πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ APIs Are the Next Frontier in Cybercrime ❌

APIs make your systems easier to run -- and make it easier for hackers, too.

πŸ“– Read

via "Threatpost".
πŸ•΄ Average Cost of a Data Breach in 2020: $3.86M πŸ•΄

When companies defend themselves against cyberattacks, time is money.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Huawei Role in UK 5G Network Set to Be Removed πŸ•΄

The Digital Secretary for the UK, Oliver Dowden, has told the House of Commons that Huawei is set to be stripped of its role in the county's 5G network due to security concerns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Should Physical Security Professionals Learn Cybersecurity Skills? πŸ•΄

In the first of a series of columns set to be hosted exclusively on IFSEC Global, Sarb Sembhi, CISM, CTO & CISO, Virtually Informed outlines why physical security professionals should be investing in their cyber security skillset.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Cybersecurity Code of Practice for Installers Unveiled by BSIA πŸ•΄

The British Security Industry Association's (BSIA) cybersecurity group has released a new code of practice for installers responsible for safety and security systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Large Ad Network Collects Private Activity Data, Reroutes Clicks πŸ•΄

A Chinese mobile advertising firm has modified code in the software development kit included in more than 1,200 apps, maliciously collecting user activity and performing ad fraud, says Snyk, a software security firm.

πŸ“– Read

via "Dark Reading: ".
❌ Iran-Linked β€˜Newbie’ Hackers Spread Dharma Ransomware Via RDP Ports ❌

The recent Dharma campaign by Iran-linked script kiddies shows that the ransomware is being spread not just by sophisticated, state-sponsored actors anymore.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 programming languages for security admins to learn πŸ”

SecAdmins working to protect infrastructure, whether in a defensively or offensively, may find these programming languages helpful in safeguarding apps, systems, and hardware from threats.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DeathStalker APT Targets SMBs with Cyber Espionage πŸ•΄

The hacker-for-hire group, operating since at least 2012, primarily targets financial firms.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-1985

IBM Trusteer Rapport/Apex 3.6.1908.22 contains an unused legacy driver which could allow a user with administrator privileges to cause a buffer overflow that would result in a kernel panic. IBM X-Force ID: 154207.

πŸ“– Read

via "National Vulnerability Database".
πŸ” FBI, CISA Warn About Vishing Campaign Targeting Teleworkers πŸ”

In the wake of news that attackers have been carrying out a successful voice phishing campaign against companies for a month, government orgs offered tips on how employees working from home can mitigate future attacks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Extra security or extra risk? Pros and cons of password managers πŸ”

Tech consultants and journalists have their own conflicting opinions about the best way to manage access in a world full of security risks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Attackers Use Unicode & HTML to Bypass Email Security Tools πŸ•΄

Researchers spot cybercriminals using new techniques to help malicious phishing emails slip past detection tools.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CISA Releases 5G Security Guidelines πŸ•΄

The new document defines lines of effort for developing security for the growing 5G network.

πŸ“– Read

via "Dark Reading: ".
❌ Google Fixes High-Severity Chrome Browser Code Execution Bug ❌

The high-severity flaw, which was patched in the latest version of Google's Chrome browser, could allow code execution.

πŸ“– Read

via "Threatpost".
πŸ•΄ MITRE Releases 'Shield' Active Defense Framework πŸ•΄

Free knowledge base offers techniques and tactics for engaging with and better defending against network intruders.

πŸ“– Read

via "Dark Reading: ".
❌ Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem ❌

With many in the public sphere warning about a potential compromise of the integrity of the Presidential Election, security researchers instead flag online resources and influence campaigns as the biggest problem areas.

πŸ“– Read

via "Threatpost".
πŸ” IoT botnets: Smart homes ripe for a new type of cyberattack πŸ”

The burgeoning smart home device market has given rise to digital intrusion and potential energy market manipulation on a massive scale.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Fatal Flaw in Data Security πŸ•΄

Simply stated: No matter how sophisticated your security software is, data cannot be simultaneously used and secured. But that may be changing soon.

πŸ“– Read

via "Dark Reading: ".
❌ Lazarus Group Targets Cryptocurrency Firms Via LinkedIn Messages ❌

The North Korean-linked APT's latest campaign shows that it is shifting focus to target the cryptocurrency and financial verticals.

πŸ“– Read

via "Threatpost".
❌ Safari Bug Revealed After Apple Takes Nearly a Year to Patch ❌

Polish security researcher unveiled the flaw in a cross-browser sharing API that could allow attackers to steal user files.

πŸ“– Read

via "Threatpost".