πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ New Threat Activity by Lazarus Group Spells Trouble For Orgs πŸ•΄

The North Korea-backed group has launched several campaigns to raise revenue for cash-strapped nation's missile program, security experts say.

πŸ“– Read

via "Dark Reading: ".
❌ Chinese APT Debuts Sepulcher Malware in Spear-Phishing Attacks ❌

The RAT has been distributed in various campaigns over the past six months, targeting both European officials and Tibetan dissidents.

πŸ“– Read

via "Threatpost".
❌ Cisco Warns of Active Exploitation of Flaw in Carrier-Grade Routers ❌

Multiple flaws in system software that causes errors in packet handling could allow an attacker to consume memory and crash devices.

πŸ“– Read

via "Threatpost".
❌ Live Webinar: XDR and Beyond ❌

Next week, Senior Analyst Dave Gruber of ESG will join cybersecurity company Cynet for a webinar to help companies better understand the promise and realities of emerging XDR technologies

πŸ“– Read

via "Threatpost".
⚠ Phishing scam uses Sharepoint and One Note to go after passwords ⚠

Not all phishing links appear right in the email itself...

πŸ“– Read

via "Naked Security".
πŸ•΄ Hypothesis: Cyber Attackers Are After Your Scientific Research πŸ•΄

From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Kubernetes Clusters Are Intrinsically Insecure (& What to Do About Them) πŸ•΄

By following best practices and prioritizing critical issues, you can reduce the chances of a security breach and constrain the blast radius of an attempted attack. Here's how.

πŸ“– Read

via "Dark Reading: ".
πŸ” 33% of companies expose unsafe network services to the internet πŸ”

The findings of a new report validate the correlation between poor network hygiene and the prevalence of wider security issues in the digital supply chain.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How insider threats pose risks and challenges to any organization πŸ”

Insider threats can be difficult to combat and manage due to budgetary limits, lack of staff, and insufficient tools, says Bitglass.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DHS Partners with Industry to Offer State, Local Gov'ts Cybersecurity Aid πŸ•΄

The US Department of Homeland Security teams up with Akamai and the Center for Internet Security to provide state and local governments with cybersecurity through DNS for free.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 5 Tips for Triaging Risk from Exposed Credentials πŸ•΄

Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable end-to-end encryption for the Nextcloud app πŸ”

Learn how you can enable the new Nextcloud end-to-end encryption.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Replace your passwords with passphrases: Here's how to use them to remain secure πŸ”

Instead of trying to remember a long and complex password, try switching to passphrases. Learn why they're important and how they work.

πŸ“– Read

via "Security on TechRepublic".
❌ Joker Spyware Plagues More Google Play Apps ❌

The six malicious apps have been removed from Google Play, but could still threaten 200,000 installs.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'KryptoCibule' Uses Several Tricks to Maximize Cryptocurrency Theft πŸ•΄

The malware family uses multiple tactics to steal as much cryptocurrency as possible while flying under the radar.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Don't Forget Cybersecurity on Your Back-to-School List πŸ•΄

School systems don't seem like attractive targets, but they house lots of sensitive data, such as contact information, grades, health records, and more.

πŸ“– Read

via "Dark Reading: ".
πŸ” Organizations facing nearly 1,200 phishing attacks each month πŸ”

A new study found that email phishing attacks have become more successful during the COVID-19 pandemic.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-12621

The Teamwire application 5.3.0 for Android allows physically proximate attackers to exploit a flaw related to the pass-code component.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Hidden Costs of Losing Security Talent πŸ•΄

One person's exit can set off a chain of costly events.

πŸ“– Read

via "Dark Reading: ".
πŸ” Data Privacy Legislation in California Keeps Moving Forward πŸ”

Bills that would regulate the sharing of genetic data and carve out coverage in the CCPA of some HIPAA data are close to being laws in California.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Triple-Threat Cryptocurrency RAT Mines, Steals and Harvests ❌

KryptoCibule spreads via pirated software and game torrents.

πŸ“– Read

via "Threatpost".