πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ The Sounds a Key Make Can Produce 3D-Printed Replica ❌

Researchers reveal technology called SpiKey that can β€˜listen’ to the clicks a key makes in a lock and create a duplicate from the sounds.

πŸ“– Read

via "Threatpost".
❌ Airline DMARC Policies Lag, Opening Flyers to Email Fraud ❌

Up to 61 percent out of the IATA (International Air Transport Association) airline members do not have a published DMARC record.

πŸ“– Read

via "Threatpost".
πŸ•΄ Stolen Data: The Gift That Keeps on Giving πŸ•΄

Users regularly reuse logins and passwords, and data thieves are leveraging that reality to breach multiple accounts.

πŸ“– Read

via "Dark Reading: ".
πŸ” Industrial control system cybersecurity vulnerabilities are rising in 2020 πŸ”

365 ICS vulnerabilities were disclosed in the first half of the year, 75% of them are high or critical on the CVSS scale, and nearly three-quarters can be exploited remotely, according to a report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” NordVPN: How to protect your organization from DDoS attacks πŸ”

Without early threat detection, you may not know your website has been hit by a DDoS attack until it slows down or stops, says NordVPN.

πŸ“– Read

via "Security on TechRepublic".
πŸ” IBM finds vulnerability in IoT chips present in billions of devices πŸ”

Manufactured by Thales, the EHS8 module family has security flaws that could allow attackers to take total control over internet-connected industrial machines.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to restrict Nextcloud login to IP addresses πŸ”

Looking to lock down your Nextcloud instance so only certain computers can login? Jack Wallen shows you how to do just this.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How to Control Security Costs During a Down Economy πŸ•΄

Three key areas security professionals should watch when managing their budgets.

πŸ“– Read

via "Dark Reading: ".
πŸ” Ransomware Crew Ravages Liquor, Wine Company πŸ”

The parent company of some of the biggest names in liquor, including Jack Daniel's, was hit by ransomware, allowing attackers to steal 1 TB of data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ ICS Vulnerability Reports Rapidly Rise πŸ•΄

More scrutiny of products for industrial control systems is expected to expose even more weaknesses in devices that run critical infrastructure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Newly Patched Alexa Flaws a Red Flag for Home Workers πŸ•΄

Alexa could serve as an entry point to home and corporate networks. Security experts point to the need for manufacturers to work closely with enterprise security teams to spot and shut down IoT device flaws.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CISA Warns of New RAT Aimed at US Defense Contractors πŸ•΄

Hidden Cobra, an APT group associated with the government of North Korea, is thought to be behind the campaign.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Sophisticated P2P Botnet Targeting SSH Servers πŸ•΄

'FritzFrog' is fileless, uses its own proprietary P2P implementation, and has breached at least 500 servers so far, Guardicore says.

πŸ“– Read

via "Dark Reading: ".
❌ FritzFrog Botnet Attacks Millions of SSH Servers ❌

The unique, advanced worming P2P botnet drops backdoors and cryptominers, and is spreading globally.

πŸ“– Read

via "Threatpost".
❌ Researchers Warn of Flaw Affecting Millions of IoT Devices ❌

A patch has been issued for the flaw in a widely-used module, and researchers are urging IoT manufacturers to update their devices ASAP.

πŸ“– Read

via "Threatpost".
πŸ” How to keep your company secure while employees work from home πŸ”

There are new issues organizations should consider as work from home continues with no end in sight. One expert offers ideas to secure your widening perimeter.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Fuzzing Services Help Push Technology into DevOps Pipeline πŸ•΄

As part of a continuous testing approach, fuzzing has evolved to provide in-depth code checks for unknown vulnerabilities before deployment.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 10 Resume and Interview Tips from Security Pros πŸ•΄

Experts from the DEF CON Career Hacking Village explain how job seekers can build a resume and rock an interview.

πŸ“– Read

via "Dark Reading: ".
❌ IBM AI-Powered Data Management Software Subject to Simple Exploit ❌

A low-privileged process on a vulnerable machine could allow data harvesting and DoS.

πŸ“– Read

via "Threatpost".
❌ Cisco Critical Flaw Patched in WAN Software Solution ❌

Cisco has issued a fix for a critical flaw in its Virtual Wide Area Application Services (vWAAS), software for optimizing WAN on virtual private cloud infrastructure.

πŸ“– Read

via "Threatpost".
❌ Senate Bill Would Expand Facial-Recognition Restrictions Nationwide ❌

The proposed law comes as police departments around the country for their use of facial recognition to identify allegedly violent Black Lives Matter protesters.

πŸ“– Read

via "Threatpost".