πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2010-4659

Cross-site scripting (XSS) vulnerability in statusnet through 2010 in error message contents.

πŸ“– Read

via "National Vulnerability Database".
❌ Apache Solr Bug Gets Bumped Up to High Severity ❌

Linux users running the enterprise-search platform Solr are potentially vulnerable to remote code execution attack.

πŸ“– Read

via "Threatpost".
πŸ” NSA Reiterates Risks of Transport Layer Security Inspection πŸ”

In an advisory published this week, the NSA outlined the risks of Transport Layer Security Inspection (TLSI) and provided security mitigations for organizations.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Mozilla Bug Bounty Program Doubles Payouts, Adds Firefox Monitor ❌

In scope RCE Mozilla bug bounty payouts have also tripled to reach $15,000.

πŸ“– Read

via "Threatpost".
πŸ•΄ Google Cloud Update Gives Users Greater Data Control πŸ•΄

External Key Manager and Key Access Justification are intended to give organizations greater visibility into requests for data access.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Patch 'Easily Exploitable' Oracle EBS Flaws ASAP: Onapsis πŸ•΄

Organizations that have not yet applied a pair of months-old critical patches from Oracle for E-Business Suite are at risk of attacks on their financial systems, the application security firm says.

πŸ“– Read

via "Dark Reading: ".
❌ Security Firms, Nonprofits Team to Fight Stalkerware ❌

The Coalition Against Stalkerware launched this week, with the aim of offering a centralized location for helping victims of stalkerware, as well as defining what stalkerware is in the first place.

πŸ“– Read

via "Threatpost".
⚠ Tories change Twitter name to β€˜factcheckUK’ during live TV debate ⚠

Twitter wagged its finger at the UK's Conservative party for renaming its press account "factcheckUK" during a live TV debate.

πŸ“– Read

via "Naked Security".
πŸ•΄ What's in a WAF? πŸ•΄

Need a 101 lesson on Web application firewalls? Here's your crib sheet on what a WAF is, how it works, and what to look for when you're in the market for a new solution.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ As Retailers Prepare for the Holiday Season, So Do Cybercriminals πŸ•΄

Online shoppers need to be wary about domain spoofing, fraudulent giveaways, and other scams, ZeroFOX study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Clam AntiVirus Toolkit 0.102.1 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Popular Apps on Google Play Store Remain Unpatched ❌

Check Point researchers found that hundreds of marquee Android mobile apps still contain vulnerabilities that allow remote code executive even if users update.

πŸ“– Read

via "Threatpost".
⚠ Official Monero site delivers malicious cash-grabbing wallet ⚠

If you downloaded the Monero command line wallet recently, check it before using it.

πŸ“– Read

via "Naked Security".
πŸ•΄ Anatomy of a BEC Scam πŸ•΄

A look at the characteristics of real-world business email compromise attacks - and what makes them tick.

πŸ“– Read

via "Dark Reading: ".
❌ Download: 2019 Security Team Assessment Template ❌

The Ultimate 2019 Security Team Assessment Template is a unique tool that encapsulates all the major KPIs of the organizational security team’s main pillars.

πŸ“– Read

via "Threatpost".
⚠ Android camera bug could have turned phones against their users ⚠

Google has patched a bug in the Android camera app that allowed other applications to bypass the strict controls on camera and audio access.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 'Department of No': Why CISOs Need to Cultivate a Middle Way πŸ•΄

A chief information security officer's job inherently involves conflict, but a go-along-to-get-along approach carries its own vulnerabilities and risks.

πŸ“– Read

via "Dark Reading: ".
⚠ DNS-over-HTTPS is coming to Windows 10 ⚠

Microsoft will soon add the ability to use DNS-over-HTTPS and DNS-over-TLS into its networking client.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Top Nontechnical Degrees for Cybersecurity πŸ•΄

A computer science degree isn't the only path into a cybersecurity career.

πŸ“– Read

via "Dark Reading: ".
❌ Gnip Banking Trojan Shows Ongoing, Aggressive Development ❌

The mobile malware, which incorporates Anubis source code, could evolve into a fully fledged spyware in the future.

πŸ“– Read

via "Threatpost".