸ”

Stephanie "Snow" Carruthers, Chief People Hacker at IBM, gives advice about protecting yourself online. She also explains how the robocalls and spoofing process works.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity remains the top concern for middle market companies πŸ”

Nearly half (47%) of executives believe they will be at a greater security risk in the next year, a Chubb and NCMM report found.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Attackers' Costs Increasing as Businesses Focus on Security πŸ•΄

Based on penetration tests and vulnerability assessments, attackers' costs to compromise a company's network increases significantly when security is continuously tested, a report finds.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Kamerka 2.0 πŸ› 

Kamerka is an OSINT tool that builds an interactive map of cameras, printers, tweets, and photos leveraging Flickr, Instagram, Shodan, and Twitter.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Friday Five: 11/15 Edition πŸ”

Microsoft warns about BlueKeep - again, a real estate firm is fined $16M for violating GDPR, and more - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2009-5047

Jetty 6.x before 6.1.22 suffers from an escape sequence injection vulnerability from two different vectors: 1) "Cookie Dump Servlet" and 2) Http Content-Length header. 1) A POST request to the form at "/test/cookie/" with the "Age" parameter set to a string throws a "java.lang.NumberFormatException" which reflects binary characters including ESC. These characters could be used to execute arbitrary commands or buffer dumps in the terminal. 2) The same attack in 1) can be exploited by requesting a page using an HTTP request "Content-Length" header set to a letteral string.

πŸ“– Read

via "National Vulnerability Database".
❌ Lizard Squad Threatens UK’s Labour Leader with Cyberattacks Against His Family ❌

The threats follow a DDos attack bent on taking out the Labour Party's online presence.

πŸ“– Read

via "Threatpost".