πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ DoppelPaymer Ransomware Used to Steal Data from Supplier to SpaceX, Tesla ❌

Cyber attack at Visser Precision, which builds custom parts for the aerospace and automotive industries, reveals sensitive company data.

πŸ“– Read

via "Threatpost".
⚠ GoodRx stops sharing personal medical data with Google, Facebook ⚠

The mobile app saves people money but was letting 20 companies know who's taking antipsychotics, erectile dysfunction and HIV meds, and more.

πŸ“– Read

via "Naked Security".
⚠ Huge flaw found in how facial features are measured from images ⚠

It has to do with optics: faces appear to flatten out as we get further away. Our brains compensate, but AI-run facial recognition doesn't.

πŸ“– Read

via "Naked Security".
πŸ•΄ How Security Leaders at Starbucks and Microsoft Prepare for Breaches πŸ•΄

Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

πŸ“– Read

via "Dark Reading: ".
⚠ Digital piggy bank sevice broken into by cybercrooks ⚠

A financial proivider that gives loans but locks them down to turn them into savings... didn't lock down its own network.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Cybercrime Pandemic Keeps Spreading πŸ•΄

The World Economic Forum says cyberattacks will be one of the top global business risks over the next 10 years.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to create a Linux user that cannot log in πŸ”

For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Chinese Nationals Charged with Laundering $100M in Cryptocurrency πŸ•΄

The two defendants allegedly laundered $100 million for the benefit of North Korean threat actors who stole the funds in 2018.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybercriminals and drug cartels are teaming up to spread malware and steal financial information across Latin America πŸ”

Drug cartels are using cryptocurrency and partnering with hackers to scam banks in Latin American banks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Data security: 5 problems and solutions πŸ”

When it comes to securing data, most enterprises are negligent and unaware, according to a Lepide report.

πŸ“– Read

via "Security on TechRepublic".
❌ Have I Been Pwned No Longer For Sale ❌

Troy Hunt said the popular HIBP will continue to be run as an independent service.

πŸ“– Read

via "Threatpost".
πŸ›  Golden Frieza πŸ› 

Imagine finding yourself in a "hostile" environment, one where you cannot run exploits, tools, and applications without worrying about prying eyes spying on you, be they a legitimate system administrator, a colleague sharing an access with you or a software solution that scans the machine you are logged in to for malicious files. Your binary should live in encrypted form in the filesystem so that no static analysis would be possible even if identified and copied somewhere else. It should be only decrypted on the fly in memory when executed, so preventing dynamic analysis too, unless the decryption key is known. To experiment with such an idea Red Timmy Sec have created the "golden frieza" project.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Why β€˜free’ Wi-Fi isn’t really free ⚠

How much data is too much to give away to get online while you're waiting at the train station? In the airport? A shopping mall?

πŸ“– Read

via "Naked Security".
πŸ•΄ Former Microsoft Software Engineer Convicted of Fraud πŸ•΄

The 25-year-old was convicted of 18 charges stemming from illegal access to money stored in online gift cards.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ NSS Labs Revises Endpoint Security Test Model πŸ•΄

New product ratings system comes amid growing shift in the testing market toward more "open and transparent" evaluation of security tools.

πŸ“– Read

via "Dark Reading: ".
❌ MediaTek Bug Actively Exploited, Affects Millions of Android Devices ❌

An exploit published by a developer is easy to use and has already been used to build malicious apps that gain root access on Android devices.

πŸ“– Read

via "Threatpost".
πŸ” 7 security tips for IoT systems πŸ”

Security risks are important considerations with IoT initiatives. A Kaspersky report includes steps to take to prevent an IoT-targeted attack.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ With New SOL4Ce Lab, Purdue U. and DoE Set Sights on National Security πŸ•΄

The cooperative research initiative brings together faculty and students to "focus on problems and cutting-edge ways to solve them."

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Avoiding the Perils of Electronic Communications πŸ•΄

Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That's why an agile communications strategy is so important.

πŸ“– Read

via "Dark Reading: ".
πŸ” Govt Contractors Allege Air Force Stole IP, Proprietary Data πŸ”

Two contractors claim the U.S. Air Force took their proprietary data and used it to develop, market, and sell their own version of a storage tank used by planes to fight fires.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Let’s Encrypt to Revoke Millions of TLS Certs ❌

On Wednesday millions of Transport Layer Security certificates will be revoked because of a Certificate Authority Authorization bug.

πŸ“– Read

via "Threatpost".