πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Solving the Cloud Data Security Conundrum πŸ•΄

Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Enterprise Cloud Use Continues to Outpace Security πŸ•΄

Nearly 60% of IT and security pros say deployment of business services in the cloud has rushed past their ability to secure them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps πŸ•΄

Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you.

πŸ“– Read

via "Dark Reading: ".
πŸ” Financial services companies are ahead in hybrid cloud deployments πŸ”

But 73% of financial companies are moving applications off the cloud and back on premises.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Google reveals new cloud security features at RSA 2020 πŸ”

Google's reCAPTCHA Enterprise and Web Risk API get a general release; Chronicle Security gets boosts from new threat detection and timelining features.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2012-0785

Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."

πŸ“– Read

via "National Vulnerability Database".
πŸ” 3D map shows how the coronavirus is spreading worldwide πŸ”

A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.

πŸ“– Read

via "Security on TechRepublic".
❌ Apple Takes Heat Over β€˜Vulnerable’ iOS Cut-and-Paste Data ❌

Software developer builds a malicious proof-of-concept iOS app that can read data temporarily saved to the device’s clipboard.

πŸ“– Read

via "Threatpost".
πŸ€ͺπŸ’Έ SPECIAL OFFER! πŸ’ΈπŸ€ͺ

 CYBERSECURITY 2020 by WILEY 😈

β˜‘οΈ Secure yourself a new bundle of cybersecurity ebooks! Get ebooks like Cryptography Engineering: Design Principles and Practical Applications, Reversing: Secrets of Reverse Engineering, Social Engineering: The Science of Human Hacking, and more.

β–ͺ️ $959 Worth of awesome ebooks & videos β–ͺ️
▫️ Pay $1 or more ▫️
β–ͺ️ DRM-Free β–ͺ️
▫️ Multi-format ▫️
πŸ•΄ Security, Networking Collaboration Cuts Breach Cost πŸ•΄

CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.

πŸ“– Read

via "Dark Reading: ".
πŸ” Smishing, data theft by directors, and a new mental health focus πŸ”

Security researchers and practitioners will be talking about a surge in SMS-based phishing attacks, the threat employees pose to data security, and how to improve health and wellness on security team members.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Verizon: Attacks on Mobile Devices Rise πŸ•΄

Companies of all sizes are being hit by mobile attacks and feeling the effects for extended periods of time, according to the 2020 Verizon Mobile Security Index.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Wanted: Hands-On Cybersecurity Experience πŸ•΄

Organizations lament a lack of qualified job candidates as they continue to struggle to hire and retain security teams, the new ISACA State of Cybersecurity 2020 report shows.

πŸ“– Read

via "Dark Reading: ".
⚠ Google denies illegally slurping data off free student Chromebooks ⚠

Nonsense! says Google in response to a lawsuit filed by New Mexico's AG, which accuses Google of violating COPPA's child privacy laws.

πŸ“– Read

via "Naked Security".
⚠ Smart speakers mistakenly eavesdrop up to 19 times a day ⚠

That smart home speaker isn't listening to everything you say, according to new research - but it is listening a lot more than it should.

πŸ“– Read

via "Naked Security".
⚠ The β€œCloud Snooper” malware that sneaks into your Linux servers ⚠

Fascinating research from SophosLabs into a wolf-in-sheep's-clothing malware sample.

πŸ“– Read

via "Naked Security".
❌ Free Download: The Ultimate Security Pros’ Checklist ❌

The Ultimate Security Pros’ Checklist fully maps the core duties of common security positions, from the core technical security aspect to team management and executive reporting.

πŸ“– Read

via "Threatpost".
❌ Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work ❌

The Department of Homeland Security and two U.S. military branches already had discontinued use of the app based on concerns over Chinese data-security and censorship practices.

πŸ“– Read

via "Threatpost".
πŸ•΄ McAfee Acquires Light Point for Browser Isolation Tech πŸ•΄

Company plans to integrate Light Point Security's technology into the McAfee Secure Web Gateway and its Mvision UCE platform.

πŸ“– Read

via "Dark Reading: ".