πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Why Humans Will Always Be Phishing's Weakest Link πŸ•΄

And it's not just because they click when they shouldn't... they also leave a trail of clues and details that make them easy to spoof

πŸ“– Read

via "Dark Reading: ".
πŸ” Why critical infrastructure is vulnerable to cyberattacks πŸ”

Robert Lee, founder and CEO of Dragos, discusses the dangers cyberattacks pose to critical industrial infrastructures.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why critical infrastructure is vulnerable to cyberattacks πŸ”

Robert Lee, founder and CEO of Dragos, discusses the dangers cyberattacks pose to critical industrial infrastructures.

πŸ“– Read

via "Security on TechRepublic".
πŸ” These are the countries trying to hack US critical infrastructure πŸ”

Dan Patterson speaks with cybersecurity expert Robert Lee about how Russia, Iran, China, and North Korea pose a threat to US industrial infrastructures.

πŸ“– Read

via "Security on TechRepublic".
πŸ” These are the countries trying to hack US critical infrastructure πŸ”

Robert Lee, founder & CEO of Dragos, Inc., speaks with Dan Patterson about which countries pose a threat to US industrial infrastructures.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the US hacks other countries πŸ”

Founder & CEO of Dragos, Inc., speaks with Dan Patterson about the US hacking other countries and its policies when responding to cybersecurity threats.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How US cities are hacked by other countries πŸ”

Dragos, Inc., Founder & CEO Robert Lee talks to Dan Patterson about the risks of IoT as well as the capabilities of Russian hackers.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the US hacks other countries πŸ”

Founder & CEO of Dragos, Inc., speaks with Dan Patterson about the US hacking other countries and its policies when responding to cybersecurity threats.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the government should regulate cybersecurity πŸ”

Dragos, Inc., Founder & CEO speaks with Dan Patterson about current methods of securing the US infrastructure and ways IoT can be regulated.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How US cities are hacked by other countries πŸ”

Dragos, Inc., Founder & CEO Robert Lee talks to Dan Patterson about the risks of IoT as well as the capabilities of Russian hackers.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the government should regulate cybersecurity πŸ”

Dragos, Inc., Founder & CEO speaks with Dan Patterson about current methods of securing the US infrastructure and ways IoT can be regulated.

πŸ“– Read

via "Security on TechRepublic".
⚠ Will Apple’s β€œmicrophone switch” stop your iPad getting bugged? ⚠

A microphone switch! What will they think of next?

πŸ“– Read

via "Naked Security".
πŸ” VPN: 5 reasons business pros should always use one πŸ”

You need to protect your web traffic, and a VPN will do that and more.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Mozilla Patches Two Critical Zero-Days in Firefox πŸ•΄

The latest release of Firefox brings fixes for two Critical vulnerabilities already seen exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
❌ Government VPN Servers Targeted in Zero-Day Attack ❌

The attacks are being carried out against Chinese government interests worldwide, according to Qihoo 360.

πŸ“– Read

via "Threatpost".
πŸ•΄ Why Humans Are Phishing's Weakest Link πŸ•΄

And it's not just because they click when they shouldn't... they also leave a trail of clues and details that make them easy to spoof

πŸ“– Read

via "Dark Reading: ".
πŸ” Quantum encryption: How it works πŸ”

Futurist Isaac Arthur explains how to stay safe from quantum encryption hacking.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Quantum encryption: How it works πŸ”

Futurist Isaac Arthur explains how to stay safe from quantum encryption hacking.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-19699

There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Senators Question Apple About New COVID-19 App Privacy πŸ”

Senators, just like they did when Google announced plans to use its technology to screen for COVID-19, have some privacy questions for Apple, which recently said it will do the same, via a website and app.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Apple Safari Flaws Enable One-Click Webcam Access ❌

The white hat hacker who discovered the vulnerabilities received a $75,000 from Apple's bug-bounty program.

πŸ“– Read

via "Threatpost".