πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ ThreatList: 1 Out of 5 Would Ditch a Business After a Data Breach ❌

A full 21 percent of survey respondents would walk away from a business permanently after a major hack.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Dark Web: A cheat sheet for business professionals πŸ”

Nefarious profiteers use the encrypted internet to sell stolen data, drugs, and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

πŸ“– Read

via "Security on TechRepublic".
⚠ Researchers exploit Microsoft Word through embedded video ⚠

A group of researchers has found a way to infect computers via Word documents without triggering a security warning.

πŸ“– Read

via "Naked Security".
πŸ” Cybersecurity no. 1 challenge for CXOs, but only 39% have a defense strategy πŸ”

More than 85% of companies have experienced a cyber breach in the past three years, according to an A.T. Kearny report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 22 stories of the week ⚠

From a popular WordPress plugin harbouring a zero-day to punishments for phone-slowing Apple and Samsung, and all the stories in between. Catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Call of Duty players caught up in cryptocurrency theft racket ⚠

The FBI recently busted a group of criminals who seem to be using Call of Duty to coordinate cryptocurrency thefts.

πŸ“– Read

via "Naked Security".
⚠ β€œRight to repair” gets a boost from new DCMA software rules ⚠

It just got easier for owners of a wide range of home devices to hack and repair their software.

πŸ“– Read

via "Naked Security".
πŸ” Election hacking: The myths vs. realities πŸ”

Cris Thomas, space rogue, global strategy lead at IBM X-Force Red, discusses the myths and realities of hacking election machines with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
⚠ Self driving cars learn (from us) about who to sacrifice in a cash ⚠

It's bad news for overweight, elderly, male jaywalkers.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10734

ProjectSend (formerly cFTP) r582 allows Insecure Direct Object Reference via includes/actions.log.export.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10733

ProjectSend (formerly cFTP) r582 allows directory traversal via file=../ in the process-zip-download.php query string.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10732

ProjectSend (formerly cFTP) r582 allows authentication bypass via a direct request for users.php, home.php, edit-file.php?file_id=1, or process-zip-download.php, or add_user_form_* parameters to users-add.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10731

ProjectSend (formerly cFTP) r582 allows SQL injection via manage-files.php with the request parameter status, manage-files.php with the request parameter files, clients.php with the request parameter selected_clients, clients.php with the request parameter status, process-zip-download.php with the request parameter file, or home-log.php with the request parameter action.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ AppSec is Dead, but Software Security Is Alive & Well πŸ•΄

Application security must be re-envisioned to support software security. It's time to shake up your processes.

πŸ“– Read

via "Dark Reading: ".
πŸ” How cybersecurity is developing to combat Russian hackers πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses phishing and Russia's involvement in the 2016 US presidential election with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Windows Defender: First Full Antivirus Tool to Run in a Sandbox πŸ•΄

Sandboxed version now available to Windows Insiders and anyone else who force-enables it in Windows 10 version 1703 and above.

πŸ“– Read

via "Dark Reading: ".
❌ X.Org Flaw Allows Privilege Escalation in Linux Systems ❌

The issue impacts many large distros with GUI interfaces.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Nation-State Phishing: A Country-Sized Catch ❌

Sophisticated nation-state groups now integrate phishing as a core component of their statecraft.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ 7 Ways an Old Tool Still Teaches New Lessons About Web AppSec πŸ•΄

Are your Web application secure? WebGoat, a tool old enough to be in high school, continues to instruct.

πŸ“– Read

via "Dark Reading: ".
❌ Girl Scouts Issues Data Breach Warning to 2,800 Members ❌

Someone gained access to an email account for the Orange County chapter, which was rife with personal data.

πŸ“– Read

via "The first stop for security news | Threatpost ".