πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Google purges 600 Android apps for β€œdisruptive” pop-up ads ⚠

These apps plunk ads in front of us when we're trying to do something else, often leading to inadvertent ad clicks and much cursing.

πŸ“– Read

via "Naked Security".
πŸ” 16 best practices for improving cybersecurity πŸ”

Cisco's 2020 CISO Benchmark Study links a robust patch policy and collaboration to smaller data breaches.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The good, the bad, and the scary from Experian's data breach report πŸ”

Many security teams don't update response plans on a regular basis but complying with GDPR is getting easier.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Three things CISOs need to do differently in 2020 πŸ”

Security leaders need to connect their work to broader business goals and create a culture of learning to attract talent.

πŸ“– Read

via "Security on TechRepublic".
⚠ KidsGuard stalkerware leaks data on secretly surveilled victims ⚠

The company left a server open and unprotected, regurgitating private data slurped from thousands of surveilled people, including children.

πŸ“– Read

via "Naked Security".
❌ Data Breach Occurs at Agency in Charge of Secure White House Communications ❌

A leak at the Defense Information Systems Agency exposed personal information of government employees, including social security numbers.

πŸ“– Read

via "Threatpost".
πŸ” What is Cyber Insurance? πŸ”

What is cyber insurance? Get a definition, learn why it's important, how it works, best practices, and more in this week's Data Protection 101, our series on the fundamentals of information security

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Latest Security News from RSAC 2020 πŸ•΄

Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2020 in San Francisco.

πŸ“– Read

via "Dark Reading: ".
πŸ” Summer Olympics is ripe for cyberattacks πŸ”

Criminals will exploit the confusion and hustle and bustle of the games to their advantage, according to security researcher.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Solving the Cloud Data Security Conundrum πŸ•΄

Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Enterprise Cloud Use Continues to Outpace Security πŸ•΄

Nearly 60% of IT and security pros say deployment of business services in the cloud has rushed past their ability to secure them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps πŸ•΄

Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you.

πŸ“– Read

via "Dark Reading: ".
πŸ” Financial services companies are ahead in hybrid cloud deployments πŸ”

But 73% of financial companies are moving applications off the cloud and back on premises.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Google reveals new cloud security features at RSA 2020 πŸ”

Google's reCAPTCHA Enterprise and Web Risk API get a general release; Chronicle Security gets boosts from new threat detection and timelining features.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2012-0785

Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."

πŸ“– Read

via "National Vulnerability Database".
πŸ” 3D map shows how the coronavirus is spreading worldwide πŸ”

A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.

πŸ“– Read

via "Security on TechRepublic".
❌ Apple Takes Heat Over β€˜Vulnerable’ iOS Cut-and-Paste Data ❌

Software developer builds a malicious proof-of-concept iOS app that can read data temporarily saved to the device’s clipboard.

πŸ“– Read

via "Threatpost".
πŸ€ͺπŸ’Έ SPECIAL OFFER! πŸ’ΈπŸ€ͺ

 CYBERSECURITY 2020 by WILEY 😈

β˜‘οΈ Secure yourself a new bundle of cybersecurity ebooks! Get ebooks like Cryptography Engineering: Design Principles and Practical Applications, Reversing: Secrets of Reverse Engineering, Social Engineering: The Science of Human Hacking, and more.

β–ͺ️ $959 Worth of awesome ebooks & videos β–ͺ️
▫️ Pay $1 or more ▫️
β–ͺ️ DRM-Free β–ͺ️
▫️ Multi-format ▫️
πŸ•΄ Security, Networking Collaboration Cuts Breach Cost πŸ•΄

CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.

πŸ“– Read

via "Dark Reading: ".
πŸ” Smishing, data theft by directors, and a new mental health focus πŸ”

Security researchers and practitioners will be talking about a surge in SMS-based phishing attacks, the threat employees pose to data security, and how to improve health and wellness on security team members.

πŸ“– Read

via "Security on TechRepublic".