πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Google pulls 500 malicious Chrome extensions after researcher tip-off ⚠

Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2013-3738

A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to report a phishing or spam email to Microsoft πŸ”

Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  OpenSSH 8.2p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2013-3722

A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2412

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4531. Reason: This candidate is a duplicate of CVE-2012-4531. Notes: All CVE users should reference CVE-2012-4531 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
❌ Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs ❌

A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.

πŸ“– Read

via "Threatpost".
⚠ Sensitive plastic surgery images exposed online ⚠

Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.

πŸ“– Read

via "Naked Security".
⚠ IOTA shuts down network temporarily to fight wallet hacker ⚠

Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.

πŸ“– Read

via "Naked Security".
⚠ AI filter launched to block Twitter cyberflashing ⚠

A small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers.

πŸ“– Read

via "Naked Security".
⚠ Council returns to using pen and paper after cyberattack ⚠

Ten days after a suspected ransomware attack, residents of the English borough of Redcar and Cleveland must be starting to wonder when their Council’s IT systems will return.

πŸ“– Read

via "Naked Security".
πŸ” Python, microservices, and more tech trends for 2020, according to O'Reilly πŸ”

Interest in Kubernetes is increasing, and DevOps is losing steam, based on O'Reilly survey findings.

πŸ“– Read

via "Security on TechRepublic".
❌ Hacker Scheme Threatens AdSense Customers with Account Suspension ❌

Scam threatens to flood sites using Google’s banner-ad program with bot and junk traffic if owners don’t pay $5K in bitcoin.

πŸ“– Read

via "Threatpost".
πŸ•΄ 8 Things Users Do That Make Security Pros Miserable πŸ•΄

When a user interacts with an enterprise system the result can be productivity or disaster. Here are 8 opportunities for the disaster side to win out over the productive.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Staircase to the Cloud: Dark Reading Caption Contest Winners πŸ•΄

A humorous nod to the lack of gender equity in cybersecurity hiring was our judges' unanimous choice. And the winners are ...

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Roads to Riches πŸ•΄

You could be making millions in just two years!

πŸ“– Read

via "Dark Reading: ".
⚠ Malware and HTTPS – a growing love affair ⚠

HTTPS web encryption - blessing or curse? A new SophosLabs report looks at how much the crooks love TLS.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Road(s) to Riches πŸ•΄

You could be making millions in just two years!

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Firmware Weaknesses Can Turn Computer Subsystems into Trojans πŸ•΄

Network cards, video cameras, and graphics adapters are a few of the subsystems whose lack of security could allow attackers to turn them into spy implants.

πŸ“– Read

via "Dark Reading: ".
πŸ” Mac attacks on the rise πŸ”

Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report.

πŸ“– Read

via "Security on TechRepublic".