πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” What is Cyber Insurance? πŸ”

What is cyber insurance? Get a definition, learn why it's important, how it works, best practices, and more in this week's Data Protection 101, our series on the fundamentals of information security

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Latest Security News from RSAC 2020 πŸ•΄

Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2020 in San Francisco.

πŸ“– Read

via "Dark Reading: ".
πŸ” Summer Olympics is ripe for cyberattacks πŸ”

Criminals will exploit the confusion and hustle and bustle of the games to their advantage, according to security researcher.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Solving the Cloud Data Security Conundrum πŸ•΄

Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Enterprise Cloud Use Continues to Outpace Security πŸ•΄

Nearly 60% of IT and security pros say deployment of business services in the cloud has rushed past their ability to secure them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps πŸ•΄

Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you.

πŸ“– Read

via "Dark Reading: ".
πŸ” Financial services companies are ahead in hybrid cloud deployments πŸ”

But 73% of financial companies are moving applications off the cloud and back on premises.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Google reveals new cloud security features at RSA 2020 πŸ”

Google's reCAPTCHA Enterprise and Web Risk API get a general release; Chronicle Security gets boosts from new threat detection and timelining features.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2012-0785

Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."

πŸ“– Read

via "National Vulnerability Database".
πŸ” 3D map shows how the coronavirus is spreading worldwide πŸ”

A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.

πŸ“– Read

via "Security on TechRepublic".
❌ Apple Takes Heat Over β€˜Vulnerable’ iOS Cut-and-Paste Data ❌

Software developer builds a malicious proof-of-concept iOS app that can read data temporarily saved to the device’s clipboard.

πŸ“– Read

via "Threatpost".
πŸ€ͺπŸ’Έ SPECIAL OFFER! πŸ’ΈπŸ€ͺ

 CYBERSECURITY 2020 by WILEY 😈

β˜‘οΈ Secure yourself a new bundle of cybersecurity ebooks! Get ebooks like Cryptography Engineering: Design Principles and Practical Applications, Reversing: Secrets of Reverse Engineering, Social Engineering: The Science of Human Hacking, and more.

β–ͺ️ $959 Worth of awesome ebooks & videos β–ͺ️
▫️ Pay $1 or more ▫️
β–ͺ️ DRM-Free β–ͺ️
▫️ Multi-format ▫️
πŸ•΄ Security, Networking Collaboration Cuts Breach Cost πŸ•΄

CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.

πŸ“– Read

via "Dark Reading: ".
πŸ” Smishing, data theft by directors, and a new mental health focus πŸ”

Security researchers and practitioners will be talking about a surge in SMS-based phishing attacks, the threat employees pose to data security, and how to improve health and wellness on security team members.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Verizon: Attacks on Mobile Devices Rise πŸ•΄

Companies of all sizes are being hit by mobile attacks and feeling the effects for extended periods of time, according to the 2020 Verizon Mobile Security Index.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Wanted: Hands-On Cybersecurity Experience πŸ•΄

Organizations lament a lack of qualified job candidates as they continue to struggle to hire and retain security teams, the new ISACA State of Cybersecurity 2020 report shows.

πŸ“– Read

via "Dark Reading: ".
⚠ Google denies illegally slurping data off free student Chromebooks ⚠

Nonsense! says Google in response to a lawsuit filed by New Mexico's AG, which accuses Google of violating COPPA's child privacy laws.

πŸ“– Read

via "Naked Security".
⚠ Smart speakers mistakenly eavesdrop up to 19 times a day ⚠

That smart home speaker isn't listening to everything you say, according to new research - but it is listening a lot more than it should.

πŸ“– Read

via "Naked Security".
⚠ The β€œCloud Snooper” malware that sneaks into your Linux servers ⚠

Fascinating research from SophosLabs into a wolf-in-sheep's-clothing malware sample.

πŸ“– Read

via "Naked Security".