πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ REvil Ransomware Attack Hits A-List Celeb Law Firm ❌

Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.

πŸ“– Read

via "Threatpost".
πŸ•΄ Secure Contact Tracing Needs More Transparent Development πŸ•΄

Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Nine in 10 Applications Contain Outdated Software Components πŸ•΄

Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Fixes 111 Vulnerabilities for Patch Tuesday πŸ•΄

This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Website Attacks Become Quieter & More Persistent πŸ•΄

Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.

πŸ“– Read

via "Dark Reading: ".
⚠ Criminal forum trading stolen data suffers ironic data breach ⚠

Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.

πŸ“– Read

via "Naked Security".
⚠ TikTok’s handling of child privacy gets another watchdog’s attention ⚠

Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.

πŸ“– Read

via "Naked Security".
❌ Feds Reveal Hidden Cobra’s Trove of Espionage Tools ❌

The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.

πŸ“– Read

via "Threatpost".
πŸ•΄ How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team πŸ•΄

Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go "off-script" when it comes to picking out candidates.

πŸ“– Read

via "Dark Reading: ".
πŸ” The 3 most popular coronavirus-related scams πŸ”

The outbreak of COVID-19 has triggered a wave of scams, from fake pharmacies to stimulus payment promises to phony cryptocurrency wallets, says Bolster.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Watch for these job posting red flags πŸ”

Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ More Tips for Staying Safe While Working from Home πŸ•΄

While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against the latest malware threats πŸ”

With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent unattended SSH connections from remaining connected πŸ”

Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.

πŸ“– Read

via "Security on TechRepublic".
❌ Healthcare Giant Magellan Struck with Ransomware, Data Breach ❌

Logins, personal information and tax info were all exfiltrated ahead of the ransomware attack, thanks to a phishing email.

πŸ“– Read

via "Threatpost".
❌ Ramsay Malware Targets Air-Gapped Networks ❌

The cyber-espionage toolkit is under active development.

πŸ“– Read

via "Threatpost".
πŸ” Insights for hiring the next generation of cybersecurity experts πŸ”

A new report from Kudelski Security provides companies tips for how to recruit and retain talent up for the digital challenges of tomorrow.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ CyberArk Acquires Idaptive for Identity-as-a-Service Tech πŸ•΄

The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-16112

TylerTech Eagle 2018.3.11 deserializes untrusted user input, resulting in remote code execution via a crafted Java object to the recorder/ServiceManager?service=tyler.empire.settings.SettingManager URI.

πŸ“– Read

via "National Vulnerability Database".
⚠ Beware the DHL delivery message email – it could be a package scam ⚠

Here's a DHL delivery scam with a simple twist - simplicity and a total lack of drama...

πŸ“– Read

via "Naked Security".
πŸ•΄ Ransomware, Data Breach Follow Phishing Attack at Magellan Health πŸ•΄

The healthcare company has informed affected employees of a data breach on a single corporate server.

πŸ“– Read

via "Dark Reading: ".