πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Why 5G (and even 6G) could put your business at risk for a cyberattack πŸ”

The next generation of wireless networking standards could leave critical security gaps open, according to University of Dundee research.

πŸ“– Read

via "Security on TechRepublic".
❌ DemonBot Fans DDoS Flames with Hadoop Enslavement ❌

An unsophisticated but effective botnet is targeting exposed cloud servers and racking up millions of infections.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ British Airways Data Breach Takes Off Again with 185K More Victims ❌

The news comes on the heels of a breach at Cathay Pacific exposing 9.4 million people.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ DeepPhish: Simulating Malicious AI to Act Like an Adversary πŸ•΄

How researchers developed an algorithm to simulate cybercriminals' use of artificial intelligence and explore the future of phishing.

πŸ“– Read

via "Dark Reading: ".
❌ PoC Attack Leverages Microsoft Office and YouTube to Deliver Malware ❌

Microsoft has been notified, but no patch is yet available.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ British Airways: 185K Affected in Second Data Breach πŸ•΄

The carrier discovered another breach while investigating its largest-ever data breach, disclosed in September.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: 1 Out of 5 Would Ditch a Business After a Data Breach ❌

A full 21 percent of survey respondents would walk away from a business permanently after a major hack.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Dark Web: A cheat sheet for business professionals πŸ”

Nefarious profiteers use the encrypted internet to sell stolen data, drugs, and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

πŸ“– Read

via "Security on TechRepublic".
⚠ Researchers exploit Microsoft Word through embedded video ⚠

A group of researchers has found a way to infect computers via Word documents without triggering a security warning.

πŸ“– Read

via "Naked Security".
πŸ” Cybersecurity no. 1 challenge for CXOs, but only 39% have a defense strategy πŸ”

More than 85% of companies have experienced a cyber breach in the past three years, according to an A.T. Kearny report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 22 stories of the week ⚠

From a popular WordPress plugin harbouring a zero-day to punishments for phone-slowing Apple and Samsung, and all the stories in between. Catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Call of Duty players caught up in cryptocurrency theft racket ⚠

The FBI recently busted a group of criminals who seem to be using Call of Duty to coordinate cryptocurrency thefts.

πŸ“– Read

via "Naked Security".
⚠ β€œRight to repair” gets a boost from new DCMA software rules ⚠

It just got easier for owners of a wide range of home devices to hack and repair their software.

πŸ“– Read

via "Naked Security".
πŸ” Election hacking: The myths vs. realities πŸ”

Cris Thomas, space rogue, global strategy lead at IBM X-Force Red, discusses the myths and realities of hacking election machines with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
⚠ Self driving cars learn (from us) about who to sacrifice in a cash ⚠

It's bad news for overweight, elderly, male jaywalkers.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10734

ProjectSend (formerly cFTP) r582 allows Insecure Direct Object Reference via includes/actions.log.export.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10733

ProjectSend (formerly cFTP) r582 allows directory traversal via file=../ in the process-zip-download.php query string.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10732

ProjectSend (formerly cFTP) r582 allows authentication bypass via a direct request for users.php, home.php, edit-file.php?file_id=1, or process-zip-download.php, or add_user_form_* parameters to users-add.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10731

ProjectSend (formerly cFTP) r582 allows SQL injection via manage-files.php with the request parameter status, manage-files.php with the request parameter files, clients.php with the request parameter selected_clients, clients.php with the request parameter status, process-zip-download.php with the request parameter file, or home-log.php with the request parameter action.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ AppSec is Dead, but Software Security Is Alive & Well πŸ•΄

Application security must be re-envisioned to support software security. It's time to shake up your processes.

πŸ“– Read

via "Dark Reading: ".