πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ AZORult Campaign Adopts Novel Triple-Encryption Technique ❌

Popular trojan is sneaking its way onto PCs via malspam campaign that uses three levels of encryption to sneak past cyber defenses.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Actively Targeting Flaw in Door-Access Controllers πŸ•΄

There's been a sharp increase in scans for vulnerable Nortek Linear Emerge E3 systems, SonicWall says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Find 24 'Dangerous' Android Apps with 382M Installs πŸ•΄

Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ C-Level & Studying for the CISSP πŸ•΄

One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ EKANS Ransomware Raises Industrial-Control Worries πŸ•΄

Although the ransomware is unsophisticated, the malware does show that some crypto-attackers are targeting certain industrial control products.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Bad Certificate Knocks Teams Off Line πŸ•΄

Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Bad Certificate Knocks Teams Offline πŸ•΄

Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.

πŸ“– Read

via "Dark Reading: ".
⚠ Google’s Super Bowl ad will make you cry. Or wince. ⚠

Google's Super Bowl ad featured an elderly man's voice as he asked Google Assistant to help him remember details about his late wife.

πŸ“– Read

via "Naked Security".
⚠ Twitter gave access to student’s account to his college ⚠

Twitter admitted it broke the rules when it handed over control of the student's account to college administrators.

πŸ“– Read

via "Naked Security".
⚠ NIST tests methods of recovering data from smashed smartphones ⚠

Criminals have found to their cost that reducing a device to a pile of rubble means nothing if the internal chips are still in working order.

πŸ“– Read

via "Naked Security".
πŸ” 4 key trends to hit the cybersecurity industry in 2020 πŸ”

Get ready for consolidation risk, microbreaches, and other cybersecurity hazards, warn experts from Mimecast, the Cyber Resilience Think Tank.

πŸ“– Read

via "Security on TechRepublic".
❌ Twitter API Abused to Uncover User Identities ❌

State-sponsored actors may have been behind the social media abuse, said Twitter.

πŸ“– Read

via "Threatpost".
πŸ•΄ What WON'T Happen in Cybersecurity in 2020 πŸ•΄

Predictions are a dime a dozen. Here are six trends that you won't be hearing about anytime soon.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-5686

ZPanel 10.0.1 has insufficient entropy for its password reset process.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-5618

Ushahidi before 2.6.1 has insufficient entropy for forgot-password tokens.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4937

Joomla! 1.7.1 has core information disclosure due to inadequate error checking.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4912

Joomla! com_mailto 1.5.x through 1.5.13 has an automated mail timeout bypass.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3629

Joomla! core 1.7.1 allows information disclosure due to weak encryption

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Kubernetes Shows Built-in Weakness πŸ•΄

A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Twitter Suspends Fake Accounts Abusing Feature that Matches Phone Numbers and Users πŸ•΄

The company believes state-sponsored actors may also be involved.

πŸ“– Read

via "Dark Reading: ".