πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ TikTok’s handling of child privacy gets another watchdog’s attention ⚠

Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.

πŸ“– Read

via "Naked Security".
❌ Feds Reveal Hidden Cobra’s Trove of Espionage Tools ❌

The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.

πŸ“– Read

via "Threatpost".
πŸ•΄ How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team πŸ•΄

Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go "off-script" when it comes to picking out candidates.

πŸ“– Read

via "Dark Reading: ".
πŸ” The 3 most popular coronavirus-related scams πŸ”

The outbreak of COVID-19 has triggered a wave of scams, from fake pharmacies to stimulus payment promises to phony cryptocurrency wallets, says Bolster.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Watch for these job posting red flags πŸ”

Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ More Tips for Staying Safe While Working from Home πŸ•΄

While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against the latest malware threats πŸ”

With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent unattended SSH connections from remaining connected πŸ”

Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.

πŸ“– Read

via "Security on TechRepublic".
❌ Healthcare Giant Magellan Struck with Ransomware, Data Breach ❌

Logins, personal information and tax info were all exfiltrated ahead of the ransomware attack, thanks to a phishing email.

πŸ“– Read

via "Threatpost".
❌ Ramsay Malware Targets Air-Gapped Networks ❌

The cyber-espionage toolkit is under active development.

πŸ“– Read

via "Threatpost".
πŸ” Insights for hiring the next generation of cybersecurity experts πŸ”

A new report from Kudelski Security provides companies tips for how to recruit and retain talent up for the digital challenges of tomorrow.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ CyberArk Acquires Idaptive for Identity-as-a-Service Tech πŸ•΄

The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-16112

TylerTech Eagle 2018.3.11 deserializes untrusted user input, resulting in remote code execution via a crafted Java object to the recorder/ServiceManager?service=tyler.empire.settings.SettingManager URI.

πŸ“– Read

via "National Vulnerability Database".
⚠ Beware the DHL delivery message email – it could be a package scam ⚠

Here's a DHL delivery scam with a simple twist - simplicity and a total lack of drama...

πŸ“– Read

via "Naked Security".
πŸ•΄ Ransomware, Data Breach Follow Phishing Attack at Magellan Health πŸ•΄

The healthcare company has informed affected employees of a data breach on a single corporate server.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attackers Routinely Use Older Vulnerabilities to Exploit Businesses, US Cyber Agency Warns πŸ•΄

Security issues in Microsoft products dominate the US government's top 10 list of commonly exploited vulnerabilities, but Apache Struts, Adobe Flash, and Drupal are also routinely targeted.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Problem with Automating Data Privacy Technology πŸ•΄

Managing complex and nuanced consumer rights requests presents a unique challenge for enterprises in today's regulated world of GDPR and CCPA. Here's why.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-15880

In FreeBSD 12.1-STABLE before r356911, and 12.1-RELEASE before p5, insufficient checking in the cryptodev module allocated the size of a kernel buffer based on a user-supplied length allowing an unprivileged process to trigger a kernel panic.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15879

In FreeBSD 12.1-STABLE before r356908, 12.1-RELEASE before p5, 11.3-STABLE before r356908, and 11.3-RELEASE before p9, a race condition in the cryptodev module permitted a data structure in the kernel to be used after it was freed, allowing an unprivileged process can overwrite arbitrary kernel memory.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15878

In FreeBSD 12.1-STABLE before r352509, 11.3-STABLE before r352509, and 11.3-RELEASE before p9, an unprivileged local user can trigger a use-after-free situation due to improper checking in SCTP when an application tries to update an SCTP-AUTH shared key.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How educational organizations can be better protected against data breaches πŸ”

Half of the organizations surveyed by Netwrix suffered a data breach last year because of the unauthorized sharing of information.

πŸ“– Read

via "Security on TechRepublic".