πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Election Security in the Age of Social Distancing πŸ•΄

Although the controversial option of voting by mobile app is one pressing consideration, cybersecurity experts agree that older issues need to be resolved before November 3.

πŸ“– Read

via "Dark Reading: ".
❌ New Android Malware Targets PayPal, CapitalOne App Users ❌

Researchers warn that the EventBot Android malware, which targets over 200 financial apps, could be the "next big mobile malware."

πŸ“– Read

via "Threatpost".
⚠ β€œZero-click” mobile phone attacks – and how to avoid them ⚠

What if a messaging app has to show you an unwanted message so you can decide whether you want it shown to you?

πŸ“– Read

via "Naked Security".
πŸ•΄ Researchers Find Vulnerabilities in Popular Remote Learning Plug-ins πŸ•΄

As more students move to online learning platforms, vulnerability researchers are revealing security flaws in some common software plug-ins.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is a SaaS Company? πŸ”

Learn about what a Software as a Service, or SaaS, company is and why it may make sense for your organization in this week’s Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Zoom: A cheat sheet about the video conferencing solution πŸ”

Zoom is now a household name for work-from-home employees. Here is your guide to Zoom basics, including its security vulnerabilities and video conferencing alternatives such as Microsoft Teams.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to secure a Kubernetes cluster by preventing unwanted modules from loading πŸ”

The road to secure containers is long and winding. One stop you should take on that journey is unloading unnecessary kernel modules in your Linux containers.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ User-Friendly Cybersecurity: Is a Better UX the Key to a Better Defense? πŸ•΄

Frictionless security, improved interfaces, and more usable design may improve the efficacy of security tools and features (and make life easier for users and infosec pros alike). So why has there been so much resistance?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ed-Tech Company Chegg Suffers Third Breach Since 2018 πŸ•΄

The latest incident compromised names, Social Security numbers, and other data belonging to 700 current and former Chegg employees.

πŸ“– Read

via "Dark Reading: ".
❌ Building for Billions: Addressing Security Concerns for Platforms at Scale ❌

Lessons from Facebook and Google show how to safely scale your environment for security.

πŸ“– Read

via "Threatpost".
πŸ” Scammers exploiting stimulus payments with phishing attacks and malicious domains πŸ”

Since January, more than 4,000 domains related to coronavirus stimulus packages have been registered, many of them malicious or suspicious, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Google Cloud users can combat coronavirus-themed phishing emails πŸ”

Google is striving to block Gmail messages and other content that exploit COVID-19, but there are steps users can take to fight such malware.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Things Keeping CISOs Up at Night During the COVID-19 Pandemic πŸ•΄

Insights from discussions with more than 20 CISOs, CEOs, CTOs, and security leaders.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Healthcare Targeted By More Attacks But Less Sophistication πŸ•΄

An increase in attacks targeting healthcare organizations suggests that perhaps new cybercriminals are getting into the game.

πŸ“– Read

via "Dark Reading: ".
❌ Salt Bugs Allow Full RCE as Root on Cloud Servers ❌

Researchers say the bugs are easy to exploit and will likely be weaponized within a day.

πŸ“– Read

via "Threatpost".
πŸ” How to check for weak passwords on your Linux systems with John the Ripper πŸ”

Are you certain your users are working with strong passwords on your Linux servers? Let John the Ripper show you who is and who isn't.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Sway Abused in Office 365 Phishing Attack ❌

The "PerSwaysion" attackers have leveraged a plethora of Microsoft services to compromise at least 150 executives in a highly targeted phishing campaign.

πŸ“– Read

via "Threatpost".
πŸ•΄ Researchers Find Baby Banking Trojan, Watch It Grow πŸ•΄

EventBot is an Android information stealer on its way to becoming a very capable piece of malware.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft's Records Management Tool Aims to Simplify Data Governance πŸ•΄

Records Management is intended to help businesses manage security and data governance as more struggle to handle increased amounts of data and regulatory requirements.

πŸ“– Read

via "Dark Reading: ".
⚠ COVID-19 prompts DHS warning to review Office 365 security ⚠

The DHS is urging users to secure Office 365 accounts after reporting security weaknesses in Microsoft's online productivity service.

πŸ“– Read

via "Naked Security".
⚠ Google fights spammy extensions with new Chrome Web Store policy ⚠

The policies are specifically meant to fight spam, but they outlaw tactics taken by malicious extensions as well, including fake reviews.

πŸ“– Read

via "Naked Security".