πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 53 Bugs in 50 Days: Researchers Fuzz Adobe Reader πŸ•΄

Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.

πŸ“– Read

via "Dark Reading: ".
❌ Twitter Draws Data Privacy Concerns with Two New Bugs ❌

The two flaws shed light on heightened concern around user data privacy when it comes to data.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow πŸ•΄

As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyber Readiness Institute Launches New Program for SMBs πŸ•΄

Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Ballistic Missile Defense System Rife with Security Holes ❌

Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Sneaky phishing campaign beats two-factor authentication ⚠

Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesn’t mean every method for doing this is equally secure.

πŸ“– Read

via "Naked Security".
⚠ Twitter fixes bug that lets unauthorized apps get access to DMs ⚠

"You authorise it - whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!" said the researcher.

πŸ“– Read

via "Naked Security".
⚠ Logitech flaw fixed after Project Zero disclosure ⚠

The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.

πŸ“– Read

via "Naked Security".
⚠ Facebook photo API bug exposed users’ unpublished photos ⚠

It affected up to 6.8 million users and up to 1,500 apps. β€œWe're sorry this happened,” said Facebook with what must be acute apology fatigue.

πŸ“– Read

via "Naked Security".
πŸ•΄ 8 Security Tips to Gift Your Loved Ones For the Holidays πŸ•΄

Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.

πŸ“– Read

via "Dark Reading: ".
❌ Newsmaker Interview: Troy Mursch on Top Botnet Trends ❌

MikroTik, Hadoop clusters, legislation and more will mark the botnet space in 2019.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Why 2019 will introduce stricter privacy regulation πŸ”

Privacy regulation is a complex topic with ever-changing parameters and requirements. Read some predictions for what's coming in 2019.

πŸ“– Read

via "Security on TechRepublic".
❌ WSJ Webpage Defaced to Support PewDiePie ❌

The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Why cryptojacking will become an even larger problem in 2019 πŸ”

Cryptojacking was the runaway security problem in 2018, damaging devices in cybercriminals' pursuit of profits. As cryptocurrency prices fall, 2019 could see more attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How to Engage Your Cyber Enemies πŸ•΄

Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.

πŸ“– Read

via "Dark Reading: ".
❌ Hidden Code in Memes Instruct Malware via Twitter ❌

Analysts discover malicious code embedded in tweeted images.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ WordPress Targeted with Clever SEO Injection Malware ❌

The malware does its best to obfuscate SEO injection in WordPress and evade notice from web admins.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Cryptographic Erasure: Moving Beyond Hard Drive Destruction πŸ•΄

In the good old days, incinerating backup tapes or shredding a few hard drives would have solved the problem. Today, we have a bigger challenge.

πŸ“– Read

via "Dark Reading: ".
⚠ After SamSam, Ryuk shows targeted ransomware is still evolving ⚠

Devastating, targeted ransomware attacks didn't start with SamSam and they didn't end with it either.

πŸ“– Read

via "Naked Security".
πŸ•΄ Trend Micro Finds Major Flaws in HolaVPN πŸ•΄

A popular free VPN is found to have a very high cost for users.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Twitter Hack May Have State-Sponsored Ties πŸ•΄

A data leak was disclosed after attackers targeted a support form, which had "unusual activity."

πŸ“– Read

via "Dark Reading: ".