πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Security 101: What Is a Man-in-the-Middle Attack? πŸ•΄

A breakdown of the common ways criminals employ MitM techniques to snare victims, and tips for protecting users from these dirty tricks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Blink Cameras Found with Multiple Vulnerabilities πŸ•΄

Researchers found three broad types of vulnerabilities, one of which should be particularly concerning to consumers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Executive Stole Trade Secrets, Then Lied About It πŸ”

In a lawsuit filed last week, the company claims the ex-executive stole and retained confidential and trade secret data and lied to cover it up.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Microsoft Zaps Actively Exploited Zero-Day Bug ❌

December 2019's relatively light Patch Tuesday update also fixes seven critical flaws.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2012-5620

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1577

lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Your open source gift giving guide for 2019 πŸ”

'Tis the season for open source gifts. But what to buy? Jack Wallen has a few ideas that are sure to put a smile on the faces of the open source lovers in your life.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Fixes Windows Zero-Day on Lightest Patch Tuesday of 2019 πŸ•΄

This month's batch of security updates addresses 36 CVEs, seven of which are rated Critical and one of which has been exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Data Leak Week: Billions of Sensitive Files Exposed Online πŸ•΄

A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Zeek 3.0.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Ad industry groups ask that the CCPA keep its mitts off their cookies ⚠

Ad-blocking technologies can block the cookies that record consumers' privacy choices, they claim.

πŸ“– Read

via "Naked Security".
⚠ FTC warns Christmas buyers that smart toys are a security risk ⚠

Thinking of giving a young person an internet-connected β€˜smart’ toy this Christmas? You may want to think again.

πŸ“– Read

via "Naked Security".
⚠ DoItForState domain name thief gets 14 years for pistol-whipping plot ⚠

He hired his cousin to break in, hold the rightful domain holder at gunpoint, and force a transfer to his own GoDaddy account.

πŸ“– Read

via "Naked Security".
⚠ Windows 10 Mobile receives its last security patches ⚠

If you’re one of the tiny hardcore still using Windows 10 Mobile, 10 December 2019 is probably a day you’ve been dreading for nearly a year.

πŸ“– Read

via "Naked Security".
❌ Lazarus APT Collaborates with Trickbot’s Anchor Project ❌

An unprecedented connection between the North Korean APT and the crimeware giant spells trouble for global banks and other cybercrime targets.

πŸ“– Read

via "Threatpost".
πŸ” 63% of organizations face security breaches due to hardware vulnerabilities πŸ”

While hardware-level attacks are high, only 59% of companies have implemented a hardware security strategy, Dell and Forrester found.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Big Changes Are Coming to Security Analytics & Operations πŸ•΄

New ESG research points to fundamental problems, a need for scalable security data pipelines, and a migration to the public cloud.

πŸ“– Read

via "Dark Reading: ".
❌ Modern Intel CPUs Plagued By Plundervolt Attack ❌

The Intel attack uses a similar technique that gamers commonly use to overclock their CPUs.

πŸ“– Read

via "Threatpost".
πŸ•΄ Only Half of Malware Caught by Signature AV πŸ•΄

Machine learning and behavioral detection are necessary to catch threats, WatchGuard says in a new report. Meanwhile, network attacks have risen, especially against older vulnerabilities, such as those in Apache Struts.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Nation-State Attackers May Have Co-opted Vega Ransomware πŸ•΄

The tactics used by the latest version of the Vega cryptolocker program indicates the code may have been stolen from its authors and is now being used for destructive attacks, a new report suggests.

πŸ“– Read

via "Dark Reading: ".