πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ University of Utah Pays $457K After Ransomware Attack ❌

The university said that it paid $457,000 to retrieve a decryption key after a ransomware attack encrypted student and faculty data on its servers.

πŸ“– Read

via "Threatpost".
⚠ Outlook β€œmail issues” phishing – don’t fall for this scam! ⚠

We deconstruct an email phishing scam in detail so you don't have to!

πŸ“– Read

via "Naked Security".
πŸ•΄ 74 Days From the Presidential Election, Security Worries Mount πŸ•΄

With pandemic measures continuing and political divisions deepening, security experts express concern about the security and integrity of the November election.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install Infection Monkey for breach and attack simulations on your network πŸ”

Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ University of Utah Pays in Cyber-Extortion Scheme πŸ•΄

Though a ransomware attempt was thwarted, the university paid to prevent the release of student PII.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – catch up on our latest articles and videos ⚠

Our recent articles and videos, all in one place.

πŸ“– Read

via "Naked Security".
πŸ” Microsoft says the pandemic has changed the future of cybersecurity in these five ways πŸ”

A new report from Microsoft suggests that cloud-based technologies and Zero Trust architecture will become mainstays of businesses' cybersecurity investments going forward.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Security threats have already moved on from COVID-19-themed attacks, report finds πŸ”

The pandemic is old news for cybercriminals who are still targeting remote workers, but are doing so with botnets and familiar exploits.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Dark Reading Launches New Section on Physical Security πŸ•΄

Partnership with IFSEC enables Dark Reading to cover new areas of security and expand its audience.

πŸ“– Read

via "Dark Reading: ".
❌ APIs Are the Next Frontier in Cybercrime ❌

APIs make your systems easier to run -- and make it easier for hackers, too.

πŸ“– Read

via "Threatpost".
πŸ•΄ Average Cost of a Data Breach in 2020: $3.86M πŸ•΄

When companies defend themselves against cyberattacks, time is money.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Huawei Role in UK 5G Network Set to Be Removed πŸ•΄

The Digital Secretary for the UK, Oliver Dowden, has told the House of Commons that Huawei is set to be stripped of its role in the county's 5G network due to security concerns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Should Physical Security Professionals Learn Cybersecurity Skills? πŸ•΄

In the first of a series of columns set to be hosted exclusively on IFSEC Global, Sarb Sembhi, CISM, CTO & CISO, Virtually Informed outlines why physical security professionals should be investing in their cyber security skillset.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Cybersecurity Code of Practice for Installers Unveiled by BSIA πŸ•΄

The British Security Industry Association's (BSIA) cybersecurity group has released a new code of practice for installers responsible for safety and security systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Large Ad Network Collects Private Activity Data, Reroutes Clicks πŸ•΄

A Chinese mobile advertising firm has modified code in the software development kit included in more than 1,200 apps, maliciously collecting user activity and performing ad fraud, says Snyk, a software security firm.

πŸ“– Read

via "Dark Reading: ".
❌ Iran-Linked β€˜Newbie’ Hackers Spread Dharma Ransomware Via RDP Ports ❌

The recent Dharma campaign by Iran-linked script kiddies shows that the ransomware is being spread not just by sophisticated, state-sponsored actors anymore.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 programming languages for security admins to learn πŸ”

SecAdmins working to protect infrastructure, whether in a defensively or offensively, may find these programming languages helpful in safeguarding apps, systems, and hardware from threats.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DeathStalker APT Targets SMBs with Cyber Espionage πŸ•΄

The hacker-for-hire group, operating since at least 2012, primarily targets financial firms.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-1985

IBM Trusteer Rapport/Apex 3.6.1908.22 contains an unused legacy driver which could allow a user with administrator privileges to cause a buffer overflow that would result in a kernel panic. IBM X-Force ID: 154207.

πŸ“– Read

via "National Vulnerability Database".
πŸ” FBI, CISA Warn About Vishing Campaign Targeting Teleworkers πŸ”

In the wake of news that attackers have been carrying out a successful voice phishing campaign against companies for a month, government orgs offered tips on how employees working from home can mitigate future attacks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Extra security or extra risk? Pros and cons of password managers πŸ”

Tech consultants and journalists have their own conflicting opinions about the best way to manage access in a world full of security risks.

πŸ“– Read

via "Security on TechRepublic".