πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Linux servers and workstations are hackers' next target, security researchers warn πŸ”

Sophisticated hackers and crooks are developing more tools to target Linux-based systems used by government and big business.

πŸ“– Read

via "Security on TechRepublic".
❌ Product Overview: Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine ❌

The Cynet 360 platform is built on three pillars; Extended Detection and Response (XDR), Response Automation, and Managed Detection and Response (MDR).

πŸ“– Read

via "Threatpost".
❌ Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles ❌

New opt-in COVID-19 Exposure Notifications Express systems baked into Apple’s iOS and available on Android need privacy guardrails, say privacy advocates.

πŸ“– Read

via "Threatpost".
πŸ•΄ Ripple20 Malware Highlights Industrial Security Challenges πŸ•΄

Poor security practices allowed software vulnerabilities to propagate throughout industrial and IoT products for more than 20 years.

πŸ“– Read

via "Dark Reading: ".
❌ Ransomware And Zoom-Bombing: Cyberattacks Disrupt Back-to-School Plans ❌

Cyberattacks have caused several school systems to delay students' first day back - and experts warn that new COVID-related delays could be the new "snow days."

πŸ“– Read

via "Threatpost".
πŸ›  Zeek 3.2.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks ❌

The "BLURtooth" flaw allows attackers within wireless range to bypass authentication keys and snoop on devices utilizing implementations of Bluetooth 4.0 through 5.0.

πŸ“– Read

via "Threatpost".
πŸ” How ransomware attacks are growing in severity πŸ”

Demands are sharply higher, and the complexity and costs of addressing an attack are increasing, according to cyber insurance provider Coalition.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Managed IT Providers: The Cyber-Threat Actors' Gateway to SMBs πŸ•΄

Criminals have made MSPs a big target of their attacks. That should concern small and midsize businesses a great deal.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Think You're Spending Enough on Security? πŸ•΄

While the amount will vary from organization to organization, here are four ways for everyone to evaluate whether they're allocating the right amount of money and resources.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to Mitigate a DDoS Attack πŸ”

Following a rash of targeted denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks worldwide, countries are offering guidance.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2018-17145

Bitcoin Core 0.16.x before 0.16.2 and Bitcoin Knots 0.16.x before 0.16.2 allow remote denial of service via a flood of multiple transaction inv messages with random hashes, aka INVDoS. NOTE: this can also affect other cryptocurrencies, e.g., if they were forked from Bitcoin Core after 2017-11-15.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Zoom Brings Two-Factor Authentication to All Users πŸ•΄

This marks the latest step Zoom has taken to improve user security as more employees work from home.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to manage app permissions in Android 11 πŸ”

With your Android device upgraded to version 11, you'll want to get control of app permissions. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
❌ Razer Gaming Fans Caught Up in Data Leak ❌

A cloud misconfiguration at the gaming-gear merchant potentially exposed 100,000 customers to phishing and fraud.

πŸ“– Read

via "Threatpost".
❌ Microsoft Warns of Cyberattacks on Trump, Biden Election Campaigns ❌

Just months before the U.S. presidential election, hackers from Russia, China and Iran are ramping up phishing and malware attacks against campaign staffers.

πŸ“– Read

via "Threatpost".
πŸ•΄ ThreatConnect Buys Nehemiah Security πŸ•΄

Threat intelligence firm adds Nehemiah's Risk Quantifier to its platform.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Lessons IT Security Can Learn From DevOps πŸ•΄

DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Two Years on from GDPR: Has It Driven Growth in Cybersecurity Insurance? πŸ•΄

Whilst GDPR has put the spotlight on data privacy and cyber issues, there are other more prominent trends that are driving a greater take-up of cyber insurance, says Ben Maidment, Class Underwriter - Cyber, Physical & Technology at Brit Insurance.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Sanctions Russian Attackers for 2020 Election Interference πŸ•΄

The move comes as Microsoft publishes research on attack groups and activity attempting to target the Biden and Trump campaigns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyber-Risks Explode With Move to Telehealth Services πŸ•΄

The hasty shift to online delivery of primary care services since the COVID-19 outbreak has attracted significant attacker interest.

πŸ“– Read

via "Dark Reading: ".