πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Centralized Contact Tracing Raises Concerns Among Privacy-Conscious Citizens πŸ•΄

The long debate over whether encryption and anonymity shield too much criminal behavior also has staged a resurgence.

πŸ“– Read

via "Dark Reading: ".
πŸ” How healthcare organizations can combat cyberattacks during the coronavirus πŸ”

Cyberattacks against hospitals and medical facilities have risen this year, often via ransomware and social engineering exploits, says IntSights.

πŸ“– Read

via "Security on TechRepublic".
⚠ Chrome 83 adds DNS-over-HTTPS support and privacy tweaks ⚠

This week sees the early arrival of Chrome 83 with a longer list of new security features than originally planned.

πŸ“– Read

via "Naked Security".
❌ Crooks Tap Google Firebase in Fresh Phishing Tactic ❌

Cybercriminals are taking advantage of the Google name and the cloud to convince victims into handing over their login details.

πŸ“– Read

via "Threatpost".
❌ Supreme Court Phish Targets Office 365 Credentials ❌

Cybercriminals are hunting out victims' Office 365 credentials -- by dishing out Supreme court "summons" in a phishing attack.

πŸ“– Read

via "Threatpost".
⚠ Scammers target COVID-19 CARES Act relief scheme ⚠

US states are being flooded by fraudulent unemployment applications in a scam run by a sophisticated cybergang.

πŸ“– Read

via "Naked Security".
πŸ•΄ Most Bluetooth Devices Vulnerable to Impersonation Attacks πŸ•΄

Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.

πŸ“– Read

via "Dark Reading: ".
⚠ Adobe β€œout of band” critical patch – get your update now! ⚠

Looks as though at least one of these patches was supposed to come out a week ago but ended up delayed until now...

πŸ“– Read

via "Naked Security".
⚠ S2 Ep 40: Demonic printers, a sleazy stalker and 10 reasons to patch – Naked Security Podcast ⚠

This week we discuss a customer who went to Subway for a sandwich and left with a stalker, demon printers and the things you should patch now. I host the show this week with Sophos experts Mark Stockley, Paul Ducklin and Greg Iddon. Listen now! LISTEN NOW Click-and-drag on the soundwaves below to skip to […]

πŸ“– Read

via "Naked Security".
πŸ•΄ The Need for Compliance in a Post-COVID-19 World πŸ•΄

With the current upheaval, business leaders may lose focus and push off implementing security measures, managing risk, and keeping up with compliance requirements. That's a big mistake.

πŸ“– Read

via "Dark Reading: ".
❌ Silent Night Banking Trojan Charges Top Dollar on the Underground ❌

The malware-as-a-service is advanced, obfuscated and modular -- and built for mass campaigns.

πŸ“– Read

via "Threatpost".
❌ Critical Cisco Bug in Unified CCX Allows Remote Code Execution ❌

Cisco has fixed a critical remote code-execution flaw in its popular customer interaction management solution.

πŸ“– Read

via "Threatpost".
πŸ” How Home Chef's sensitive customer data was compromised by a cyberattack πŸ”

Stolen in a recent breach, the names, email addresses, encrypted passwords, and other data of Home Chef customers are being sold on the Dark Web.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity and remote work: How workers are handling the shift πŸ”

Working remotely presents key security challenges, but employees may actually be following security rules more carefully when working from home, says 1Password.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Virtual Cybersecurity Events in 2020 πŸ”

Many infosec conferences are going virtual in 2020 due to the COVID-19 pandemic. Is your favorite conference going virtual? Check out our list of events and update your calendar!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ How an Industry Consortium Can Reinvent Security Solution Testing πŸ•΄

By committing to independent testing to determine value, vendors will ensure that their products do what they say they do.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-10738

A flaw was found in Moodle versions 3.8 before 3.8.3, 3.7 before 3.7.6, 3.6 before 3.6.10, 3.5 before 3.5.12 and earlier unsupported versions. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution.

πŸ“– Read

via "National Vulnerability Database".
❌ Long Tail Analysis: A New Hope in the Cybercrime Battle ❌

Looking for niche anomalies in an automated way with AI and machine learning is the future.

πŸ“– Read

via "Threatpost".
πŸ‘1
πŸ•΄ Telcos Become Richer Hacking Targets πŸ•΄

The shift of moving telecommunications networks toward more commercial networking equipment and systems also expanded their attack surface.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Hackers Serve Up Stolen Credentials from Home Chef πŸ•΄

Some 8 million of the meal delivery company's customer records have been offered for sale on the Dark Web.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Web Scrapers Have Bigger-Than-Perceived Impact on Digital Businesses πŸ•΄

The economic impact of bot traffic can be unexpectedly substantial, a PerimeterX-commissioned study finds.

πŸ“– Read

via "Dark Reading: ".