πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Google Discloses Android Camera Hijack Hack ❌

Google has disclosed a now-fixed issue that enabled third-party apps to access a disturbing set of permissions for its Camera App built into Android phones.

πŸ“– Read

via "Threatpost".
πŸ•΄ DDoS Attacks Up Sharply in Third Quarter of 2019 πŸ•΄

DDoS attacks of all sorts were up by triple-digit percentages, with smaller volume attacks growing most rapidly.

πŸ“– Read

via "Dark Reading: ".
❌ D-Link Adds More Buggy Router Models to β€˜Won’t Fix’ List ❌

The list of routers that have critical RCE bugs, that have reached end of life and that won’t get fixed has grown.

πŸ“– Read

via "Threatpost".
❌ 400 Vet Locations Nipped by Ryuk Ransomware ❌

The infection apparently made its way in through third-party systems.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attacker Mistake Botches Cyborg Ransomware Campaign πŸ•΄

Cybercriminals attempted to install Cyborg ransomware on target machines by deceiving victims with a fraudulent Windows update.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-1145 (debian_linux, enterprise_linux, opensuse, unixodbc)

The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ransomware Surge & Living-Off-the-Land Tactics Remain Big Threats πŸ•΄

Group-IB's and Rapid7's separate analysis of attack activity in recent months shows threat actors are making life harder for enterprise organizations in a variety of ways.

πŸ“– Read

via "Dark Reading: ".
⚠ Adobe Acrobat and Reader 2015 reach end of support ⚠

If you've been happily using Adobe Reader 2015 software for the last few years, you're in for a rude awakening.

πŸ“– Read

via "Naked Security".
⚠ XSS security hole in Gmail’s dynamic email ⚠

The bug was fixed at least a month ago so users receiving dynamic email content have one less thing to worry about.

πŸ“– Read

via "Naked Security".
⚠ Instagram stalker app Ghosty yanked from Play store ⚠

It was sucking up private profiles by requiring users to hand over their logins, giving it access to whatever accounts they follow.

πŸ“– Read

via "Naked Security".
⚠ Update WhatsApp now: MP4 video bug exposes your messages ⚠

A now-patched-hole could have allowed remote code execution that could have exposed files and messages. Update your WhatsApp now.

πŸ“– Read

via "Naked Security".
❌ Hackers Dump 2.2M Gaming, Cryptocurrency Passwords Online ❌

A data breach left personal information--including email and IP addresses and first and last namesβ€”exposed in public databases, according to Troy Hunt.

πŸ“– Read

via "Threatpost".
πŸ” Macy's holiday breach highlights retailer need for encryption and scrutiny of third party systems πŸ”

Attackers were collecting user credit card information for an entire week from the Macy's website before they were alerted. Here's how retailers can protect themselves.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Vulnerability Could Give Criminals Camera Control on Millions of Android Smartphones πŸ•΄

Vulnerability could allow an attacker to control the camera and storage without user knowledge or permission.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Multifactor Authentication Is Now a Hacker Target πŸ•΄

SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2010-4657 (debian_linux, enterprise_linux, php)

PHP5 before 5.4.4 allows passing invalid utf-8 strings via the xmlTextWriterWriteAttribute, which are then misparsed by libxml2. This results in memory leak into the resulting output.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Want to attain and retain customers? Adopt data privacy policies πŸ”

Customers won't buy services or products from companies if they don't trust how their data will be used, Cisco found.

πŸ“– Read

via "Security on TechRepublic".
❌ ThreatList: Admin Rights for Third Parties is the Norm ❌

The majority give outside partners, contractors and suppliers administrative access -- without strong security policies in place.

πŸ“– Read

via "Threatpost".
❌ High-Severity Windows UAC Flaw Enables Privilege Escalation ❌

Further details of the flaw, which has recently been patched by Microsoft, were disclosed Tuesday by researchers.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2011-1028

The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.

πŸ“– Read

via "National Vulnerability Database".