πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2011-3611

A File Inclusion vulnerability exists in act parameter to admin.php in UseBB before 1.0.12.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Eight Flaws in MSP Software Highlight Potential Ransomware Vector πŸ•΄

An attack chain of vulnerabilities in ConnectWise's software for MSPs has similarities to some of the details of the August attack on Texas local and state agencies.

πŸ“– Read

via "Dark Reading: ".
πŸ” 3 biggest threats cybersecurity professionals are facing in 2020 πŸ”

Organizations are moving toward next-generation cybersecurity solutions this year, but security fragmentation is a looming threat.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to disconnect devices and revoke app privileges from your Firefox cloud account πŸ”

You'll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2011-3622

A Cross-Site Scripting (XSS) vulnerability exists in the admin login screen in Phorum before 5.2.18.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ To Avoid Disruption, Ransomware Victims Continue to Pay Up πŸ•΄

For all the cautions against doing so, one-third of organizations in a Proofpoint survey said they paid their attackers after getting infected with ransomware.

πŸ“– Read

via "Dark Reading: ".
❌ Vivin Nets Thousands of Dollars Using Cryptomining Malware ❌

A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn't going away anytime soon.

πŸ“– Read

via "Threatpost".
πŸ•΄ For Mismanaged SOCs, The Price Is Not Right πŸ•΄

New research finds security operations centers suffer high turnover and yield mediocre results for the investment they require.

πŸ“– Read

via "Dark Reading: ".
❌ Pwn2Own Miami Contestants Haul in $180K for Hacking ICS Equipment ❌

The competition targets the systems that run critical infrastructure and more.

πŸ“– Read

via "Threatpost".
πŸ” How to protect your organization against targeted phishing attacks πŸ”

Companies should realize that any user could be a target and use threat data to build a security awareness training program, says Proofpoint.

πŸ“– Read

via "Security on TechRepublic".
⚠ FBI issues warning about lucrative fake job scams ⚠

What’s the difference between a real job and a fake one found on the internet? The fake ones are suspiciously easy to get interviews for.

πŸ“– Read

via "Naked Security".
⚠ Sonos’s tone-deaf legacy product policy angers customers ⚠

Stopping software updates for legacy kit is nothing new, but it's the way the company has done it that has Sonos customers' hackles up.

πŸ“– Read

via "Naked Security".
⚠ Apple allegedly made nice with FBI by dropping iCloud encryption plan ⚠

Sources told Reuters that Apple may have been convinced by arguments made during the legal fight over cracking the San Bernardino iPhone.

πŸ“– Read

via "Naked Security".
⚠ UN report alleges that Saudi crown prince hacked Jeff Bezos’s phone ⚠

Digital forensic evidence points to the phone's massive, months-long data egress having likely been triggered by Pegasus mobile spyware.

πŸ“– Read

via "Naked Security".
❌ Google: Flaws in Apple’s Private-Browsing Technology Allow for Third-Party Tracking ❌

New research outlines vulnerabilities in Safari’s Intelligent Tracking Protection that can reveal user browsing behavior to third parties.

πŸ“– Read

via "Threatpost".
⚠ Looking for silver linings in the CVE-2020-0601 crypto vulnerability ⚠

Is there some good news hidden in the story of the CVE-2020-0601 crypto vulnerability?

πŸ“– Read

via "Naked Security".
πŸ•΄ Weathering the Privacy Storm from GDPR to CCPA & PDPA πŸ•΄

A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says πŸ•΄

Attackers 'weaponized' Active Directory to spread the ransomware.

πŸ“– Read

via "Dark Reading: ".
❌ Cisco Warns of Critical Network Security Tool Flaw ❌

The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls.

πŸ“– Read

via "Threatpost".
πŸ” Why many small and midsized businesses remain vulnerable to cyberattack πŸ”

Budget limitations and a lack of knowledge or training are two major factors hurting many SMBs, according to a survey from Untangle.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Falco 0.19.0 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".