πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Get Cutting-Edge Healthcare Cybersecurity Insights at Black Hat USA πŸ•΄

Bad actors are on the lookout for ways to attack healthcare organizations, so it's important for cybersecurity pros to stay informed about the latest trends and threats in the industry.

πŸ“– Read

via "Dark Reading: ".
❌ Leaked Details of 142 Million MGM Hotel Guests Found for Sale Online ❌

Scope of last summer’s data leak at the hotel chain appears to be far more expansive than previously thought.

πŸ“– Read

via "Threatpost".
πŸ•΄ Crypto-Primer: Encryption Basics Every Security Pro Should Know πŸ•΄

With so many choices for encrypting data and communication, it's important to know the pros and cons of different techniques.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Mirai Variant Surfaces With Exploits for 9 Vulnerabilities Products πŸ•΄

Impacted products include routers, IP cameras, DVRs, and smart TVs.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why the gym of the future is your living room πŸ”

Sweat tech: Tonal CEO Aly Orady explains why big data and AI are the pedals that power the future of fitness.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why the gym of the future is your living room πŸ”

Sweat tech: Tonal CEO Aly Orady explains why big data and AI are the pedals that power the future of fitness.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Major websites plagued by lack of effective security against JavaScript vulnerabilities πŸ”

Code running on sites can be exploited to steal or leak data via client-side attacks enabled by the programming language, says Tala Security.

πŸ“– Read

via "Security on TechRepublic".
❌ DMARC Adoption Spikes, Higher Ed Remains Behind ❌

As colleges and universities prepare for the fall semester, email protections against surging threats like BEC and phishing are lagging.

πŸ“– Read

via "Threatpost".
πŸ•΄ Critical Vulnerability Hits SAP Enterprise Applications πŸ•΄

RECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to use the Whonix advanced security and privacy distribution πŸ”

Whonix is a Linux desktop dedicated to absolute security and privacy. Find out how to use this unique take on the desktop operating system.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Demand for video surveillance cameras expected to skyrocket πŸ”

Video cameras can be used in a variety of situations beyond simple surveillance, says research firm IDC.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Google Cloud Unveils 'Confidential VMs' to Protect Data in Use πŸ•΄

Confidential Virtual Machines, now in beta, will let Google Cloud customers keep data encrypted while it's in use.

πŸ“– Read

via "Dark Reading: ".
❌ Adobe Discloses Critical Code-Execution Bugs in July Update ❌

The software giant released patches for four critical vulnerabilities and five different platforms.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'Make Your Bed' and Other Life Lessons for Security πŸ•΄

Follow this advice from a famous military commanders' commencement speech and watch your infosec team soar.

πŸ“– Read

via "Dark Reading: ".
πŸ” The Ultimate Guide to BYOD Security: Overcoming Challenges, Creating Effective Policies, and Mitigating Risks to Maximize Benefits πŸ”

Bring Your Own Device (BYOD) remains both a major opportunity and challenge for enterprises. By following the right approach to identifying BYOD risk and developing effective BYOD policy it is possible to capitalize on the benefits of BYOD without adding significant risk.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Critical DNS Bug Opens Windows Servers to Infrastructure Takeover ❌

Microsoft gives the β€˜wormable’ flaw a security rating of 10 – the most severe warning possible.

πŸ“– Read

via "Threatpost".
πŸ” Data breaches decline 33% in the first half of 2020 πŸ”

The Identity Theft Resource Center projects 2020 is on pace to see the lowest number of breaches and exposures since 2015.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-15886

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15885

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15884

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-15883

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".