πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Adobe Flash Zero-Day Spreads via Office Docs πŸ•΄

Adobe has patched a zero-day in its Flash player after attackers leveraged the exploit in an active campaign.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Kubernetes Vulnerability Hits Top of Severity Scale πŸ•΄

The security issue strikes at some of the basic reasons for the rising popularity of containers as an architecture and Kubernetes as an orchestration mechanism.

πŸ“– Read

via "Dark Reading: ".
⚠ Hacker-besieged DNA data tucked away under military care ⚠

Genomics England announced it's sequenced 100K Brits' genomes... and then had to store them in a military base after multiple hacking attacks.

πŸ“– Read

via "Naked Security".
⚠ Unencrypted medical data leads to 12-state litigation ⚠

The Attorneys general of 12 states are suing an e-record provider who lost 3.9 million personal healthcare records in 2015.

πŸ“– Read

via "Naked Security".
⚠ Kids’ VTech tablets vulnerable to eavesdropping hackers ⚠

Attackers can boobytrap what should be access to only parent-vetted sites and can take over the webcam, speakers and microphone.

πŸ“– Read

via "Naked Security".
⚠ Flash zero-day exploit spotted – patch now! ⚠

If you’re among the holdouts still running Flash, you have some more updating homework to do.

πŸ“– Read

via "Naked Security".
πŸ” 10 tips to combat phishing via social media platforms πŸ”

Social media platforms are just as susceptible to phishing attempts as email. Learn some strategies to protect yourself and your users from such attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 22 Android click fraud apps with 2M+ downloads removed from Google Play Store πŸ”

Fraudulent apps rely on a backdoor opened to receive instructions from a command and control server, opening users to greater potential harm.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Calls For Facial Recognition Tech Regulation ❌

Microsoft and the AI Now Institute are both calling for regulation as facial recognition software picks up popularity.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 7 tips for CXOs to combat cybersecurity risks in 2019 and beyond πŸ”

This year alone saw more than 600 data breaches, yet only 25% of organizations are planning to defend against attacks, according to Deloitte.

πŸ“– Read

via "Security on TechRepublic".
❌ Using Fuzzing to Mine for Zero-Days ❌

Infosec Insider Derek Manky discusses how new technologies and economic models are facilitating fuzzing in today's security landscape.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Insider Threats & Insider Objections πŸ•΄

The 'tyranny of the urgent' and three other reasons why it's hard for CISOs to establish a robust insider threat prevention program.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Kubernetes Deployments Around the World Show Vulnerabilities πŸ•΄

Kubernetes owners who expose APIs to the Internet are leaving their systems open to hackers.

πŸ“– Read

via "Dark Reading: ".
❌ TA505 Crooks are Now Targeting US Retailers with Personalized Campaigns ❌

Threat group moves away from β€œsmash-and-grab” attacks and adopts a boutique approach to targeting victims.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Top 5 features smart homes still need πŸ”

Tom Merritt explains five ways smart home technology is evolving.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 ways smart homes are getting smarter πŸ”

Tom Merritt explains five ways smart home technology is evolving.

πŸ“– Read

via "Security on TechRepublic".
❌ Australia Anti-Encryption Law Triggers Sweeping Backlash ❌

A newly-passed Australian law could allow the government to force tech companies to create backdoors in their products.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Iranian Nationals Charged for Atlanta Ransomware Attack πŸ•΄

The March attack used SamSam ransomware to infect 3,789 computers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Simplify Everything': Google Talks Container Security in 2019 πŸ•΄

Google Cloud's container security lead shares predictions, best practices, and what's top of mind for customers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Criminals Use Locally Connected Devices to Attack, Loot Banks πŸ•΄

Tens of millions of dollars stolen from at least eight banks in East Europe, Kasperksy Lab says.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Gift Card-Themed BEC Holiday Scams Spike ❌

Watch out for emails about gift cards and corporate donations, researcher warn.

πŸ“– Read

via "Threatpost | The first stop for security news".