πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ TrickBot Sample Accidentally Warns Victims They’re Infected ❌

A data-stealing module in a recent sandboxed sample triggers browser-based fraud alerts for Trickbot victims -- and shows something of the inner working of the malware's operators.

πŸ“– Read

via "Threatpost".
πŸ•΄ Russian Hacker Convicted for Social Network Hacks πŸ•΄

The Russian national was convicted of hacking into accounts at LinkedIn, Dropbox, and Formspring.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Zero-Trust Efforts Rise with the Tide of Remote Working πŸ•΄

With employees likely to continue to spend much, if not all, of their time working from home, companies are focusing more on technologies to boost the security of their now-distributed workplace.

πŸ“– Read

via "Dark Reading: ".
❌ Critical SAP Bug Allows Full Enterprise System Takeover ❌

Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more.

πŸ“– Read

via "Threatpost".
πŸ•΄ 99% of Websites at Risk of Attack Via JavaScript Plug-ins πŸ•΄

The average website includes content from 32 different third-party JavaScript programs, new study finds.

πŸ“– Read

via "Dark Reading: ".
πŸ” New Google Cloud tech gives users control of data confidentiality πŸ”

Confidential computing encrypts data in use as it's being processed and keeps that data encrypted in memory and elsewhere outside the CPU.

πŸ“– Read

via "Security on TechRepublic".
❌ Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web ❌

Last summer’s data leak at the hotel chain appears to be far more expansive than previously thought -- or the credentials could come from a hack of DataViper.

πŸ“– Read

via "Threatpost".
❌ Most Companies Are Ignoring Your Most Vulnerable Endpoint…and It’s Not the Laptop ❌

Cybercriminals know that mobile devices are less secure, so it’s no surprise that last year Verizon found that 4 in 10 companies were breached through a mobile device.

πŸ“– Read

via "Threatpost".
⚠ RATicate malware gang goes commercial ⚠

O, what tangled code we weave, when first we practise to deceive!

πŸ“– Read

via "Naked Security".
πŸ•΄ Get Cutting-Edge Healthcare Cybersecurity Insights at Black Hat USA πŸ•΄

Bad actors are on the lookout for ways to attack healthcare organizations, so it's important for cybersecurity pros to stay informed about the latest trends and threats in the industry.

πŸ“– Read

via "Dark Reading: ".
❌ Leaked Details of 142 Million MGM Hotel Guests Found for Sale Online ❌

Scope of last summer’s data leak at the hotel chain appears to be far more expansive than previously thought.

πŸ“– Read

via "Threatpost".
πŸ•΄ Crypto-Primer: Encryption Basics Every Security Pro Should Know πŸ•΄

With so many choices for encrypting data and communication, it's important to know the pros and cons of different techniques.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Mirai Variant Surfaces With Exploits for 9 Vulnerabilities Products πŸ•΄

Impacted products include routers, IP cameras, DVRs, and smart TVs.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why the gym of the future is your living room πŸ”

Sweat tech: Tonal CEO Aly Orady explains why big data and AI are the pedals that power the future of fitness.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why the gym of the future is your living room πŸ”

Sweat tech: Tonal CEO Aly Orady explains why big data and AI are the pedals that power the future of fitness.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Major websites plagued by lack of effective security against JavaScript vulnerabilities πŸ”

Code running on sites can be exploited to steal or leak data via client-side attacks enabled by the programming language, says Tala Security.

πŸ“– Read

via "Security on TechRepublic".
❌ DMARC Adoption Spikes, Higher Ed Remains Behind ❌

As colleges and universities prepare for the fall semester, email protections against surging threats like BEC and phishing are lagging.

πŸ“– Read

via "Threatpost".
πŸ•΄ Critical Vulnerability Hits SAP Enterprise Applications πŸ•΄

RECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to use the Whonix advanced security and privacy distribution πŸ”

Whonix is a Linux desktop dedicated to absolute security and privacy. Find out how to use this unique take on the desktop operating system.

πŸ“– Read

via "Security on TechRepublic".