πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Friday Five: 8/21 Edition πŸ”

Saudi Arabia using stolen twitter data to target critics, a significant increase in vishing, and the Secret Service buying location data to bypass warrants- catch up on this week’s news with the Friday Five. - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More ❌

Threatpost editors discuss a cryptomining malware targeting AWS systems, a recent development in a lawsuit against the IBM-owned Weather Channel app, and more.

πŸ“– Read

via "Threatpost".
❌ Researchers Sound Alarm Over Malicious AWS Community AMIs ❌

Malicious Community Amazon Machine Images are a ripe target for hackers, say researchers.

πŸ“– Read

via "Threatpost".
πŸ” IoT safety: Logging devices on trucks are not always secure πŸ”

Devices attached to trucks are for safety, quality control, and efficiency. But many are being left open to hackers.

πŸ“– Read

via "Security on TechRepublic".
❌ University of Utah Pays $457K After Ransomware Attack ❌

The university said that it paid $457,000 to retrieve a decryption key after a ransomware attack encrypted student and faculty data on its servers.

πŸ“– Read

via "Threatpost".
⚠ Outlook β€œmail issues” phishing – don’t fall for this scam! ⚠

We deconstruct an email phishing scam in detail so you don't have to!

πŸ“– Read

via "Naked Security".
πŸ•΄ 74 Days From the Presidential Election, Security Worries Mount πŸ•΄

With pandemic measures continuing and political divisions deepening, security experts express concern about the security and integrity of the November election.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install Infection Monkey for breach and attack simulations on your network πŸ”

Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ University of Utah Pays in Cyber-Extortion Scheme πŸ•΄

Though a ransomware attempt was thwarted, the university paid to prevent the release of student PII.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – catch up on our latest articles and videos ⚠

Our recent articles and videos, all in one place.

πŸ“– Read

via "Naked Security".
πŸ” Microsoft says the pandemic has changed the future of cybersecurity in these five ways πŸ”

A new report from Microsoft suggests that cloud-based technologies and Zero Trust architecture will become mainstays of businesses' cybersecurity investments going forward.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Security threats have already moved on from COVID-19-themed attacks, report finds πŸ”

The pandemic is old news for cybercriminals who are still targeting remote workers, but are doing so with botnets and familiar exploits.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Dark Reading Launches New Section on Physical Security πŸ•΄

Partnership with IFSEC enables Dark Reading to cover new areas of security and expand its audience.

πŸ“– Read

via "Dark Reading: ".
❌ APIs Are the Next Frontier in Cybercrime ❌

APIs make your systems easier to run -- and make it easier for hackers, too.

πŸ“– Read

via "Threatpost".
πŸ•΄ Average Cost of a Data Breach in 2020: $3.86M πŸ•΄

When companies defend themselves against cyberattacks, time is money.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Huawei Role in UK 5G Network Set to Be Removed πŸ•΄

The Digital Secretary for the UK, Oliver Dowden, has told the House of Commons that Huawei is set to be stripped of its role in the county's 5G network due to security concerns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Should Physical Security Professionals Learn Cybersecurity Skills? πŸ•΄

In the first of a series of columns set to be hosted exclusively on IFSEC Global, Sarb Sembhi, CISM, CTO & CISO, Virtually Informed outlines why physical security professionals should be investing in their cyber security skillset.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Cybersecurity Code of Practice for Installers Unveiled by BSIA πŸ•΄

The British Security Industry Association's (BSIA) cybersecurity group has released a new code of practice for installers responsible for safety and security systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Large Ad Network Collects Private Activity Data, Reroutes Clicks πŸ•΄

A Chinese mobile advertising firm has modified code in the software development kit included in more than 1,200 apps, maliciously collecting user activity and performing ad fraud, says Snyk, a software security firm.

πŸ“– Read

via "Dark Reading: ".
❌ Iran-Linked β€˜Newbie’ Hackers Spread Dharma Ransomware Via RDP Ports ❌

The recent Dharma campaign by Iran-linked script kiddies shows that the ransomware is being spread not just by sophisticated, state-sponsored actors anymore.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 programming languages for security admins to learn πŸ”

SecAdmins working to protect infrastructure, whether in a defensively or offensively, may find these programming languages helpful in safeguarding apps, systems, and hardware from threats.

πŸ“– Read

via "Security on TechRepublic".