πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Update now – WhatsApp flaw gave attackers access to local files ⚠

The flaw affecting WhatsApp's desktop client when it's paired with the iPhone app allowed attackers access to local file systems.

πŸ“– Read

via "Naked Security".
πŸ•΄ RSAC Sets Finalists for Innovation Sandbox πŸ•΄

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep25: You’ve seen WHAT on public Trello boards? – Naked Security Podcast ⚠

New episode available now.

πŸ“– Read

via "Naked Security".
πŸ” Beware of malware disguised as Oscar-nominated movies including Joker and Parasite πŸ”

Joker was the hottest film among cybercriminals with 304 malicious files named after Batman's arch-nemesis, says security firm Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Invisible Pixel Patterns Can Communicate Data Covertly πŸ•΄

University researchers show that changing the brightness of monitor pixels can communicates data from air-gapped systems in a way not visible to human eyes.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why shortcuts lead to failure: Lessons from app disaster in Iowa πŸ”

Quality control and standard software dev process could have prevented extended delays in reporting the results of the 2020 Iowa Caucus.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ A Matter of Trust πŸ•΄

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Finance Sector Hit with Targeted Backdoor Campaign ❌

The powerful Minebridge backdoor gives cyberattackers full run of a victim's machine.

πŸ“– Read

via "Threatpost".
❌ Metamorfo Returns with Keylogger Trick to Target Financial Firms ❌

The malware uses a tactic to force victims to retype passwords into their systems - which it tracks via a keylogger.

πŸ“– Read

via "Threatpost".
πŸ•΄ Facebook Tops Imitated Brands as Attackers Target Tech πŸ•΄

Brand impersonators favor Facebook, Yahoo, Network, and PayPal in phishing attempts to steal credentials from victims.

πŸ“– Read

via "Dark Reading: ".
πŸ” The postmortem: Shadow took lots of shortcuts with Iowa 2020 caucus app πŸ”

Extreme delays in reporting results shows "move fast and break things" is the wrong approach for election infrastructure, developers and business leaders say.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras πŸ•΄

Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Forescout Acquired by Private Equity Team πŸ•΄

The deal, valued at $1.9 billion, is expected to close next quarter.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-6340

An Authentication vulnerability exists in NETGEAR WGR614 v7 and v9 due to a hardcoded credential used for serial programming, a related issue to CVE-2006-1002.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6309

A vulnerability exists in Arctic Torrent 1.4 via unspecified vectors in .torrent file handling, which could let a malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6307

A vulnerability exists in JPEGsnoop 1.5.2 due to an unspecified issue in JPEG file handling, which could let a malicious user execute arbitrary code

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6306

A vulnerability exists in HCView (aka Hardcoreview) 1.4 due to a write access violation with a GIF file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6297

Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Phishing Personified πŸ•΄

What makes these scams so completely obvious in the physical form?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 90% of CISOs Would Cut Pay for Better Work-Life Balance πŸ•΄

Businesses receive $30,000 of 'free' CISO time as security leaders report job-related stress taking a toll on their health and relationships.

πŸ“– Read

via "Dark Reading: ".