πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Hackers Breach Dunkin’ Donuts Accounts in Credential Stuffing Attack ❌

The donut giant first noticed the attack Oct. 31.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Office workers beware: Holiday gift card spear phishing attacks on the rise πŸ”

Attackers target office managers during the holiday season, tricking them into sending hackers gift cards, according to a Barracuda report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Return of Email Flooding πŸ•΄

An old attack technique is making its way back into the mainstream with an onslaught of messages that legacy tools and script writing can't easily detect.

πŸ“– Read

via "Dark Reading: ".
❌ Cisco Patches Critical Bug in License Management Tool ❌

The vulnerability could allow attacker to execute arbitrary SQL queries.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Beware the Malware-Laden Brexit News πŸ•΄

New Fancy Bear attack campaign lures victims with phony Brexit-themed document to deliver Zekapab payload.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your business from botnets: 6 strategies πŸ”

Cybercriminals have recently broken records for DDoS strength. Here's how to protect your network from attacks, and prevent devices from being assimilated into botnets.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Dunkin' Donuts Serves Up Data Breach Alert πŸ•΄

Forces potentially affected DD Perks customers to reset their passwords after learning of unauthorized access to their personal data.

πŸ“– Read

via "Dark Reading: ".
❌ Critical Zoom Flaw Lets Hackers Hijack Conference Meetings ❌

Hackers can spoof messages, hijack screen controls and kick others out of meetings.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” WannaCry: One year later, is the world ready for another major attack? πŸ”

ZDNet's Danny Palmer examine's the aftermath of WannaCry, Notpetya, and Bad Rabbit.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Establishing True Trust in a Zero-Trust World πŸ•΄

Our goal should not be to merely accept zero trust but gain the visibility required to establish real trust.

πŸ“– Read

via "Dark Reading: ".
πŸ” A free decryption tool is available for Thanatos ransomware victims πŸ”

ZDNet's Danny Palmer explains the evolution of the world's weirdest ransomware.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Dell Forces Password Reset for Online Customers Following Data Breach πŸ•΄

Move prompts questions about scope of intrusion and strength of company's password hashing.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Anti-Botnet Guide Aims to Tackle Automated Threats πŸ•΄

The international guide is intended to help organizations defend their networks and systems from automated and distributed attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ MITRE Changes the Game in Security Product Testing πŸ•΄

Nonprofit has published its first-ever evaluation of popular endpoint security tools - measured against its ATT&CK model.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Overall Volume of Thanksgiving Weekend Malware Attacks Lower This Year πŸ•΄

But ransomware attacks go through the roof, new threat data from SonicWall shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” The top tech news of 2018, ranked πŸ”

It's been a wild of a year for tech. Here are the biggest tech news stories on our readers' minds.

πŸ“– Read

via "Security on TechRepublic".
⚠ Driver loses his car to hackers. TWICE. ⚠

He slapped a tracker on the new one and installed CCTV... which did a fine job of recording the thieves' 90-second-long relay attack.

πŸ“– Read

via "Naked Security".
⚠ 57m Americans’ details leaked online by another misconfigured server ⚠

Misconfigured Elasticsearch servers spilled personal details on 57 million Americans, said reports this week.

πŸ“– Read

via "Naked Security".
πŸ” What is a man-in-the-middle attack? πŸ”

Here's a quick rundown of what a man-in-the-middle attack is, and why it's so dangerous.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Man-in-the-middle attacks: A cheat sheet πŸ”

Cybercrime takes on a lot of forms, with one of the oldest and most dangerous being man-in-the-middle attacks. Here's what you need to know about MITM attacks, including how to protect your company.

πŸ“– Read

via "Security on TechRepublic".
⚠ Prisoners allegedly posed as underage girls in $560K sextortion scam ⚠

They allegedly victimized 442 military men by sending nude photos and then calling, pretending to be irate fathers or police.

πŸ“– Read

via "Naked Security".