πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ England 'Test and Trace' Program Violates GDPR Privacy Law πŸ•΄

The UK government confirms the program launched in May without a Data Protection Impact Assessment, as required under GDPR.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Number of Reported Breaches Decrease In First Half of 2020 πŸ•΄

With the pandemic as a backdrop, publicly reported US data breaches dropped as more employees and suppliers stayed home.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SIGRed: What You Should Know About the Windows DNS Server Bug πŸ•΄

DNS experts share their thoughts on the wormable vulnerability and explain why it should be a high priority for businesses.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Internet Scan Shows Decline in Insecure Network Services πŸ•΄

While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Twitter Breach Highlights Privileged Account Security Issue πŸ•΄

Security incident that allowed attackers to hijack high-profile accounts suggests social media giant's controls for spotting insider abuse were not strong enough, security experts say.

πŸ“– Read

via "Dark Reading: ".
πŸ” Companies with poor privacy practices are 80% more apt to suffer data breach πŸ”

Poor privacy=data breach as reported by Osano was proven July 15 when Twitter was hacked and 130 accounts--including Joe Biden's and Kanye West's--were exposed.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Google Cloud adds 11 security features to G Suite πŸ”

The updates include BIMI in Gmail, better protection in Meet, phishing protections in Chat, and more.

πŸ“– Read

via "Security on TechRepublic".
❌ Diebold ATM Terminals Jackpotted Using Machine’s Own Software ❌

The company warned that cybercriminals are using a black box with proprietary code in attacks to illegally dispense cash across Europe.

πŸ“– Read

via "Threatpost".
πŸ” Phishing attacks hiding in Google Cloud to steal Microsoft account credentials πŸ”

By hosting phishing pages at a legitimate cloud service, cybercriminals try to avoid arousing suspicion, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Leading Through Uncertainty: Be Proactive in Your Dark Web Intelligence Strategy πŸ•΄

Having a strong Dark Web intelligence posture helps security teams understand emerging vulnerability trends.

πŸ“– Read

via "Dark Reading: ".
πŸ” 5 apps for cleaning and speeding up your PC πŸ”

Before you ditch your slow computer in favor of a new model, try using one of these apps to clean and speed it up.

πŸ“– Read

via "Security on TechRepublic".
❌ Critical Adobe Photoshop Flaws Patched in Emergency Update ❌

Adobe issued out-of-band patches for critical flaws tied to 12 CVEs in Photoshop and other applications.

πŸ“– Read

via "Threatpost".
πŸ•΄ G Suite Security Updates Bring New Features to Gmail, Meet & Chat πŸ•΄

New security features include support for a new standard in Gmail, phishing protection in Chat, and additional admin controls.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-21036

Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.

πŸ“– Read

via "National Vulnerability Database".
πŸ” What is Threat Intelligence? πŸ”

Threat intelligence is what becomes of data after it has been gathered, processed, and analyzed. Organizations can use threat intelligence against cyber threats. In this article, we’ll discuss what threat intelligence is, its types, how it works, and why it’s important.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ The Data Privacy Loophole Federal Agencies Are Still Missing πŸ•΄

Why knowledge-based authentication is leaving federal contact centers vulnerable to an increasingly sophisticated hacker community.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-7064

A flaw was found in pritunl-client before version 1.0.1116.6. A lack of signature verification leads to sensitive information leakage

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-7063

A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
❌ Chris Vickery: AI Will Drive Tomorrow’s Data Breaches ❌

Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top threat no one's ready for.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2015-5238

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-3796. Reason: This candidate is a reservation duplicate of CVE-2015-3796. Notes: All CVE users should reference CVE-2015-3796 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Fortinet Buys Cloud Security Firm OPAQ πŸ•΄

The company plans to add zero-trust networking capabilities to its Secure Access Service Edge architecture.

πŸ“– Read

via "Dark Reading: ".