πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ IBM Spectrum Protect Plus Security Open to RCE ❌

Two bugs (CVE-2020-4703 and CVE-2020-4711) in IBM's Spectrum Protect Plus data-storage protection solution could enable remote code execution.

πŸ“– Read

via "Threatpost".
❌ QR Codes Serve Up a Menu of Security Concerns ❌

QR code usage is soaring in the pandemic -- but malicious versions aren't something that most people think about.

πŸ“– Read

via "Threatpost".
πŸ” Exploit Code for Patched Windows Zerologon Vulnerability Released πŸ”

Details on Friday came out around a severe privilege escalation vulnerability Microsoft patched last month in Netlogon. Now exploit code for the vulnerability, Zerologon, is making the rounds online.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 5 Security Lessons Humans Can Learn From Their Dogs πŸ•΄

Without the right reinforcements, you'll be barking at the moon.

πŸ“– Read

via "Dark Reading: ".
❌ Data Breaches Exposes Vets, COVID-19 Patients ❌

Social engineering and employee mistakes lead to breach Veteran's Administration and the National Health Service.

πŸ“– Read

via "Threatpost".
πŸ•΄ More Cyberattacks in the First Half of 2020 Than in All of 2019 πŸ•΄

The pandemic-related shift to remote work and the growing availability of ransomware-as-a-service were two major drivers, CrowdStrike says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Rethinking Resilience: Tips for Your Disaster Recovery Plan πŸ•΄

As more organizations face disruptions, a defined approach to recovery is imperative so they can successfully recover, experts say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ A Real-World Tool for Organizing, Integrating Third-Party Tools πŸ•΄

Omdia Cybersecurity Accelerator analyst Eric Parizo describes how a security product integration framework (SPIF) can unify best-of-breed architectures.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Thermal vision solutions πŸ•΄



πŸ“– Read

via "Dark Reading: ".
❌ Bluetooth Spoofing Bug Affects Billions of IoT Devices ❌

The 'BLESA' flaw affects the reconnection process that occurs when a device moves back into range after losing or dropping its pairing, Purdue researchers said.

πŸ“– Read

via "Threatpost".
❌ Report Looks at COVID-19’s Massive Impact on Cybersecurity ❌

Cynet's report shares several interesting data points and findings, such as the cyberattack volume change observed in various industry sectors, the increased use of spearphishing as an initial attack vector, and the approaches being used to distribute malware in spearphishing attacks.

πŸ“– Read

via "Threatpost".
πŸ” Expanding threat landscape is biggest concern, cybersecurity analysts tell Gartner πŸ”

Since the COVID-19 pandemic began, IT teams have been trying to keep up with the ever-evolving array of cyberthreats.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybersecurity Bounces Back, but Talent Still Absent πŸ•΄

While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Meet the Computer Scientist Who Helped Push for Paper Ballots πŸ•΄

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi.

πŸ“– Read

via "Dark Reading: ".
❌ DoJ Indicts Two Hackers for Defacing Websites with Pro-Iran Messages ❌

The two hackers allegedly hacked more than 50 websites hosted in the U.S. and vandalized them with pro-Iran messages.

πŸ“– Read

via "Threatpost".
❀1
πŸ•΄ CISA Joins MITRE to Issue Vulnerability Identifiers πŸ•΄

The Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ” My stolen credit card details were used 4,500 miles away. I tried to find out how it happened πŸ”

When cybersecurity reporter Danny Palmer found his card was apparently used on another continent, he set out to discover more.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How did my credit card details get stolen and used half the world away? πŸ”

Cybersecurity reporter Danny Palmer tells Karen Roby what he discovered when he tried to find out how someone in South America attempted to use his bank details.

πŸ“– Read

via "Security on TechRepublic".
❌ DDoS Attacks Skyrocket as Pandemic Bites ❌

More people being online during lockdowns and work-from-home shifts has proven to be lucrative for DDoS-ers.

πŸ“– Read

via "Threatpost".
πŸ•΄ 8 Reasons Perimeter Security Alone Won't Protect Your Crown Jewels πŸ•΄

Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications?

πŸ“– Read

via "Dark Reading: ".
πŸ” How to Comply with Accountability in Data Protection πŸ”

A new framework published by the UK Information Commissioner's Office can help organizations comply with the GDPR's accountability requirements.

πŸ“– Read

via "Subscriber Blog RSS Feed ".