πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ US Petroleum Employee Charged with Stealing Trade Secrets for Chinese Firm πŸ•΄

Longtime US resident allegedly stole information for petroleum firm in China that had offered him a position.

πŸ“– Read

via "Dark Reading: ".
❌ First-Ever UEFI Rootkit Tied to Sednit APT ❌

Researcher at ESET outlines research on the first successful UEFI rootkit used in the wild.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ How to secure your Twitter account ⚠

There's no need to make it easier for someone who wants to hijack your Twitter account. Here's how to lock it down in just a few minutes.

πŸ“– Read

via "Naked Security".
❌ β€˜Snowden Refugee’ Has No Regrets for Helping Whistleblower ❌

Woman who helped hide Edward Snowden faces uncertain future and says she has no regrets.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ How Facebooks Tracks Non-Users via Android Apps ❌

Facebook tracks Android users via apps, even if they aren’t Facebook users.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ How to secure your Instagram account using 2FA ⚠

It's a good idea to set up multi-factor authentication (2FA) on all your social accounts, so here we explain how to do that for Instagram.

πŸ“– Read

via "Naked Security".
❌ Cryptocurrency Wallet Hacks Spark Dustup ❌

Cryptocurrency wallets Trezor and Ledger are vulnerable to a number of different type attacks, researchers say.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Malware Attack Crippled Production of Major U.S. Newspapers ❌

Reports have linked the attack to the Ryuk ransomware.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” How to recover from cybersecurity incidents: A 5-step plan πŸ”

Cybersecurity prevention is essential, but it is failing miserably. Focus on how to recover from cybersecurity events by following these tips.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use a password manager on your iPhone or iPad πŸ”

You can use a password manager on your iOS device to easily sign into secure websites and mobile apps. Learn how to do so in iOS 12.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The solution to dysfunctional cybersecurity and network teams πŸ”

Learn why it's critical to resolve trust issues and promote collaboration between your cybersecurity and network teams.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How SMBs can minimize damage from ransomware attacks πŸ”

The costs incurred from a ransomware attack can devastate SMBs, but there are ways to minimize the impact.

πŸ“– Read

via "Security on TechRepublic".
❌ Threatlist: Dark Web Markets See an Evolution in Q3 ❌

Vulnerabilities, stolen credentials and an evolution of marketplaces mark the Dark Web in Q3.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ 2019 Malware Trends to Watch ❌

Here are 10 top malware trends to watch for in the New Year.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 25 Years Later: Looking Back at the First Great (Cyber) Bank Heist πŸ•΄

The Citibank hack in 1994 marked a turning point for banking -- and cybercrime -- as we know it. What can we learn from looking back at the past 25 years?

πŸ“– Read

via "Dark Reading: ".
❌ Chrome in Android Leaks Device Fingerprinting Info ❌

Attackers could craft a campaign that makes use of the device profile in order to exploit any vulnerabilities in a targeted fashion.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ EU Offers Bug Bounties For 14 Open Source Projects ❌

As the bug bounty programs begin to roll out in January, security experts worry that the programs miss the mark on truly securing open source projects.

πŸ“– Read

via "Threatpost | The first stop for security news".
<b>&#9000; Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack &#9000;</b>

<code>Cloud hosting provider Dataresolution.net is struggling to bring its systems back online after suffering a ransomware infestation on Christmas Eve, KrebsOnSecurity has learned. The company says its systems were hit by the Ryuk ransomware, the same malware strain that crippled printing and delivery operations for multiple major U.S. newspapers over the weekend.</code><code>San Juan Capistrano, Calif. based Data Resolution LLC serves some 30,000 businesses worldwide, offering software hosting, business continuity systems, cloud computing and data center services.</code><code>The company has not yet responded to requests for comment. But according to a status update shared by Data Resolution with affected customers on Dec. 29, 2018, the attackers broke in through a compromised login account on Christmas Eve and quickly began infecting servers with the Ryuk ransomware strain.</code><code>Media</code><code>Part of an update on the outage shared with Data Resolution customers via Dropbox on Dec. 29, 2018.</code><code>The intrusion gave the attackers control of Data Resolution’s data center domain, briefly locking the company out of its own systems. The update sent to customers states that Data Resolution shut down its network to halt the spread of the infection and to work through the process of cleaning and restoring infected systems.</code><code>Data Resolution is assuring customers that there is no indication any data was stolen, and that the purpose of the attack was to extract payment from the company in exchange for a digital key that could be used to quickly unlock access to servers seized by the ransomware.</code><code>Media</code><code>A snippet of an update that Data Resolution shared with affected customers on Dec. 31, 2018.</code><code>The Ryuk ransomware strain was first detailed in an August 2018 report by security firm CheckPoint, which says the malware is tied to a sophisticated North Korean hacking team known as the Lazarus Group.</code><code>Ryuk reportedly was the same malware that infected the Los Angeles Timesβ€˜ Olympic printing plant over the weekend, an attack that led to the disruption of newspaper printing and delivery services for a number of publications that rely on the plant β€” including the Los Angeles Times and the San Diego Union Tribune.</code><code>A status update shared by Data Resolution with affected customers earlier today indicates the cloud hosting provider is still working to restore email access and multiple databases for clients. The update also said Data Resolution is in the process of restoring service for companies relying on it to host installations of Dynamics GP, a popular software package that many organizations use for accounting and payroll services. </code><code>Media</code><code>A status update shared by Data Resolution with affected customers on Jan. 2, 2018 shows the company is still struggling to restore services more than a week after the attack began.</code><code>Cloud hosting providers are often pitched as a way for companies to increase security and to better protect themselves from threats like ransomware, which scrambles data on infected systems and demands payment in exchange for a digital key needed to unlock affected systems.</code><code>At the same time, cloud providers represent an especially attractive target for ransomware attacks because they store vast amounts of data for other companies. In 2017, cloud hosting provider Cloudnine was hit by a ransomware attack, leading to an outage that lasted for several days.</code><code>Much depends on security practices maintained by each provider, according to an MIT Technology Review story last year that named cloud ransomware attacks as a top security concern for 2018</code><code>β€œThe biggest cloud operators, like Google, Amazon, and IBM, have hired some of the brightest minds in digital security, so they won’t be…
πŸ” The FTC's cyberinsurance tips: A must-read for small business owners πŸ”

Cyberinsurance might be the only way to truly survive a full-blown cyberattack. Before small business owners shop for cyberinsurance, they should check out these guidelines from the FTC.

πŸ“– Read

via "Security on TechRepublic".
❌ Newsmaker Interview: Bruce Schneier on Physical Cyber Threats ❌

Bruce Schneier discusses the clash between critical infrastructure and cyber threats.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ US-CERT Offers Tips for Securing Internet-Connected Holiday Gifts πŸ•΄

Key steps to making those home Internet of Things devices just a bit safer.

πŸ“– Read

via "Dark Reading: ".