πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Update now! Popular WordPress plugins have password bypass flaws ⚠

Researchers have discovered bad authentication bypass vulnerabilities affecting two WordPress plugins which should be patched as soon as possible.

πŸ“– Read

via "Naked Security".
❌ β€˜Fleeceware’ Apps Downloaded 600M Times from Google Play ❌

New research shows apps that dupe users into being charged excessively with little reward persist on the Android app store.

πŸ“– Read

via "Threatpost".
πŸ•΄ Active Directory Needs an Update: Here's Why πŸ•΄

AD is still the single point of authentication for most companies that use Windows. But it has some shortcomings that should be addressed.

πŸ“– Read

via "Dark Reading: ".
❌ PoC Exploits Published For Microsoft Crypto Bug ❌

Two proof-of-concept exploits were publicly released for the major Microsoft crypto-spoofing vulnerability.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep23: Snake ransomware, VPN holes and phone spying – Naked Security Podcast ⚠

New episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ›  Wireshark Analyzer 3.2.1 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ NY Fed Reveals Implications of Cyberattack on US Financial System πŸ•΄

A "pre-mortem analysis" sheds light on the potential destruction of a cyberattack against major US banks.

πŸ“– Read

via "Dark Reading: ".
⚠ NSA and Github β€˜rickrolled’ using Windows CryptoAPI bug ⚠

We said, "Assume that someone will find out how to do it pretty soon," and that's exactly what happened.

πŸ“– Read

via "Naked Security".
πŸ•΄ CISO Resigns From Pete Buttigieg Presidential Campaign πŸ•΄

The only Democratic campaign known to have a CISO loses Mick Baccio due to a "fundamental philosophical difference with campaign management."

πŸ“– Read

via "Dark Reading: ".
πŸ” How to add a host to Observium πŸ”

Now that you have the Observium network monitoring platform installed, it's time to add a host.

πŸ“– Read

via "Security on TechRepublic".
❌ Satan Ransomware Reborn to Torment Businesses ❌

A hellish mix of features shows the 5ss5c ransomware to be the son of Satan.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2010-3048

Cisco Unified Personal Communicator 7.0 (1.13056) does not free allocated memory for received data and does not perform validation if memory allocation is successful, causing a remote denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat πŸ•΄

Cybercriminals are evolving their tactics, and the security community anticipates voice and video fraud to play a role in one of the next big data breaches -- so start protecting your business now.

πŸ“– Read

via "Dark Reading: ".
πŸ” How a researcher exploited the Windows 10 bug patched by Microsoft πŸ”

The work by security researcher Saleem Rashid shows that the bug could be exploited in the real world to spoof security certificates on machines without Microsoft's patch.

πŸ“– Read

via "Security on TechRepublic".
πŸ” These subject lines are the most clicked for phishing πŸ”

The most successful email lures don't promise riches, but issue imminent cybersecurity warnings or urgent office messages, a report reveals.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Federal Health IT Plan Prioritizes Security, Privacy πŸ”

The U.S. HHS released a draft of its federal health IT plan for 2020-2025 and health and privacy are top of mind.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Google Account Security Keys Launch for iPhone ❌

iPhone users can now use Bluetooth to secure their Google accounts.

πŸ“– Read

via "Threatpost".
❌ Critical Cisco Flaws Now Have PoC Exploit ❌

The flaws affect a key tool for managing its network platform and switches.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Attack Campaigns Suggest Emotet Threat Is Far From Over πŸ•΄

Malware described by the DHS as among the worst ever continues to evolve and grow, researchers from Cisco Talos, Cofense, and Check Point Software say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses πŸ•΄

Risks of nation-state attacks go beyond Iran, and the need for awareness and security don't stop at any national border.

πŸ“– Read

via "Dark Reading: ".
⚠ EDRi’s guidelines call for more ethical websites ⚠

Recommendations cover areas including security and privacy while listing alternatives to free online services that slurp your users' data.

πŸ“– Read

via "Naked Security".