πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 5-Year-Long Cyber Espionage Campaign Hid in Google Play πŸ•΄

OceanLotus targeted Android devices in the so-called PhantomLance campaign.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Rapid7 Announces Plan to Buy DivvyCloud πŸ•΄

The purchase will boost Rapid7's multicloud capabilities.

πŸ“– Read

via "Dark Reading: ".
❌ Enterprise Security Woes Explode with Home Networks in the Mix ❌

Thanks to WFH, IoT refrigerators, Samsung TVs and more can now be back-channel proxies into the corporate network.

πŸ“– Read

via "Threatpost".
πŸ•΄ Continued Use of Python 2 Will Heighten Security Risks πŸ•΄

With support for the programming language no longer available, organizations should port to Python 3, security researches say.

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft: This is how to protect your machine-learning applications πŸ”

Understanding failures and attacks can help us build safer AI applications.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Microsoft Office 365: This new feature will keep you safe from malware-filled documents πŸ”

Application Guard for Office and Safe Documents will make phishing attacks harder and the Office experience better for users, starting with Office 365 Pro Plus and E5 licences.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Losing a password can be as stressful as facing illness πŸ”

A NordPass survey explores how people manage passwords and found forgetting one is as anxiety-inducing as losing a wallet.

πŸ“– Read

via "Security on TechRepublic".
⚠ Twitter turns off SMS-based tweeting in most countries ⚠

Buh-bye, original way of tweeting. Twitter said it's to keep our accounts safe, referring to unspecified SMS-enabled vulnerabilities.

πŸ“– Read

via "Naked Security".
⚠ Flaw in defunct WordPress plugin exploited to create backdoor ⚠

A vulnerability in the defunct OneTone WordPress theme plugin is being exploited to compromise entire sites while installing backdoor admin accounts.

πŸ“– Read

via "Naked Security".
❌ EFF: Google, Apple’s Contact-Tracing System Open to Cyberattacks ❌

Malicious actors could potentially harvest data over the air and use it to shake confidence in the public-health system, EFF says.

πŸ“– Read

via "Threatpost".
πŸ•΄ 4 Ways to Get to Defensive When Faced by an Advanced Attack πŸ•΄

To hold your own against nation-state-grade attacks, you must think and act differently.

πŸ“– Read

via "Dark Reading: ".
πŸ” Zoom 5.0: How to better secure meetings with the latest features πŸ”

With the new 5.0 version of Zoom, the app has added features to help you protect your virtual meetings from Zoombombing and other unwanted intrusion.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Consumers have little patience for businesses hit by cyberattack πŸ”

Security concerns over personal data was the sole reason for not doing business with a specific company, says a survey from Arcserve.

πŸ“– Read

via "Security on TechRepublic".
πŸ” California tops states with highest number of data breaches and records lost πŸ”

A new compilation of data says the home of Hollywood and Silicon Valley has seen nearly 19 million records lost in attacks since 2005.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to install and configure WireGuard VPN on Linux πŸ”

WireGuard has yet to arrive in the Linux kernel, but you can still start testing how this new feature will work.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Running a more efficient IT security operations center: How to keep tasks on target πŸ”

As businesses grow, it's wise to reevaluate how a business runs its internal security operations center, according to a new report from an industry group.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Web Shells Continue to Threaten a Decade Later πŸ•΄

A decade after their first use, Web shells remain a common tool for all stripes of attackers, from common cybercriminals to sophisticated state actors.

πŸ“– Read

via "Dark Reading: ".
❌ Critical GitLab Flaw Earns Bounty Hunter $20K ❌

A GitLab path traversal flaw could allow attackers to read arbitrary files and remotely execute code.

πŸ“– Read

via "Threatpost".
❌ ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and Travel ❌

Overall bot activity on the web has soared, with a 26 percent growth rate -- attacks on applications, APIs and mobile sites are all on the rise.

πŸ“– Read

via "Threatpost".