πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Biometrics in the Great Beyond πŸ•΄

A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?

πŸ“– Read

via "Dark Reading: ".
❌ Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App ❌

Future features include plenty of self-reporting options, and officials' fears the data could be misused.

πŸ“– Read

via "Threatpost".
❌ Texas Courts Won’t Pay Up in Ransomware Attack ❌

Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack.

πŸ“– Read

via "Threatpost".
πŸ” CISA, FBI Breakdown Most Exploited Vulnerabilities πŸ”

The U.S. government recapped the top 10 most exploited vulnerabilities from 2016-2019 and warned how 2020 is shaping up vulnerability-wise on Tuesday.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Organizations Conduct App Penetration Tests More Frequently - and Broadly πŸ•΄

Compliance is no longer the primary motivator. AppSec is, Cobalt.io says.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to check for weak passwords on your Linux systems with John the Ripper πŸ”

Are you certain your users are working with strong passwords on your Linux servers? Let John the Ripper show you who is and who isn't.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Cyber-Espionage Framework Dubbed Ramsay πŸ•΄

The framework is designed to collect and exfiltrate sensitive documents from air-gapped networks.

πŸ“– Read

via "Dark Reading: ".
⚠ Update now! Windows gets another bumper patch update ⚠

Windows users won't have to fix β€˜big’ exploited or public flaws this month, but May's Patch Tuesday is one of the biggest patch rounds.

πŸ“– Read

via "Naked Security".
❌ Login with Facebook Bug Earns $20K Bounty ❌

The cross-site scripting vulnerability could have allowed trivial account takeover.

πŸ“– Read

via "Threatpost".
πŸ” Three resources to improve your understanding of AWS security and harden cloud deployments πŸ”

A security session at the AWS Summit Online focused on the basics of Control Tower, Landing Zones, and GuardDuty.

πŸ“– Read

via "Security on TechRepublic".
❌ BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks ❌

BEC gangs like "Exaggerated Lion" are using tricky tactics - like exploiting G Suite - to scam companies out of millions.

πŸ“– Read

via "Threatpost".
⚠ Woman stalked by sandwich server via her COVID-19 contact tracing info ⚠

She wanted a sub, not Facebook, Instagram and SMS come-ons from the guy who served her and intercepted her contact-tracing details.

πŸ“– Read

via "Naked Security".
❌ Utah Says No to Apple/Google COVID-19 Tracing; Debuts Startup App ❌

"Healthy Together” app uses a raft of location data, including GPS, cell tower triangulation and Bluetooth, to pinpoint users and ID coronavirus hotspots.

πŸ“– Read

via "Threatpost".
πŸ” DevOps needs to morph into DevSecOps to close security threats in the cloud πŸ”

Oracle and KMPG threat report finds that over-privileged accounts and poorly protected cloud secrets are the biggest security risks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Reverse RDP attacks: How to protect your organization πŸ”

A remote PC infected with certain malware could take over a client that tries to connect to it, says Check Point Research. Here's how to prevent it.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Ensuring Business Continuity in Times of Crisis πŸ•΄

Three basic but comprehensive steps can help you and your organization get through adversity

πŸ“– Read

via "Dark Reading: ".
πŸ” Cloud services provider takes on end-to-end encryption for files sent via collaboration platforms πŸ”

Volterra's VoltShare uses an app to read a key and an email address to verify identity

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Adds DNS-Over-HTTPS Support for Windows 10 Insiders ❌

Microsoft is letting Windows Insiders test-drive DNS-over-HTTPS protocol in a pre-release build of Windows 10.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2019-15083

Default installations of Zoho ManageEngine ServiceDesk Plus 10.0 before 10500 are vulnerable to XSS injected by a workstation local administrator. Using the installed program names of the computer as a vector, the local administrator can execute code on the Manage Engine ServiceDesk administrator side. At "Asset Home > Server > <workstation> > software" the administrator of ManageEngine can control what software is installed on the workstation. This table shows all the installed program names in the Software column. In this field, a remote attacker can inject malicious code in order to execute it when the ManageEngine administrator visualizes this page.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Facebook Fails to Staunch Coronavirus Misinformation πŸ•΄

The social media giant in April affixed warning labels on 50 million pieces of content

πŸ“– Read

via "Dark Reading: ".