πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Watch for these job posting red flags πŸ”

Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ More Tips for Staying Safe While Working from Home πŸ•΄

While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against the latest malware threats πŸ”

With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent unattended SSH connections from remaining connected πŸ”

Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.

πŸ“– Read

via "Security on TechRepublic".
❌ Healthcare Giant Magellan Struck with Ransomware, Data Breach ❌

Logins, personal information and tax info were all exfiltrated ahead of the ransomware attack, thanks to a phishing email.

πŸ“– Read

via "Threatpost".
❌ Ramsay Malware Targets Air-Gapped Networks ❌

The cyber-espionage toolkit is under active development.

πŸ“– Read

via "Threatpost".
πŸ” Insights for hiring the next generation of cybersecurity experts πŸ”

A new report from Kudelski Security provides companies tips for how to recruit and retain talent up for the digital challenges of tomorrow.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ CyberArk Acquires Idaptive for Identity-as-a-Service Tech πŸ•΄

The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-16112

TylerTech Eagle 2018.3.11 deserializes untrusted user input, resulting in remote code execution via a crafted Java object to the recorder/ServiceManager?service=tyler.empire.settings.SettingManager URI.

πŸ“– Read

via "National Vulnerability Database".
⚠ Beware the DHL delivery message email – it could be a package scam ⚠

Here's a DHL delivery scam with a simple twist - simplicity and a total lack of drama...

πŸ“– Read

via "Naked Security".
πŸ•΄ Ransomware, Data Breach Follow Phishing Attack at Magellan Health πŸ•΄

The healthcare company has informed affected employees of a data breach on a single corporate server.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attackers Routinely Use Older Vulnerabilities to Exploit Businesses, US Cyber Agency Warns πŸ•΄

Security issues in Microsoft products dominate the US government's top 10 list of commonly exploited vulnerabilities, but Apache Struts, Adobe Flash, and Drupal are also routinely targeted.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Problem with Automating Data Privacy Technology πŸ•΄

Managing complex and nuanced consumer rights requests presents a unique challenge for enterprises in today's regulated world of GDPR and CCPA. Here's why.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-15880

In FreeBSD 12.1-STABLE before r356911, and 12.1-RELEASE before p5, insufficient checking in the cryptodev module allocated the size of a kernel buffer based on a user-supplied length allowing an unprivileged process to trigger a kernel panic.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15879

In FreeBSD 12.1-STABLE before r356908, 12.1-RELEASE before p5, 11.3-STABLE before r356908, and 11.3-RELEASE before p9, a race condition in the cryptodev module permitted a data structure in the kernel to be used after it was freed, allowing an unprivileged process can overwrite arbitrary kernel memory.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15878

In FreeBSD 12.1-STABLE before r352509, 11.3-STABLE before r352509, and 11.3-RELEASE before p9, an unprivileged local user can trigger a use-after-free situation due to improper checking in SCTP when an application tries to update an SCTP-AUTH shared key.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How educational organizations can be better protected against data breaches πŸ”

Half of the organizations surveyed by Netwrix suffered a data breach last year because of the unauthorized sharing of information.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Biometrics in the Great Beyond πŸ•΄

A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?

πŸ“– Read

via "Dark Reading: ".
❌ Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App ❌

Future features include plenty of self-reporting options, and officials' fears the data could be misused.

πŸ“– Read

via "Threatpost".
❌ Texas Courts Won’t Pay Up in Ransomware Attack ❌

Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack.

πŸ“– Read

via "Threatpost".
πŸ” CISA, FBI Breakdown Most Exploited Vulnerabilities πŸ”

The U.S. government recapped the top 10 most exploited vulnerabilities from 2016-2019 and warned how 2020 is shaping up vulnerability-wise on Tuesday.

πŸ“– Read

via "Subscriber Blog RSS Feed ".