πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Resources, Budget Remain An Issue for DPOs πŸ”

In a recent survey, data protection officers cited a lack of budget and cohesion across all business units when it comes to developing an organization-wide data protection and privacy strategy as some of the role's top challenges.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Microsoft Patches Dangerous Teams Vulnerability πŸ•΄

CyberArk says issue would have allowed attackers to take over Teams accounts using a malicious GIF.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your data against the Mail.app vulnerability in Apple devices πŸ”

A recent bug discovered can allow your device to be compromised through Apple's default Mail application, but until a patch is released, follow these steps to protect yourself.

πŸ“– Read

via "Security on TechRepublic".
❌ GDPR Compliance Site Leaks Git Data, Passwords ❌

Researchers discovered a .git folder exposing passwords and more for a website that gives advice to organizations about complying with the General Data Protection Regulation (GDPR) rules.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Target Sophos Firewalls with Zero-Day πŸ•΄

Remote exploit compromises specific configurations of XG firewalls with the intent of stealing data from the devices.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to securely configure screen sharing remotely on macOS Catalina πŸ”

Apple added more security to screen sharing, so the default behavior restricts all but local users from enabling this feature. With an MDM, admins can automate this process.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Top 10 Cyber Incident Response Mistakes and How to Avoid Them πŸ•΄

From lack of planning to rushing the closure of incidents, these mistakes seriously harm IR effectiveness.

πŸ“– Read

via "Dark Reading: ".
πŸ” One billion certificates later, Let's Encrypt's crazy dream to secure the web is coming true πŸ”

Commentary: Let's Encrypt cofounder Josh Aas is quick to deflect praise, but each of us has a great deal to thank him for, as 85% of page loads are now secured.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Biopharmaceutical Firm Suffers Ransomware Attack, Data Dump πŸ•΄

ExecuPharm said its internal servers were hit with ransomware after attackers launched a phishing attack.

πŸ“– Read

via "Dark Reading: ".
⚠ Warning! Fake Zoom β€œHR meeting” emails phish for your password ⚠

Scammers have turned to employment worries as their latest lure for Zoom phishing scams.

πŸ“– Read

via "Naked Security".
⚠ β€˜Evil GIF’ account takeover flaw patched in Teams ⚠

Microsoft has fixed a flaw in Teams that could have allowed attackers to launch a wormlike attack on multiple accounts by sending one victim a malicious GIF image.

πŸ“– Read

via "Naked Security".
⚠ Coronavirus tracking tool from Apple and Google embraced by Germany ⚠

Germany's ditched a homegrown alternative that featured a centralized database of location data, raising privacy concerns.

πŸ“– Read

via "Naked Security".
❌ Troves of Zoom Credentials Shared on Hacker Forums ❌

Several new databases have been uncovered on underground forums sharing recycled Zoom credentials.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Startup Accurics Tackles Cloud Infrastructure Security πŸ•΄

Accurics offers a free product to prevent "drift" between infrastructure defined through code and infrastructure running in the cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ” Android ransomware attack spoofs the FBI with accusation of pornography πŸ”

The attack accuses victims of possessing pornography, encrypts all files on the device, and then instructs them to pay a fine to unlock the data, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ What's Your Cybersecurity Architecture Integration Business Plan? πŸ•΄

To get the most out of your enterprise cybersecurity products, they need to work together. But getting those products talking to each other isn't easy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Pros Reassigned to IT Tasks in Coronavirus Pandemic πŸ•΄

Most security practitioners surveyed say their job functions have changed during the pandemic, and 90% are now working remotely full time.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Suricata IDPE 5.0.3 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Sophisticated Android Spyware Attack Spreads via Google Play ❌

The PhantomLance espionage campaign is targeting specific victims, mainly in Southeast Asia -- and could be the work of the OceanLotus APT.

πŸ“– Read

via "Threatpost".
❌ WordPress Plugin Bug Opens 100K Websites to Compromise ❌

Legions of website visitors could be infected with drive-by malware, among other issues, thanks to a CSRF bug in Real-Time Search and Replace.

πŸ“– Read

via "Threatpost".
πŸ” Research shows malware is easy to buy, own, and deploy πŸ”

With just a few Bitcoins and a quick search of Dark Web marketplaces, bad actors can become the owners of powerfully malicious tools.

πŸ“– Read

via "Security on TechRepublic".