πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Microsoft patches critical 17-year-old DNS bug in Windows Server πŸ”

The bug has been deemed "wormable," which means a single exploit could spread from one unpatched server to another.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Nanotechnology Will Disrupt Cybersecurity πŸ•΄

Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is CSPM (Cloud Security Posture Management)? πŸ”

Modern businesses are moving their data to the cloud, and for good reason. But as cloud platform services see an increase in use, there has been an explosion in the number of unmanaged risks in the mission-critical digital industry. This is where Cloud Security Posture Management (CSPM) comes into play.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Vulns in Open Source EHR Puts Patient Health Data at Risk πŸ•΄

Five high-risk flaws in health IT software from LibreHealth, a researcher at Bishop Fox finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Patch ASAP': Cisco Issues Updates for Routers, VPN Firewall πŸ•΄

Cisco issues five critical security patches among a batch of some 31 updates.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Puzzles and Riddles Help InfoSec Pros Solve Real-World Problems πŸ•΄

A researcher shares the unexpected lessons learned in years of creating puzzles and riddles for his cybersecurity colleagues.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Attack Technique Uses Misconfigured Docker API πŸ•΄

A new technique builds and deploys an attack on the victim's own system

πŸ“– Read

via "Dark Reading: ".
πŸ” Ransomware accounts for a third of all cyberattacks against organizations πŸ”

Government agencies were most heavily hit by ransomware during the first quarter, says Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cryptocurrency Scam Spreads Across High-Profile Twitter Accounts πŸ•΄

Twitter accounts belonging to former president Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, and Bill Gates are among those hijacked in a massive cryptocurrency scam.

πŸ“– Read

via "Dark Reading: ".
πŸ” Twitter accounts of Elon Musk, Bill Gates and others hijacked to promote crypto scam πŸ”

The verified accounts for Gates, Musk and Apple issued tweets promoting a cryptocurrency scam, asking followers to send money to a blockchain address.

πŸ“– Read

via "Security on TechRepublic".
❌ Twitter Elite Accounts Are Hijacked in Unprecedented Cryptocurrency Scam ❌

The Twitter accounts of Gates, Musk, Biden, Apple and Uber have each been hijacked at the same time to push a cryptocurrency scam in an unprecedented breach of Twitter accounts.

πŸ“– Read

via "Threatpost".
⚠ Twitter limits tweeting as prominent accounts spam out cryptocoin scams ⚠

Twitter is investigating a rash of fraudulent tweets from prominent accounts - don't fall for these scams!

πŸ“– Read

via "Naked Security".
❌ LokiBot Redux Attacks Massive List of Common Android Apps ❌

BlackRock, based on the Xerxes source code, can steal info not only from financial apps but also TikTok, Tinder, Instagram, Uber and many others.

πŸ“– Read

via "Threatpost".
❌ Threat Actors Introduce Unique β€˜Newbie’ Hacker Forum ❌

CryptBB becomes more inclusive by inviting less experienced hackers to learn from expert cybercriminals and one another.

πŸ“– Read

via "Threatpost".
❌ Amazon-Themed Phishing Campaigns Swim Past Security Checks ❌

A pair of recent campaigns aim to lift credentials and other personal information under the guise of Amazon package-delivery notices.

πŸ“– Read

via "Threatpost".
πŸ•΄ Level Up Your Kubernetes Security Skills at Black Hat USA πŸ•΄

Gain access to a broad spectrum of in-depth cybersecurity Briefings and Trainings.

πŸ“– Read

via "Dark Reading: ".
πŸ” Watch out for these subject lines in email phishing attacks πŸ”

Campaigns exploiting COVID-19 remained popular last quarter, but cybercriminals also relied on tried and true subjects, says KnowBe4.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift πŸ•΄

The only entities equipped to safeguard Internet of Things devices against risks are the IoT device manufacturers themselves.

πŸ“– Read

via "Dark Reading: ".
πŸ” Check Point helps Zoom resolve "Vanity URL" security problem πŸ”

The loophole gave cybercriminals an opening through specialized Zoom URL links.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How COVID-19 has increased the risk of security threats πŸ”

During the first half of the year, 80% of companies surveyed saw "slightly to considerably more" cyberattack attempts, says Exabeam.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use the Google Pixel Safety Check feature πŸ”

The Android-powered Google Pixel line of phones received a very important updated feature dedicated to user's personal safety. Learn how to use the Safety Check feature.

πŸ“– Read

via "Security on TechRepublic".