πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Magecart Hits Macy's: Retailer Discloses Data Breach πŸ•΄

The retail giant discovered malicious code designed to capture customer data planted on its payment page.

πŸ“– Read

via "Dark Reading: ".
❌ β€˜Windows Update’ Installs Cyborg Ransomware ❌

A malicious spam campaign that informs victims it contains a β€œcritical Windows update” instead leads to the installation of Cyborg ransomware, researchers have found. Further, they were able to access its builder, which can be used to create malware variants. The email-based threat, discovered recently by researchers at Trustwave, is unique in a few ways, […]

πŸ“– Read

via "Threatpost".
πŸ” 82% of SMB execs expect employees to put business devices at risk with holiday shopping πŸ”

Nearly half of executives surveyed don't believe their employees would be able to spot a bad actor posing as an online retailer, Zix-AppRiver found.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned πŸ•΄

A feature that's supposed to make your account more secure -- adding a cellphone number -- has become a vector of attack in SIM-swapping incidents. Here's how it's done and how you can protect yourself.

πŸ“– Read

via "Dark Reading: ".
πŸ” Air Force hires Trueface for facial recognition on bases πŸ”

Trueface will provide Air Force bases with systems that can identify faces, license plates and guns.

πŸ“– Read

via "Security on TechRepublic".
πŸ” FBI Agent: Ex-Monsanto Employee Stole Trade Secrets πŸ”

When he was first detained at the airport, the employee was found with six files containing trade secret data on a storage device connected to his laptop.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Most Companies Lag Behind '1-10-60' Benchmark for Breach Response πŸ•΄

Average company needs 162 hours to detect, triage, and contain a breach, according to a new CrowdStrike survey.

πŸ“– Read

via "Dark Reading: ".
❌ McDonalds-Themed Facebook Ads Serve Up Banking Trojans ❌

The malware has backdoor functionality and the ability to steal payment cards and credentials.

πŸ“– Read

via "Threatpost".
πŸ•΄ TPM-Fail: What It Means & What to Do About It πŸ•΄

Trusted Platform Modules are well-suited to a wide range of applications, but for the strongest security, architect them into "defense-in-depth" designs.

πŸ“– Read

via "Dark Reading: ".
❌ Google Discloses Android Camera Hijack Hack ❌

Google has disclosed a now-fixed issue that enabled third-party apps to access a disturbing set of permissions for its Camera App built into Android phones.

πŸ“– Read

via "Threatpost".
πŸ•΄ DDoS Attacks Up Sharply in Third Quarter of 2019 πŸ•΄

DDoS attacks of all sorts were up by triple-digit percentages, with smaller volume attacks growing most rapidly.

πŸ“– Read

via "Dark Reading: ".
❌ D-Link Adds More Buggy Router Models to β€˜Won’t Fix’ List ❌

The list of routers that have critical RCE bugs, that have reached end of life and that won’t get fixed has grown.

πŸ“– Read

via "Threatpost".
❌ 400 Vet Locations Nipped by Ryuk Ransomware ❌

The infection apparently made its way in through third-party systems.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attacker Mistake Botches Cyborg Ransomware Campaign πŸ•΄

Cybercriminals attempted to install Cyborg ransomware on target machines by deceiving victims with a fraudulent Windows update.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-1145 (debian_linux, enterprise_linux, opensuse, unixodbc)

The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ransomware Surge & Living-Off-the-Land Tactics Remain Big Threats πŸ•΄

Group-IB's and Rapid7's separate analysis of attack activity in recent months shows threat actors are making life harder for enterprise organizations in a variety of ways.

πŸ“– Read

via "Dark Reading: ".
⚠ Adobe Acrobat and Reader 2015 reach end of support ⚠

If you've been happily using Adobe Reader 2015 software for the last few years, you're in for a rude awakening.

πŸ“– Read

via "Naked Security".
⚠ XSS security hole in Gmail’s dynamic email ⚠

The bug was fixed at least a month ago so users receiving dynamic email content have one less thing to worry about.

πŸ“– Read

via "Naked Security".
⚠ Instagram stalker app Ghosty yanked from Play store ⚠

It was sucking up private profiles by requiring users to hand over their logins, giving it access to whatever accounts they follow.

πŸ“– Read

via "Naked Security".
⚠ Update WhatsApp now: MP4 video bug exposes your messages ⚠

A now-patched-hole could have allowed remote code execution that could have exposed files and messages. Update your WhatsApp now.

πŸ“– Read

via "Naked Security".