πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Rethinking Resilience: Tips for Your Disaster Recovery Plan πŸ•΄

As more organizations face disruptions, a defined approach to recovery is imperative so they can successfully recover, experts say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ A Real-World Tool for Organizing, Integrating Third-Party Tools πŸ•΄

Omdia Cybersecurity Accelerator analyst Eric Parizo describes how a security product integration framework (SPIF) can unify best-of-breed architectures.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Thermal vision solutions πŸ•΄



πŸ“– Read

via "Dark Reading: ".
❌ Bluetooth Spoofing Bug Affects Billions of IoT Devices ❌

The 'BLESA' flaw affects the reconnection process that occurs when a device moves back into range after losing or dropping its pairing, Purdue researchers said.

πŸ“– Read

via "Threatpost".
❌ Report Looks at COVID-19’s Massive Impact on Cybersecurity ❌

Cynet's report shares several interesting data points and findings, such as the cyberattack volume change observed in various industry sectors, the increased use of spearphishing as an initial attack vector, and the approaches being used to distribute malware in spearphishing attacks.

πŸ“– Read

via "Threatpost".
πŸ” Expanding threat landscape is biggest concern, cybersecurity analysts tell Gartner πŸ”

Since the COVID-19 pandemic began, IT teams have been trying to keep up with the ever-evolving array of cyberthreats.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybersecurity Bounces Back, but Talent Still Absent πŸ•΄

While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Meet the Computer Scientist Who Helped Push for Paper Ballots πŸ•΄

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi.

πŸ“– Read

via "Dark Reading: ".
❌ DoJ Indicts Two Hackers for Defacing Websites with Pro-Iran Messages ❌

The two hackers allegedly hacked more than 50 websites hosted in the U.S. and vandalized them with pro-Iran messages.

πŸ“– Read

via "Threatpost".
❀1
πŸ•΄ CISA Joins MITRE to Issue Vulnerability Identifiers πŸ•΄

The Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ” My stolen credit card details were used 4,500 miles away. I tried to find out how it happened πŸ”

When cybersecurity reporter Danny Palmer found his card was apparently used on another continent, he set out to discover more.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How did my credit card details get stolen and used half the world away? πŸ”

Cybersecurity reporter Danny Palmer tells Karen Roby what he discovered when he tried to find out how someone in South America attempted to use his bank details.

πŸ“– Read

via "Security on TechRepublic".
❌ DDoS Attacks Skyrocket as Pandemic Bites ❌

More people being online during lockdowns and work-from-home shifts has proven to be lucrative for DDoS-ers.

πŸ“– Read

via "Threatpost".
πŸ•΄ 8 Reasons Perimeter Security Alone Won't Protect Your Crown Jewels πŸ•΄

Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications?

πŸ“– Read

via "Dark Reading: ".
πŸ” How to Comply with Accountability in Data Protection πŸ”

A new framework published by the UK Information Commissioner's Office can help organizations comply with the GDPR's accountability requirements.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2014-10402

An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ US Charges Five Members of China-Linked APT41 for Global Attacks πŸ•΄

The five Chinese nationals are among seven defendants arrested for intrusion campaigns into more than 100 organizations, the DoJ reports.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to Comply with Accountability in Data Protection πŸ”

A new framework published by the UK Information Commissioner's Office can help organizations comply with the GDPR's accountability requirements.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Hackers Continue Cyberattacks Against Vatican, Catholic Orgs ❌

The China-linked threat group RedDelta has continued to launch cyberattacks against Catholic institutions since May 2020 until as recently as last week.

πŸ“– Read

via "Threatpost".
πŸ•΄ Most Organizations Plan to Make COVID-19 Changes Permanent πŸ•΄

After the pandemic, companies will continue to invest in improving IT infrastructure and security as well as automate tasks to reduce errors and improve network resiliency.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ h2c Smuggling: A New 'Devastating' Kind of HTTP Request Smuggling πŸ•΄

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, say researchers. Here's what infosec pros should know.

πŸ“– Read

via "Dark Reading: ".