πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Kraken Resurfaces From the Deep Web πŸ•΄

Fallout Exploit Kit releases Kraken Cryptor ransomware, giving the simple threat a much larger target pool.

πŸ“– Read

via "Dark Reading: ".
❌ Square, PayPal POS Hardware Open to Multiple Attack Vectors ❌

Popular card readers like Square and PayPal have various flaws that allow attacks ranging from fraud to card data theft.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Destructive Cyberattacks Spiked in Q3 πŸ•΄

Instead of simply fleeing when discovered, adversaries are actively engaging with incident response teams, a new Carbon Black study finds.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-7266

The Interactive Advertising Bureau (IAB) OpenRTB 2.3 protocol implementation might allow remote attackers to conceal the status of ad transactions and potentially compromise bid integrity by leveraging failure to limit the time between bid responses and impression notifications, aka the Amnesia Bug.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5159

python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to make your apps passwordless with Microsoft Authenticator and FIDO2 πŸ”

Stop making users change passwords and start getting rid of passwords entirely.

πŸ“– Read

via "Security on TechRepublic".
⚠ Mirai author fined $8.6million, gets 6 months house arrest ⚠

An Alaskan court has handed one of the Mirai authors a huge fine.

πŸ“– Read

via "Naked Security".
⚠ Crypto exchange collapses, victims accuse it of exit scam ⚠

Another day, another exchange goes down - but was it a hack or an exit scam?

πŸ“– Read

via "Naked Security".
⚠ Google’s stealthy reCAPTCHA v3 detects humans – no questions asked ⚠

After 20 years of waiting you'll no longer feel your will to live drain away as you solve tedious visual puzzles. Maybe.

πŸ“– Read

via "Naked Security".
⚠ How one man could have taken over any business on Facebook ⚠

The recently patched flaw would have enabled anyone to make themselves an administrator for any Facebook business account.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-6343

JBoss BPM Suite 6 is vulnerable to a reflected XSS via dashbuilder. Remote attackers can entice authenticated users that have privileges to access dashbuilder (usually admins) to click on links to /dashbuilder/Controller containing malicious scripts. Successful exploitation would allow execution of script code within the context of the affected user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-5402

A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-2121

A permissions flaw was found in redis, which sets weak permissions on certain files and directories that could potentially contain sensitive information. A local, unprivileged user could possibly use this flaw to access unauthorized system information.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Spooking the C-Suite: The Ephemeral Specter of Third-Party Cyber-Risk πŸ•΄

Halloween movies are the perfect metaphor for breaking down today's scariest supplier breach tropes.

πŸ“– Read

via "Dark Reading: ".
πŸ” How Microsoft's Defending Democracy program amplifies account security πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, explains how the company is combating disinformation, phishing attacks, and cloud security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to get security right in digital transformation: 10 best practices πŸ”

Involving security leaders from the start and raising accountability are some of the steps companies can take to improve digital security, according to a PwC report.

πŸ“– Read

via "Security on TechRepublic".
❌ Kraken Ransomware Upgrades Distribution with RaaS Model ❌

The Kraken ransomware author has released a second version of the malicious code, along with a unique affiliate program on the Dark Web. According to research into Kraken v.2 the new version is being promoted in a ransomware-as-a-service (RaaS) model to underground forum customers, via a video demoing its capabilities. Those interested can complete a […]

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Apple Fixes Multiple macOS, iOS Bugs Including a Quirky FaceTime Bug ❌

Security updates across all Apple platforms released alongside its new products.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ How the Power of Quantum Can Be Used Against Us πŸ•΄

There has been a palpable shift from volumetric attacks to "quantum attacks," and they look to be one of the biggest cybersecurity challenges on the rise today.

πŸ“– Read

via "Dark Reading: ".
πŸ” How Microsoft is trying to identify and eradicate disinformation πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, explains how the company is addressing influence campaigns, using machine learning for these models, and looking at eliminating disinformation.

πŸ“– Read

via "Security on TechRepublic".
⚠ Spooky miasmic gas bricks hospital iPhones (mwah ha ha ha) ⚠

Apple devices haunted by helium.

πŸ“– Read

via "Naked Security".