πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Dropbox Passes $1M Milestone for Bug-Bounty Payouts ❌

The file-sharing service also disclosed details of past notable bugs for the first time.

πŸ“– Read

via "Threatpost".
❌ Charming Kitten Uses Fake Interview Requests to Target Public Figures ❌

APT group poses as a former Wall Street Journal journalist to launch phishing campaigns and steal victim email account details.

πŸ“– Read

via "Threatpost".
⚠ Google’s Chrome 80 clamps down on cookies and notification spam ⚠

Version 80 of the Chrome browser is out with some new features designed to save your security and your sanity.

πŸ“– Read

via "Naked Security".
πŸ•΄ RSAC Sets Finalists for Innovation Sandbox πŸ•΄

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.

πŸ“– Read

via "Dark Reading: ".
⚠ Twitter bans deepfakes, but only those β€˜likely to cause harm’ ⚠

Twitter isn't interested in how the β€œsynthetic or manipulated” media is created, but if it has the potential to cause harm it'll be removed.

πŸ“– Read

via "Naked Security".
πŸ” IoT is a gold mine for hackers using fileless malware for cyberattacks πŸ”

Data exposure is one of the biggest threats from attacks on IoT devices. A new report recommends a shift to perimeter-less security strategies.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Can We Make Election Technology Secure? πŸ•΄

In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-2593

Cross-site scripting (XSS) vulnerability in the administrative interface in Atmail Webmail Server 6.4 allows remote attackers to inject arbitrary web script or HTML via the Date field of an email.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-3917

Google Chrome before 3.0 does not properly handle XML documents, which allows remote attackers to obtain sensitive information via a crafted web site.

πŸ“– Read

via "National Vulnerability Database".
⚠ Update now – WhatsApp flaw gave attackers access to local files ⚠

The flaw affecting WhatsApp's desktop client when it's paired with the iPhone app allowed attackers access to local file systems.

πŸ“– Read

via "Naked Security".
πŸ•΄ RSAC Sets Finalists for Innovation Sandbox πŸ•΄

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep25: You’ve seen WHAT on public Trello boards? – Naked Security Podcast ⚠

New episode available now.

πŸ“– Read

via "Naked Security".
πŸ” Beware of malware disguised as Oscar-nominated movies including Joker and Parasite πŸ”

Joker was the hottest film among cybercriminals with 304 malicious files named after Batman's arch-nemesis, says security firm Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Invisible Pixel Patterns Can Communicate Data Covertly πŸ•΄

University researchers show that changing the brightness of monitor pixels can communicates data from air-gapped systems in a way not visible to human eyes.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why shortcuts lead to failure: Lessons from app disaster in Iowa πŸ”

Quality control and standard software dev process could have prevented extended delays in reporting the results of the 2020 Iowa Caucus.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ A Matter of Trust πŸ•΄

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Finance Sector Hit with Targeted Backdoor Campaign ❌

The powerful Minebridge backdoor gives cyberattackers full run of a victim's machine.

πŸ“– Read

via "Threatpost".
❌ Metamorfo Returns with Keylogger Trick to Target Financial Firms ❌

The malware uses a tactic to force victims to retype passwords into their systems - which it tracks via a keylogger.

πŸ“– Read

via "Threatpost".
πŸ•΄ Facebook Tops Imitated Brands as Attackers Target Tech πŸ•΄

Brand impersonators favor Facebook, Yahoo, Network, and PayPal in phishing attempts to steal credentials from victims.

πŸ“– Read

via "Dark Reading: ".
πŸ” The postmortem: Shadow took lots of shortcuts with Iowa 2020 caucus app πŸ”

Extreme delays in reporting results shows "move fast and break things" is the wrong approach for election infrastructure, developers and business leaders say.

πŸ“– Read

via "Security on TechRepublic".