πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ How to Wring Every Last Drop Out of Your Security Budget πŸ•΄

In the face of tighter budgets and lowered spending forecasts due to the pandemic, optimizing and improving the efficiency of security programs -- without sacrificing integrity -- has never been more important.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Acquires IoT/OT Security Firm CyberX πŸ•΄

Deal extends Microsoft Azure for legacy industrial devices.

πŸ“– Read

via "Dark Reading: ".
❌ Report: β€˜BlueLeaks’ Exposes Sensitive Data From Police Departments ❌

DDoSecrets has published data from over 200 police departments, law enforcement training and support resources and fusion centers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Pandemic Accelerates Priceline's 'Coffee Shop' Remote-Access Strategy πŸ•΄

The travel-booking giant had been slowly starting to transition away from VPN dependence. Then COVID-19 happened, and suddenly 700 third-party call-center workers were working from home.

πŸ“– Read

via "Dark Reading: ".
⚠ β€˜BlueLeaks’ exposes sensitive files from hundreds of police departments ⚠

The journalist collective DDoSecrets published nearly 270GB of data on Juneteenth: the date commemorating the end of US enslavement.

πŸ“– Read

via "Naked Security".
❌ Remote Workers Pose New Security Risks ❌

Organizations sent workers home during COVID-19 lockdown without adequate security preparation.

πŸ“– Read

via "Threatpost".
❌ The Evolution of DevSecOps ❌

A recent DivvyCloud survey found that in 2019, a majority of respondents reported being in the final optimization stages of their cloud journey, with 59% indicating they are in the DevOps Optimization stage (an 11% increase from 2018).

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Steps for Implementing Multicloud Identity πŸ•΄

Why embracing, not fighting, decentralization will pave the way to smoother cloud migrations.

πŸ“– Read

via "Dark Reading: ".
❌ Hackbit Ransomware Attack Uses GuLoader, Malicious Microsoft Excel Attachments ❌

Recent spearphishing emails spread the Hackbit ransomware using malicious Microsoft Excel attachments and the GuLoader dropper.

πŸ“– Read

via "Threatpost".
⚠ United States wants HTTPS for all government sites, all the time ⚠

Making .GOV domains secure - it'll take "a few years" yet

πŸ“– Read

via "Naked Security".
πŸ›  Sifter 7.4 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Shadow IT: It's a bigger threat than you think πŸ”

File sharing, remote work, and vulnerable employees are leaving company networks open to potential cyberattack

πŸ“– Read

via "Security on TechRepublic".
πŸ” Shadow IT: It's a bigger threat than you think πŸ”

File sharing, remote work, and vulnerable employees are leaving company networks open to potential cyberattack

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybercrime Infrastructure Never Really Dies πŸ•΄

Despite the takedown of the "CyberBunker" threat operators in 2019, command-and-control traffic continues to report back to the defunct network address space.

πŸ“– Read

via "Dark Reading: ".
πŸ” How Women Make Engineering Great πŸ”

On International Women in Engineering Day, our CTO Debra Danielson gives examples of female engineers who have made a profound impact and why diversity in engineering matters.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Only 31% of Americans concerned with data security, despite 400% rise in cyberattacks πŸ”

Bad actors have flooded the enterprise with coronavirus-related attacks, but professionals working from home have other worries, Unisys Security found.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Back to Basics with Cloud Permissions Management πŸ•΄

By using the AAA permissions management framework for cloud operations, organizations can address authentication, authorization, and auditing.

πŸ“– Read

via "Dark Reading: ".
❌ Work From Home Opens New Remote Insider Threats ❌

Remote work is opening up new insider threats - whether it's negligence or malicious employees - and companies are scrambling to stay on top of these unprecedented risks.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Scanning for PoS Software in New Sodinokibi Ransomware Campaign πŸ•΄

Making extra money from victims appears to be the goal, Symantec says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Twitter Says Biz Users Were Vulnerable to Data Breach πŸ•΄

The now-patched vulnerability left business users' personal information in web browser caches for anyone to find.

πŸ“– Read

via "Dark Reading: ".