πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Microsoft Addresses 111 Bugs for May Patch Tuesday ❌

Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.

πŸ“– Read

via "Threatpost".
πŸ›  Clam AntiVirus Toolkit 0.102.3 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ DHS, FBI & DoD Report on New North Korean Malware πŸ•΄

Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea.

πŸ“– Read

via "Dark Reading: ".
❌ REvil Ransomware Attack Hits A-List Celeb Law Firm ❌

Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.

πŸ“– Read

via "Threatpost".
πŸ•΄ Secure Contact Tracing Needs More Transparent Development πŸ•΄

Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Nine in 10 Applications Contain Outdated Software Components πŸ•΄

Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Fixes 111 Vulnerabilities for Patch Tuesday πŸ•΄

This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Website Attacks Become Quieter & More Persistent πŸ•΄

Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.

πŸ“– Read

via "Dark Reading: ".
⚠ Criminal forum trading stolen data suffers ironic data breach ⚠

Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.

πŸ“– Read

via "Naked Security".
⚠ TikTok’s handling of child privacy gets another watchdog’s attention ⚠

Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.

πŸ“– Read

via "Naked Security".
❌ Feds Reveal Hidden Cobra’s Trove of Espionage Tools ❌

The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.

πŸ“– Read

via "Threatpost".
πŸ•΄ How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team πŸ•΄

Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go "off-script" when it comes to picking out candidates.

πŸ“– Read

via "Dark Reading: ".
πŸ” The 3 most popular coronavirus-related scams πŸ”

The outbreak of COVID-19 has triggered a wave of scams, from fake pharmacies to stimulus payment promises to phony cryptocurrency wallets, says Bolster.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Watch for these job posting red flags πŸ”

Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ More Tips for Staying Safe While Working from Home πŸ•΄

While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against the latest malware threats πŸ”

With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent unattended SSH connections from remaining connected πŸ”

Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.

πŸ“– Read

via "Security on TechRepublic".
❌ Healthcare Giant Magellan Struck with Ransomware, Data Breach ❌

Logins, personal information and tax info were all exfiltrated ahead of the ransomware attack, thanks to a phishing email.

πŸ“– Read

via "Threatpost".
❌ Ramsay Malware Targets Air-Gapped Networks ❌

The cyber-espionage toolkit is under active development.

πŸ“– Read

via "Threatpost".
πŸ” Insights for hiring the next generation of cybersecurity experts πŸ”

A new report from Kudelski Security provides companies tips for how to recruit and retain talent up for the digital challenges of tomorrow.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ CyberArk Acquires Idaptive for Identity-as-a-Service Tech πŸ•΄

The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.

πŸ“– Read

via "Dark Reading: ".