πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Attackers Prefer Ransomware to Stealing Data πŸ•΄

Financial data is still in demand, but ransomware becomes the most popular way to try to cash in from compromised companies, according to Trustwave.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep36: Rogue Chrome extensions, Signal fears and Darth Vader – Naked Security podcast ⚠

We discuss the biggest cybersecurity news stories of the week. New podcast episode out now!

πŸ“– Read

via "Naked Security".
πŸ” Lessons learned from the Small Business Administration's data breach πŸ”

The event impacted the accounts of almost 8,000 people. Here are tips on how to protect yourself and your organization from website breaches.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How businesses and individuals can be ensnared by coronavirus-related spam πŸ”

Many people said they would respond to emails claiming to be from the IRS or WHO, according to IBM X-Force.

πŸ“– Read

via "Security on TechRepublic".
⚠ Password-free database of exercise app Kinomap leaks 42m user records ⚠

It's like a cloud of personal information breathed out in a plume by a database that didn't bother to wear a mask.

πŸ“– Read

via "Naked Security".
❌ Fake Skype, Signal Apps Used to Spread Surveillanceware ❌

Threat groups are increasingly relying on trojanized apps pretending to be legitimate - such as Skype or Signal - but are really spreading surveillanceware.

πŸ“– Read

via "Threatpost".
⚠ Trove of RubyGems malware highlights software supply chain issues ⚠

Ruby developers beware: a would-be cryptocurrency thief is out to get at your digital wallet, and they're using typosquatting code to do it.

πŸ“– Read

via "Naked Security".
❌ Skype Phishing Attack Targets Remote Workers’ Passwords ❌

Attackers are sending convincing emails that ultimately steal victims' Skype credentials.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Evolving Threat of Credential Stuffing πŸ•΄

Bots' swerve to focus on APIs means businesses must take the threat seriously and take effective action.

πŸ“– Read

via "Dark Reading: ".
❌ A Dozen Nation-Backed APTs Tap COVID-19 to Cover Spy Attacks ❌

Iran's Charming Kitten and other nation-state actors are using the coronavirus pandemic to their advantage, for espionage.

πŸ“– Read

via "Threatpost".
❌ WHO, CDC and Bill and Melinda Gates Foundation Victims of Credential Dump, Report ❌

Hackers have used credentials allegedly stolen from the WHO, CDC and other notable groups to spread coronavirus misinformation online.

πŸ“– Read

via "Threatpost".
❌ Public Sector Ransomware Attacks Rage On: Can Your Organization Repel Them? ❌

To pay or not to pay continues to be the question as ransomware targets cities, even amid COVID-19.

πŸ“– Read

via "Threatpost".
⚠ iPhone zero day – don’t panic! Here’s what you need to know ⚠

A mobile phone forensics outfit looking into real-world attacks going back more than two years has uncovered two Apple Mail app bugs.

πŸ“– Read

via "Naked Security".
πŸ•΄ White-Hat Hackers Help 'Fold' COVID-19 Proteins πŸ•΄

A grassroots effort provides scientists with computing power to help simulate the novel coronavirus' proteins and come up with therapeutic solutions for the disease.

πŸ“– Read

via "Dark Reading: ".
❌ Valve Confirms CS:GO, Team Fortress 2 Source-Code Leak ❌

Leaked source code for Counter-Strike: Global Offensive and Team Fortress 2 has led to widespread gamer worries about security and cheating.

πŸ“– Read

via "Threatpost".
πŸ•΄ Demand for Cybersecurity Jobs Declines But Still Outperforms Other Sectors πŸ•΄

While companies are cutting back on plans to hire, cybersecurity and the technology industry as a whole are doing better than the general economy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Resiliency: The Trait National Sporting Leagues Share with Security & IT Teams πŸ•΄

During unprecedented times such as these, both businesses and professional sports are forced to go back to basics.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-18751

Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D7800 before 1.0.1.28, R6100 before 1.0.1.16, R7500 before 1.0.0.112, R7500v2 before 1.0.3.20, R7800 before 1.0.2.36, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.88, WNDR4300 before 1.0.2.90, WNDR4300v2 before 1.0.0.48, and WNDR4500v3 before 1.0.0.48.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18750

Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How sextortion scam emails sneak past security filters πŸ”

Scammers use text-based images, QR codes, and other tricks to evade spam filters, says email security provider Vade Secure.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The 13 best security certifications for newcomers and experienced professionals πŸ”

Ranging from ethical hacking to cloud security, these certs make it easier to get promoted and negotiate a higher salary.

πŸ“– Read

via "Security on TechRepublic".