πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Google won't let you sign in if you disabled JavaScript in your browser πŸ”

Google announces for new security features to protect Google accounts.

πŸ“– Read

via "Security on TechRepublic".
❌ Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack ❌

Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Artificial intelligence agent pilot launched to expose liars at EU borders πŸ”

AI is being employed to act as a lie detector to reduce the pressure on country borders and human agents.

πŸ“– Read

via "Security on TechRepublic".
❌ PoC Exploit Compromises Microsoft Live Accounts via Subdomain Hijacking ❌

Poor DNS housekeeping opens the door to account takeover.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ FIFA Reveals Second Hack πŸ•΄

Successful phishing campaign leads attackers to confidential information of world soccer's governing body.

πŸ“– Read

via "Dark Reading: ".
❌ Utilities, Energy Sector Attacked Mainly Via IT, Not ICS ❌

Stealing administrative credentials to carry out months-long spy campaigns is a top threat.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Radisson Rewards Program Targeted in Data Breach πŸ•΄

It's the latest in a series of attacks targeting the travel industry, following incidents at British Airways and Cathay Pacific.

πŸ“– Read

via "Dark Reading: ".
πŸ” Social media support fraud is up nearly 500%, reaches highest level ever πŸ”

While social media platforms have succeeded in protecting users from phishing links, angler phishing has become the new mode of attack for many malicious actors.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Where Is the Consumer Outrage about Data Breaches? πŸ•΄

Facebook, Equifax, Cambridge Analytica ... Why do breaches of incomprehensible magnitude lead to a quick recovery for the businesses that lost or abused the data and such little lasting impact for the people whose information is stolen.

πŸ“– Read

via "Dark Reading: ".
πŸ” Carbon Black Incident Response Threat Report: US elections are endangered by cyberattacks πŸ”

A recent report by cybersecurity organization Carbon Black paints a grim picture of potential cyberattacks involving the upcoming US Elections. Learn more about the details.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points πŸ•΄

'BleedingBit' could give attackers control of the wireless network from a remote vantage point.

πŸ“– Read

via "Dark Reading: ".
❌ GDPR’s First 150 Days Impact on the U.S. ❌

Weighing the impact of GDPR and how the historic legislation has shaped privacy protection measures in the U.S., so far.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Yi IoT Home Camera Riddled with Code-Execution Vulnerabilities ❌

Five of them allow remote compromise of the IoT gadgets, so attackers can intercept video feeds and more.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Why the Facebook/Cambridge Analytica scandal makes connecting with voters more difficult πŸ”

Chris Wilson of WPA Intelligence reflects on why he thinks the Facebook/Cambridge Analytica incident makes it more difficult to reach voters.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft, Amazon Top BEC's Favorite Brands πŸ•΄

When attackers want to impersonate a brand via email, the majority turn to Microsoft and Amazon because of their ubiquity in enterprise environments.

πŸ“– Read

via "Dark Reading: ".
⚠ Report reveals one-dimensional support for two-factor authentication ⚠

34 popular consumer websites were put to the 2FA test.

πŸ“– Read

via "Naked Security".
⚠ Google’s stealthy sign-in sentry can pick up pilfered passwords ⚠

The search giant's secret sauce can see when somebody's using your stolen password.

πŸ“– Read

via "Naked Security".
⚠ Popular browsers made to cough up browsing history ⚠

Only one browser stood fast against a set of new browser history attacks.

πŸ“– Read

via "Naked Security".
πŸ” These 10 US states are at the highest risk for election hacking πŸ”

States with more federal representatives and larger legislatures have higher rates of election hacking, according to highspeedinternet.com.

πŸ“– Read

via "Security on TechRepublic".
⚠ Another day, another update, another iPhone lockscreen bypass ⚠

Researcher JosΓ© RodrΓ­guez beats the lockscreen to display contact phone numbers and email addresses.

πŸ“– Read

via "Naked Security".