πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Microsoft Issues Multiple Critical Patches for Edge Browser ❌

Microsoft January Patch Tuesday roundup includes four critical patches for its Edge browser.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Shipping Firms Speared with Targeted β€˜Whaling’ Attacks ❌

Bad actors are imitating high-level executives in the shipping industry to launch BEC attacks that could lead to credential theft or worse - system compromise.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Phishing and spearphishing: A cheat sheet for business professionals πŸ”

When criminals use technology to propagate social engineering attacks, securing your organization can become complicated. Here's what you need to know about phishing and spearphishing.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Remote Code Execution Bugs Are Primary Focus of January Patch Tuesday πŸ•΄

This month's security update includes seven patches ranked Critical and one publicly known vulnerability.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New 'Crypto Dusting' Attack Gives Cash, Takes Reputation πŸ•΄

This new form of crypto wallet fraud enlists unwary consumers and companies to help defeat anti-money laundering methods for law enforcement and regulators.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-10735

In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.

πŸ“– Read

via "National Vulnerability Database".
⚠ Politicians who block social media users are violating First Amendment ⚠

The difference between a personal vs. an official social media account was at the crux of the case decided on Monday.

πŸ“– Read

via "Naked Security".
⚠ How to share photos – without using Facebook ⚠

There are other options for photo sharing that don't hand over every pixel to the Facebook megamind.

πŸ“– Read

via "Naked Security".
⚠ Zerodium’s waving fatter payouts for zero-day bug hunters ⚠

Any chance we could appeal to your conscience and integrity and put in a call for ethical disclosure?

πŸ“– Read

via "Naked Security".
⚠ Some Android apps are secretly sharing your data with Facebook ⚠

Apps have been secretly sharing usage data with Facebook, even when users are logged - or don’t have an account at all.

πŸ“– Read

via "Naked Security".
⚠ IoT weaknesses leave hot tub owners in deep water ⚠

It looks as if at least one hot tub maker has left robust security off the to-do list.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Ways to Beat Back BEC Attacks πŸ•΄

Don't assume your employees know how to spot business email compromises - they need some strong training and guidance on how to respond in the event of an attack.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security at the Speed of DevOps: Maturity, Orchestration, and Detection πŸ•΄

Container and microservices technologies, including the orchestrator Kubernetes, create an extraordinary opportunity to build infrastructure and applications that are secure by design.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Magecart Mayhem Continues in OXO Breach πŸ•΄

The home goods company confirmed users' data may have been compromised during multiple time frames over a two-year period.

πŸ“– Read

via "Dark Reading: ".
❌ Intel Patches High-Severity Privilege-Escalation Bugs ❌

Overall, the chip giant patched five vulnerabilities across an array of its products.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” WordPress users beware: These 10 plugins are most vulnerable to attacks πŸ”

WordPress vulnerabilities tripled over the past year, more than any other CMS, according to an Imperva report.

πŸ“– Read

via "Security on TechRepublic".
❌ The Promise and Peril of 5G ❌

As the hype at CES demonstrates, 5G is the newest and shiniest tech bauble out there: but security concerns loom.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Biometrics in 2019: Increased Security or New Attack Vector? ❌

Should we pump the brakes on the roll out of biometric security to first consider whether we are creating new vulnerabilities?

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ ThreatList: WordPress Vulnerabilities Tripled in 2018 ❌

Despite fewer plugins being added to Wordpress last year, the CMS saw an astounding tripling of vulnerabilities in its platform in 2018.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 3 basic things to know about your data, according to Xerox's CISO πŸ”

Dan Patterson interviews Xerox CISO Alissa Abdullah about protecting sensitive data from adversaries. They also discuss the recent Marriott hack, privacy, ransomware, machine learning, and IoT.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cutting Through the Jargon of AI & ML: 5 Key Issues πŸ•΄

Ask the tough questions before you invest in artificial intelligence and machine learning technology. The security of your enterprise depends on it.

πŸ“– Read

via "Dark Reading: ".