πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Process Injection Tops Attacker Techniques for 2019 πŸ•΄

Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows.

πŸ“– Read

via "Dark Reading: ".
❌ Azure Red Flag: Microsoft Accidentally Fixes Cloud Config β€˜Bug’ ❌

Researchers detail a misconfiguration in Microsoft’s Azure cloud platform that could have given hackers carte blanche access to a targeted company's cloud services.

πŸ“– Read

via "Threatpost".
❌ WordPress, Apache Struts Attract the Most Bug Exploits ❌

An analysis found these web frameworks to be the most-targeted by cybercriminals in 2019.

πŸ“– Read

via "Threatpost".
πŸ•΄ Skimmer May Have Put NutriBullet Customers' Card Data at Risk for Nearly a Month πŸ•΄

Blender maker is the latest victim of Magecart.

πŸ“– Read

via "Dark Reading: ".
πŸ” Libya-based hackers using coronavirus pandemic to spread mobile surveillance malware πŸ”

The drastic spread of coronavirus across the world has not stopped cybercriminals from exploiting fear to hack into devices.

πŸ“– Read

via "Security on TechRepublic".
⚠ Android malware uses coronavirus for sextortion and ransomware combo ⚠

The app says it will notify you of coronavirus cases... but in fact it locks up your phone and sextorts you for money at the same time

πŸ“– Read

via "Naked Security".
⚠ Facebook accidentally blocks genuine COVID-19 news ⚠

Facebook is denying that a recent content moderation glitch has anything to do with workforce issues, but blames automatic systems.

πŸ“– Read

via "Naked Security".
⚠ Delayed Adobe patches fix long list of critical flaws ⚠

This week the company made amends, issuing fixes for an unusually high CVE-level 41 vulnerabilities, 21 of which are rated critical.

πŸ“– Read

via "Naked Security".
πŸ•΄ Quantifying Cyber Risk: Why You Must & Where to Start πŸ•΄

Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them.

πŸ“– Read

via "Dark Reading: ".
⚠ Cryptojacking is almost conquered – crushed along with coinhive.com ⚠

Cryptojacking may not be entirely gone following the shutdown of notorious cryptomining service Coinhive - but it's drastically diminished.

πŸ“– Read

via "Naked Security".
πŸ” IT security report finds 97% have suspicious network activity πŸ”

The suspicious network activities revealed in the research by Positive Technologies are traffic hiding, VPN tunneling, connections to the Tor anonymous network, and network proxying.

πŸ“– Read

via "Security on TechRepublic".
❌ What is the Best Defense Against Phishing Attacks? ❌

While many view phishing as a small annoyance, this attack method has maintained longevity for a reason and is still the number one cause of data breaches.

πŸ“– Read

via "Threatpost".
πŸ•΄ Achieving DevSecOps Requires Cutting Through the Jargon πŸ•΄

Establishing a culture where security can work easily with developers starts with making sure they can at least speak the same language.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyber Resilience Benchmarks 2020 πŸ•΄

Here are four things that separate the leaders from the laggards when fighting cyber threats.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ TA505 Targets HR Departments with Poisoned CVs πŸ•΄

Infamous cybercrime organization spotted in attacks that employ legitimate software -- and Google Drive.

πŸ“– Read

via "Dark Reading: ".
πŸ” Healthcare devices at higher cybersecurity risk now due to COVID-19 πŸ”

Much of the US healthcare system is running on outdated software and unsupported operating systems, such as Windows 7, leaving devices vulnerable to hackers who are actively exploiting the coronavirus.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Study Calls Common Risk Figure into Question πŸ•΄

Many risk models use a commonly quoted number -- $150 per record -- to estimate the cost of an incident. A new study from the Cyentia Institute says misusing that number means that estimates are almost never accurate.

πŸ“– Read

via "Dark Reading: ".
❌ Cloud Misconfig Mistakes Show Need For DevSecOps ❌

Unit 42 researchers discuss public cloud misconfiguration issues that are leading to breaches of sensitive data.

πŸ“– Read

via "Threatpost".
πŸ•΄ VPN Usage Surges as More Nations Shut Down Offices πŸ•΄

As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the year.

πŸ“– Read

via "Dark Reading: ".
⚠ NIST shared dataset of tattoos that’s been used to identify prisoners ⚠

The EFF got in touch with the institutions that have the dataset. Some deleted it, while one refused and others didn't bother to respond.

πŸ“– Read

via "Naked Security".
πŸ•΄ DDoS Attack Targets German Food Delivery Service πŸ•΄

Liefrando delivers food from more than 15,000 restaurants in Germany, where people under COVID-19 restrictions depend on the service.

πŸ“– Read

via "Dark Reading: ".