πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Tackling Supply Chain Threats πŸ•΄

Vendor-supplied malware is a threat that has been largely overlooked. That has to change.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Abandoned Websites Haunt Corporations πŸ•΄

Websites that never go away continue to bring security threats to their owners, says a new report.

πŸ“– Read

via "Dark Reading: ".
πŸ” Gallery: Modern home security products feature ingenuity, flair, and plenty of IoT πŸ”

For those of us working from home offices, protecting sensitive data from authorized access can also mean protecting our homes from illegal entry. With IoT technology, home security technology is now a DIY project.

πŸ“– Read

via "Security on TechRepublic".
❌ Windows β€˜Deletebug’ Zero-Day Allows Privilege Escalation, Destruction ❌

The unpatched flaw allows an attacker to delete any kind of file on a victim machine, including system data.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Windows 7 End-of-Life: Are You Ready? πŸ•΄

Microsoft will terminate support for Windows 7 in January 2020, but some there's still some confusion among enterprises about when the OS officially gets retired.

πŸ“– Read

via "Dark Reading: ".
❌ Magecart Cybergang Targets 0days in Third-Party Magento Extensions ❌

Over two dozen third-party ecommerce plugins contain zero-day vulnerabilities being exploited in a recent Magecart campaign.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ ICS Networks Continue to be Soft Targets For Cyberattacks πŸ•΄

CyberX study shows that many industrial control system environments are riddled with vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-10730

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. Amstar is an Amanda Application API script. It should not be run by users directly. It uses star to backup and restore data. It runs binaries with root permissions when parsing the command line argument --star-path.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10729

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

πŸ“– Read

via "National Vulnerability Database".
⚠ Could TLS session resumption be another β€˜super cookie’? ⚠

Researchers think they’ve spotted a tracking technique that nobody has been paying attention to - TLS session resumption.

πŸ“– Read

via "Naked Security".
⚠ Google and Facebook accused of secretly tracking users’ locations ⚠

Google and Facebook have been hit separately by class action lawsuits accusing them of secretly tracking user locations.

πŸ“– Read

via "Naked Security".
⚠ Firefox 63 gets tough with trackers ⚠

Mozilla's Enhanced Tracking Protection is going mainstream.

πŸ“– Read

via "Naked Security".
πŸ” 82% of security pros fear hackers using AI to attack their company πŸ”

Cybersecurity workers are most concerned about losing company data and customer trust in an attack, according to a report from Neustar.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to create an encrypted vault with KDE Vaults πŸ”

Jack Wallen shows you how to create encrypted folders the easy way, with

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Online Malware and Threats: A Profile of Today's Security Posture πŸ•΄

This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DevSecOps An Effective Fix for Software Flaws πŸ•΄

Organizations seeking to fix flaws faster should look to automation and related methodologies for success, says a new report.

πŸ“– Read

via "Dark Reading: ".
πŸ” What attackers want whey they hack email accounts πŸ”

Mark Risher, Google's director of product management for identity and account security, explains what hackers are looking and how Google is ramping up account security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why data security is a priority for political campaigns πŸ”

Chris Wilson of WPA Intelligence explains how state campaigns combat cyber attacks before the midterm elections.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Microsoft's Defending Democracy program amplifies account security πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, explains how the company is combating disinformation, phishing attacks, and cloud security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How tech leaders at enterprise companies can be more inclusive πŸ”

Cisco's Michele Guel, Distinguished Engineer and Chief Security Architect, explains how to recruit women into STEM and cybersecurity.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why organizations aren't succeeding in threat hunting strategies πŸ”

Many organizations want to take additional cybersecurity measures, but are strapped by time, skills, and visibility, according to a Fidelis Cybersecurity report

πŸ“– Read

via "Security on TechRepublic".