πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Those are NOT your grandchildren! FTC warns of new scam ⚠

Grandkid imposters are managing to finagle a skyrocketing amount of money out of people, the FTC warns.

πŸ“– Read

via "Naked Security".
⚠ Kubernetes cloud computing bug could rain data for attackers ⚠

Kubernetes, a tool that powers much modern native cloud infrastructure, just got its first big security bug - and it’s a mammoth one.

πŸ“– Read

via "Naked Security".
⚠ Quora.com admits data breach affecting 100 million accounts ⚠

Hackers have compromised data from the accounts of 100 million users of question and answer site Quora.com.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Ways to Strengthen Your GDPR Compliance Efforts πŸ•΄

Companies have some mistaken notions about how to comply with the new data protection and privacy regulation - and that could cost them.

πŸ“– Read

via "Dark Reading: ".
πŸ” 3 ways to kick-start your organization's cybersecurity training πŸ”

Only 45% of organizations offer mandatory cybersecurity training, according to a Mimecast report. Here's how to boost your employees' security education.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 70% of businesses using bots to boost efficiency, only 5% govern their access to data πŸ”

As software bots spread throughout the enterprise, business leaders must control their access to sensitive information, according to a SailPoint report.

πŸ“– Read

via "Security on TechRepublic".
❌ Adobe Patches Zero-Day Vulnerability in Flash Player ❌

The vulnerability could lead to arbitrary code execution.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 5 ways to avoid cyberattacks during holiday travel πŸ”

Whether traveling for business or the holidays this month, follow these tips from Matrix Integration to keep your devices safe.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Case for a Human Security Officer πŸ•΄

Wanted: a security exec responsible for identifying and mitigating the attack vectors and vulnerabilities specifically targeting and involving people.

πŸ“– Read

via "Dark Reading: ".
❌ Kubernetes Flaw is a β€œHuge Deal,” Lays Open Cloud Deployments ❌

Hackers can steal data, sabotage cloud deployments and more.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Adobe Flash Zero-Day Leveraged Via Office Docs in Campaign ❌

Adobe issued a patch for the zero-day on Wednesday.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Republican Committee Email Hacked During Midterms πŸ•΄

The National Republican Congressional Committee detected the compromise of four staffers' email accounts in April.

πŸ“– Read

via "Dark Reading: ".
πŸ” Symantec develops neural network to thwart cyberattack-induced blackouts πŸ”

The company is rolling out a device that scans for malware on USB devices to block attacks on IoT and operational technology environments.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Former Estonian Foreign Minister Urges Cooperation in Cyberattack Attribution, Policy πŸ•΄

Nations must band together to face nation-state cyberattack threats, said Marina Kaljurand.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google Cloud Security Command Center Now in Beta πŸ•΄

The beta release of Google Cloud SCC will include broader coverage across the cloud platform and more granular access controls, among other features.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-1622

IBM QRadar SIEM 7.2.8 and 7.3 does not validate, or incorrectly validates, a certificate. This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. IBM X-force ID: 133120.

πŸ“– Read

via "National Vulnerability Database".
❌ White House Facial Recognition Pilot Raises Privacy Alarms ❌

The facial recognition pilot will identify β€œsubjects of interest" around the White House.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ A Shift from Cybersecurity to Cyber Resilience: 6 Steps πŸ•΄

Getting to cyber resilience means federal agencies must think differently about how they build and implement their systems. Here's where to begin.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Starwood Breach Reaction Focuses on 4-Year Dwell πŸ•΄

The unusually long dwell time in the Starwood breach has implications for both parent company Marriott International and the companies watching to learn from.

πŸ“– Read

via "Dark Reading: ".