πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Security Firms, Nonprofits Team to Fight Stalkerware ❌

The Coalition Against Stalkerware launched this week, with the aim of offering a centralized location for helping victims of stalkerware, as well as defining what stalkerware is in the first place.

πŸ“– Read

via "Threatpost".
⚠ Tories change Twitter name to β€˜factcheckUK’ during live TV debate ⚠

Twitter wagged its finger at the UK's Conservative party for renaming its press account "factcheckUK" during a live TV debate.

πŸ“– Read

via "Naked Security".
πŸ•΄ What's in a WAF? πŸ•΄

Need a 101 lesson on Web application firewalls? Here's your crib sheet on what a WAF is, how it works, and what to look for when you're in the market for a new solution.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ As Retailers Prepare for the Holiday Season, So Do Cybercriminals πŸ•΄

Online shoppers need to be wary about domain spoofing, fraudulent giveaways, and other scams, ZeroFOX study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Clam AntiVirus Toolkit 0.102.1 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Popular Apps on Google Play Store Remain Unpatched ❌

Check Point researchers found that hundreds of marquee Android mobile apps still contain vulnerabilities that allow remote code executive even if users update.

πŸ“– Read

via "Threatpost".
⚠ Official Monero site delivers malicious cash-grabbing wallet ⚠

If you downloaded the Monero command line wallet recently, check it before using it.

πŸ“– Read

via "Naked Security".
πŸ•΄ Anatomy of a BEC Scam πŸ•΄

A look at the characteristics of real-world business email compromise attacks - and what makes them tick.

πŸ“– Read

via "Dark Reading: ".
❌ Download: 2019 Security Team Assessment Template ❌

The Ultimate 2019 Security Team Assessment Template is a unique tool that encapsulates all the major KPIs of the organizational security team’s main pillars.

πŸ“– Read

via "Threatpost".
⚠ Android camera bug could have turned phones against their users ⚠

Google has patched a bug in the Android camera app that allowed other applications to bypass the strict controls on camera and audio access.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 'Department of No': Why CISOs Need to Cultivate a Middle Way πŸ•΄

A chief information security officer's job inherently involves conflict, but a go-along-to-get-along approach carries its own vulnerabilities and risks.

πŸ“– Read

via "Dark Reading: ".
⚠ DNS-over-HTTPS is coming to Windows 10 ⚠

Microsoft will soon add the ability to use DNS-over-HTTPS and DNS-over-TLS into its networking client.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Top Nontechnical Degrees for Cybersecurity πŸ•΄

A computer science degree isn't the only path into a cybersecurity career.

πŸ“– Read

via "Dark Reading: ".
❌ Gnip Banking Trojan Shows Ongoing, Aggressive Development ❌

The mobile malware, which incorporates Anubis source code, could evolve into a fully fledged spyware in the future.

πŸ“– Read

via "Threatpost".
❌ Linux Webmin Servers Under Attack by Roboto P2P Botnet ❌

A newly-discovered peer-to-peer (P2P) botnet has been found targeting a remote code execution vulnerability in Linux Webmin servers.

πŸ“– Read

via "Threatpost".
πŸ” 75% of developers worry about app security, but half lack dedicated security experts on their team πŸ”

The majority of developers view security as integral to the coding and development process, but lack the support of a security expert, Whitehat Security found.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2009-5047 (debian_linux, jetty)

Jetty 6.x before 6.1.22 suffers from an escape sequence injection vulnerability from two different vectors: 1) "Cookie Dump Servlet" and 2) Http Content-Length header. 1) A POST request to the form at "/test/cookie/" with the "Age" parameter set to a string throws a "java.lang.NumberFormatException" which reflects binary characters including ESC. These characters could be used to execute arbitrary commands or buffer dumps in the terminal. 2) The same attack in 1) can be exploited by requesting a page using an HTTP request "Content-Length" header set to a letteral string.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Increases Top Android Hacking Prize to $1M πŸ•΄

Google expands its Android Security Rewards program and multiplies its top cash prize from $200,000 to $1 million.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 3 Fundamentals for Better Security and IT Management πŸ•΄

Nail these security fundamentals, and your organization will be well-positioned to succeed next year and in the years to come.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Outlook for Android Bug Opens Door to XSS ❌

Successful exploitation allows attackers to steal potentially sensitive information, change appearance of the web page, and perform phishing, spoofing and drive-by-download attacks.

πŸ“– Read

via "Threatpost".