๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ” How to create a Linux user that cannot log in ๐Ÿ”

For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Report: Shadow IoT Emerging as New Enterprise Security Problem ๐Ÿ•ด

Much of the traffic egressing enterprise networks are from poorly protected Internet-connected consumer devices, a Zscaler study finds.

๐Ÿ“– Read

via "Dark Reading: ".
โš  Taking a GPS tracker off your car isnโ€™t โ€˜theft,โ€™ court rules โš 

This line of thinking could get absurd, Indiana's supreme court declared. How do you "steal" something if you don't know who owns it?

๐Ÿ“– Read

via "Naked Security".
โš  Switch to Signal for encrypted messaging, EC tells staff โš 

Formerly preferred diplomatic app WhatsApp apparently isn't up to snuff.

๐Ÿ“– Read

via "Naked Security".
โŒ Stalkerware Attacks Increased 50 Percent Last Year, Report โŒ

Research puts the emerging mobile threatโ€”which monitors the whereabouts and device activity of devices users as well as collects personal dataโ€”into clearer focus.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Cryptographers Panel Tackles Espionage, Elections & Blockchain ๐Ÿ•ด

Encryption experts gave insights into the Crypto AG revelations, delved into complexities of the "right to be forgotten," and more at RSA Conference.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Emotet Resurfaces to Drive 145% of Threats in Q4 2019 ๐Ÿ•ด

Analysis of 92 billion rejected emails reveals a range of simple and complex attack techniques for the last quarter of 2019.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Unpatched Security Flaws Open Connected Vacuum to Takeover โŒ

A connected, robotic vacuum cleaner has serious vulnerabilities that could allow remote hackers to view its video footage and launch denial of service attacks.

๐Ÿ“– Read

via "Threatpost".
โŒ Iranian APT Targets Govs With New Malware โŒ

A new campaign is targeting governments with the ForeLord malware, which steals credentials.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด 5 Ways to Up Your Threat Management Game ๐Ÿ•ด

Good security programs start with a mindset that it's not about the tools, it's what you do with them. Here's how to get out of a reactive fire-drill mode with vulnerability management.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Kr00k Wi-Fi Vulnerability Affected a Billion Devices ๐Ÿ•ด

Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.

๐Ÿ“– Read

via "Dark Reading: ".
โš  LTE vulnerability allows impersonation of other mobile devices โš 

Researchers have found a way to impersonate mobile devices on 4G and 5G mobile networks, and are calling on operators and standards bodies to fix the flaw that caused it.

๐Ÿ“– Read

via "Naked Security".
โš  Appleโ€™s iOS pasteboard leaks location data to spy apps โš 

A developer has discovered that malicious apps could exploit the pasteboard to work out a userโ€™s location.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด Open Cybersecurity Alliance Releases New Language for Security Integration ๐Ÿ•ด

OpenDXL Ontology is intended to allow security components to interoperate right out of the box.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Hackers Cashing In On Healthcare Industry Security Weaknesses โŒ

Between ransomware attacks on healthcare devices, malware-laced โ€œmedicalโ€ apps, and fraud services available on the dark net, attackers are pushing the boundaries on targeting healthcare.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Next-Gen SOC Is On Its Way and Here's What It Should Contain ๐Ÿ•ด

The next-gen-SOC starts with the next-gen SIEM, and Jason Mical of Devo Technology and Kevin Golas from OpenText talk about what capabilities are required, including threat hunting and greater automation, and how security professionals should exploit the tools.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Commonsense Security: Leveraging Dialogue & Collaboration for Better Decisions ๐Ÿ•ด

Sometimes, good old-fashioned tools can help an enterprise create a cost-effective risk management strategy.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด How to Prevent an AWS Cloud Bucket Data Leak ๐Ÿ•ด

Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2019-17032

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".