πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Flaw in defunct WordPress plugin exploited to create backdoor ⚠

A vulnerability in the defunct OneTone WordPress theme plugin is being exploited to compromise entire sites while installing backdoor admin accounts.

πŸ“– Read

via "Naked Security".
❌ EFF: Google, Apple’s Contact-Tracing System Open to Cyberattacks ❌

Malicious actors could potentially harvest data over the air and use it to shake confidence in the public-health system, EFF says.

πŸ“– Read

via "Threatpost".
πŸ•΄ 4 Ways to Get to Defensive When Faced by an Advanced Attack πŸ•΄

To hold your own against nation-state-grade attacks, you must think and act differently.

πŸ“– Read

via "Dark Reading: ".
πŸ” Zoom 5.0: How to better secure meetings with the latest features πŸ”

With the new 5.0 version of Zoom, the app has added features to help you protect your virtual meetings from Zoombombing and other unwanted intrusion.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Consumers have little patience for businesses hit by cyberattack πŸ”

Security concerns over personal data was the sole reason for not doing business with a specific company, says a survey from Arcserve.

πŸ“– Read

via "Security on TechRepublic".
πŸ” California tops states with highest number of data breaches and records lost πŸ”

A new compilation of data says the home of Hollywood and Silicon Valley has seen nearly 19 million records lost in attacks since 2005.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to install and configure WireGuard VPN on Linux πŸ”

WireGuard has yet to arrive in the Linux kernel, but you can still start testing how this new feature will work.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Running a more efficient IT security operations center: How to keep tasks on target πŸ”

As businesses grow, it's wise to reevaluate how a business runs its internal security operations center, according to a new report from an industry group.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Web Shells Continue to Threaten a Decade Later πŸ•΄

A decade after their first use, Web shells remain a common tool for all stripes of attackers, from common cybercriminals to sophisticated state actors.

πŸ“– Read

via "Dark Reading: ".
❌ Critical GitLab Flaw Earns Bounty Hunter $20K ❌

A GitLab path traversal flaw could allow attackers to read arbitrary files and remotely execute code.

πŸ“– Read

via "Threatpost".
❌ ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and Travel ❌

Overall bot activity on the web has soared, with a 26 percent growth rate -- attacks on applications, APIs and mobile sites are all on the rise.

πŸ“– Read

via "Threatpost".
πŸ•΄ Web Shells Continue to Threaten πŸ•΄

A decade after their first use, Web shells remain a common tool for all stripes of attackers, from common cybercriminals to sophisticated state actors.

πŸ“– Read

via "Dark Reading: ".
πŸ” Messaging apps are getting more use, and it's putting companies at risk πŸ”

Businesses need to be aware of the dangers associated with employees using WhatsApp, WeChat, and other communication channels.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 7 Fraud Predictions in the Wake of the Coronavirus πŸ•΄

It's theme and variations in the fraud world, and fraudsters love -- and thrive -- during chaos and confusion

πŸ“– Read

via "Dark Reading: ".
πŸ” Messaging apps are getting more use, and it's putting companies at risk πŸ”

Businesses need to be aware of the dangers associated with employees using WhatsApp, WeChat, and other communication channels.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Warns of Malware Hidden in Pirated Film Files πŸ•΄

An active campaign inserts malicious VBScript into ZIP files posing as downloads for "John Wick 3," "Contagion," and other popular movies.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Secure Remote Access Services for Today's Enterprise Needs πŸ•΄

Secure remote access is a "must" for enterprise computing today, and there are options for you to explore in the dynamic current environment.

πŸ“– Read

via "Dark Reading: ".
❌ Millions of Brute-Force Attacks Hit Remote Desktop Accounts ❌

Automated attacks on Remote Desktop Protocol accounts are aimed at taking over corporate desktops and infiltrating networks.

πŸ“– Read

via "Threatpost".
❌ High-Severity Cisco IOS XE Flaw Threatens SD-WAN Routers ❌

Cisco's IOS XE software for SD-WAN routers has a high-severity insufficient input validation flaw.

πŸ“– Read

via "Threatpost".