πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ A-List Celebrity Law Firm Confirms Cyberattack πŸ•΄

Attackers claim to steal 756GB of data from Grubman Shire Meiselas & Sacks, which includes Madonna and Lady Gaga among its clients.

πŸ“– Read

via "Dark Reading: ".
πŸ” Thunderspy Vulnerabilities Could Allow Data Theft From Encrypted Drives πŸ”

Assuming an attacker has physical access to a machine, a new attack could let allow for the access of data on a locked, password protected, and encrypted hard drive.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ The Modern SOC Demands New Skills πŸ•΄

Automation and other technologies are improving the organizational structure of the security operations center. This is ultimately for the better, but it means that roles will change too.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Three Years After WannaCry, Ransomware Accelerating While Patching Still Problematic πŸ•΄

Using a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Addresses 111 Bugs for May Patch Tuesday ❌

Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.

πŸ“– Read

via "Threatpost".
πŸ›  Clam AntiVirus Toolkit 0.102.3 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ DHS, FBI & DoD Report on New North Korean Malware πŸ•΄

Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea.

πŸ“– Read

via "Dark Reading: ".
❌ REvil Ransomware Attack Hits A-List Celeb Law Firm ❌

Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.

πŸ“– Read

via "Threatpost".
πŸ•΄ Secure Contact Tracing Needs More Transparent Development πŸ•΄

Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Nine in 10 Applications Contain Outdated Software Components πŸ•΄

Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Fixes 111 Vulnerabilities for Patch Tuesday πŸ•΄

This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Website Attacks Become Quieter & More Persistent πŸ•΄

Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.

πŸ“– Read

via "Dark Reading: ".
⚠ Criminal forum trading stolen data suffers ironic data breach ⚠

Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.

πŸ“– Read

via "Naked Security".
⚠ TikTok’s handling of child privacy gets another watchdog’s attention ⚠

Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.

πŸ“– Read

via "Naked Security".
❌ Feds Reveal Hidden Cobra’s Trove of Espionage Tools ❌

The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.

πŸ“– Read

via "Threatpost".
πŸ•΄ How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team πŸ•΄

Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go "off-script" when it comes to picking out candidates.

πŸ“– Read

via "Dark Reading: ".
πŸ” The 3 most popular coronavirus-related scams πŸ”

The outbreak of COVID-19 has triggered a wave of scams, from fake pharmacies to stimulus payment promises to phony cryptocurrency wallets, says Bolster.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Watch for these job posting red flags πŸ”

Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ More Tips for Staying Safe While Working from Home πŸ•΄

While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against the latest malware threats πŸ”

With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent unattended SSH connections from remaining connected πŸ”

Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.

πŸ“– Read

via "Security on TechRepublic".