πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Google’s stealthy reCAPTCHA v3 detects humans – no questions asked ⚠

After 20 years of waiting you'll no longer feel your will to live drain away as you solve tedious visual puzzles. Maybe.

πŸ“– Read

via "Naked Security".
⚠ How one man could have taken over any business on Facebook ⚠

The recently patched flaw would have enabled anyone to make themselves an administrator for any Facebook business account.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-6343

JBoss BPM Suite 6 is vulnerable to a reflected XSS via dashbuilder. Remote attackers can entice authenticated users that have privileges to access dashbuilder (usually admins) to click on links to /dashbuilder/Controller containing malicious scripts. Successful exploitation would allow execution of script code within the context of the affected user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-5402

A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-2121

A permissions flaw was found in redis, which sets weak permissions on certain files and directories that could potentially contain sensitive information. A local, unprivileged user could possibly use this flaw to access unauthorized system information.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Spooking the C-Suite: The Ephemeral Specter of Third-Party Cyber-Risk πŸ•΄

Halloween movies are the perfect metaphor for breaking down today's scariest supplier breach tropes.

πŸ“– Read

via "Dark Reading: ".
πŸ” How Microsoft's Defending Democracy program amplifies account security πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, explains how the company is combating disinformation, phishing attacks, and cloud security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to get security right in digital transformation: 10 best practices πŸ”

Involving security leaders from the start and raising accountability are some of the steps companies can take to improve digital security, according to a PwC report.

πŸ“– Read

via "Security on TechRepublic".
❌ Kraken Ransomware Upgrades Distribution with RaaS Model ❌

The Kraken ransomware author has released a second version of the malicious code, along with a unique affiliate program on the Dark Web. According to research into Kraken v.2 the new version is being promoted in a ransomware-as-a-service (RaaS) model to underground forum customers, via a video demoing its capabilities. Those interested can complete a […]

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Apple Fixes Multiple macOS, iOS Bugs Including a Quirky FaceTime Bug ❌

Security updates across all Apple platforms released alongside its new products.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ How the Power of Quantum Can Be Used Against Us πŸ•΄

There has been a palpable shift from volumetric attacks to "quantum attacks," and they look to be one of the biggest cybersecurity challenges on the rise today.

πŸ“– Read

via "Dark Reading: ".
πŸ” How Microsoft is trying to identify and eradicate disinformation πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, explains how the company is addressing influence campaigns, using machine learning for these models, and looking at eliminating disinformation.

πŸ“– Read

via "Security on TechRepublic".
⚠ Spooky miasmic gas bricks hospital iPhones (mwah ha ha ha) ⚠

Apple devices haunted by helium.

πŸ“– Read

via "Naked Security".
πŸ” How Microsoft is trying to identify and eradicate disinformation πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, explains how the company is addressing influence campaigns, using machine learning for these models, and looking at eliminating disinformation.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Microsoft's security tactics focus on customers, transparency, and working with its tech competitors πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, talks about the company's approach to data security, collaborating with its major tech competitors, and why the cloud is a security imperative.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Qualys Snaps Up Container Firm πŸ•΄

Plans to use Layered Insight's technology to add runtime capabilities and automated enforcement to its container security tool.

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft's security tactics focus on customers, transparency, and working with its tech competitors πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, talks about the company's approach to data security, collaborating with its major tech competitors, and why the cloud is a security imperative.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 9 Traits of A Strong Infosec Resume πŸ•΄

Security experts share insights on which skills and experiences are most helpful to job hunters looking for their next gig.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Pervasive Emotet Botnet Now Steals Emails πŸ•΄

Researchers discover new cyber-spying function in the persistent malware operation's arsenal.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why data security is a priority for political campaigns πŸ”

Chris Wilson of WPA Intelligence explains how state campaigns combat cyberattacks before the midterm elections.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2016-2125

It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.

πŸ“– Read

via "National Vulnerability Database".