πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Magecart Gang Attacks Olympic Ticket Reseller and Survival Food Sites ❌

A recent slew of skimming attacks have been linked back to Magecart Group 12.

πŸ“– Read

via "Threatpost".
⚠ Cybercrooks busted for multimillion-dollar identity fraud ⚠

Organizations were attacked for employees' data, including names, addresses and birthdates used to set up hundreds of bank accounts.

πŸ“– Read

via "Naked Security".
⚠ Wacom driver caught monitoring third-party software use ⚠

Graphics tablet company Wacom can collect data unconnected to its products, such as which applications users open on their computers.

πŸ“– Read

via "Naked Security".
⚠ Facebook, Google, YouTube order Clearview to stop scraping faceprints ⚠

It's my First Amendment right to scrape publicly available face images, its CEO says. Besides, we're just doing what Google Search does.

πŸ“– Read

via "Naked Security".
⚠ Researchers transmit data covertly by altering screen brightness ⚠

Researchers have retrieved data from a disconnected computer by altering its LCD's pixel density just enough for a camera to pick it up.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five: 2/7 Edition πŸ”

Ransomware takes a dangerous turn, a flaw in the Android Twitter app is exploited, and more - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Phishing Campaign Targets 250 Android Apps with Anubis Malware ❌

New attacks discovered by Cofense can perform keylogging, steal data and completely hijack a mobile device.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Measures to Harden Election Technology πŸ•΄

Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-1567

LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1566

LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintNanny.

πŸ“– Read

via "National Vulnerability Database".
❌ Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs ❌

RCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven't yet patched CVE-2019-19781.

πŸ“– Read

via "Threatpost".
πŸ›  UFONet 1.4 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” How Shadow IT could put your organization at risk πŸ”

Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.

πŸ“– Read

via "Security on TechRepublic".
⚠ Robbin Hood – the ransomware that brings its own bug ⚠

When you need a vulnerability to exploit, but there isn't one... why not simply bring your own, along with your malware?

πŸ“– Read

via "Naked Security".
❌ Google Chrome To Bar HTTP File Downloads ❌

File downloads like images or executables may not be delivered over HTTPS - even if they are available from an HTTPS website.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2010-4658

statusnet through 2010 allows attackers to spoof syslog messages via newline injection attacks.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2008-3793

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3792. Reason: This candidate is a duplicate of CVE-2008-3792. Notes: All CVE users should reference CVE-2008-3792 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide πŸ•΄

Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Poll: A Matter of Trust πŸ•΄

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.

πŸ“– Read

via "Dark Reading: ".
πŸ” Hackers imitating CDC, WHO with coronavirus phishing emails πŸ”

Cybercriminals are now using fears over the outbreak to steal email credentials, security officials say.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ RobbinHood Kills Security Processes Before Dropping Ransomware πŸ•΄

Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.

πŸ“– Read

via "Dark Reading: ".