πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Hijacked Nest cam broadcasts bogus warning about incoming missiles ⚠

A hacked Nest camera broadcast the fake warning about incoming North Korean missiles, sending a family into β€œfive minutes of sheer terror.”

πŸ“– Read

via "Naked Security".
⚠ Google fined $57m for data protection violations ⚠

In a landmark ruling, France’s data protection commissioner has fined Google 50 million Euros (around $57m) for violating Europe’s privacy laws.

πŸ“– Read

via "Naked Security".
❌ RogueRobin Malware Uses Google Drive as C2 Channel ❌

The RogueRobin uses a mix of novel techniques.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Microsoft Windows RCE Flaw Gets Temporary Micropatch ❌

0patch released the fix for the remote code execution vulnerability in Windows, which has a CVSS score of 7.8.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ PewDiePie-spammers and whale-flingers exploit hole in Atlas game ⚠

Last week hackers allegedly compromised an admin’s Steam account and used it to spawn planes, tanks, and whales in Atlas.

πŸ“– Read

via "Naked Security".
⚠ 100 million online bets exposed by leaky database ⚠

Online gamblers lose their private data as yet another unsecured Elasticsearch database is discovered.

πŸ“– Read

via "Naked Security".
⚠ Ep. 016 – Email fraud, Android apps, Collection #1 and the 10 year challenge [PODCAST] ⚠

Here's the latest Naked Security podcast. Enjoy!

πŸ“– Read

via "Naked Security".
πŸ” Trojan malware is back and it's the biggest hacking threat to your business πŸ”

Old school but effective, hackers are shifting aware from in-your-face ransomware to attacks that are much more subtle.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Discover New Tools for Network Testing & Defense at Black Hat Asia πŸ•΄

Find yourself some of the latest and most exciting cybersecurity tools at the Arsenal, where you can meet and chat with their creators.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Enterprise Malware Detections Up 79% as Attackers Refocus πŸ•΄

A new report on the state of malware shows a spike in B2B malware, with former banking Trojans Emotet and TrickBot topping the list.

πŸ“– Read

via "Dark Reading: ".
πŸ” Hackers impersonate these 10 brands the most in phishing attacks πŸ”

Phishers often spoof major tech brands in their efforts to gain payments from individuals and businesses, according to a Vade Secure report.

πŸ“– Read

via "Security on TechRepublic".
❌ U.S. Gov Issues Urgent Warning of DNS Hijacking Attacks ❌

An emergency directive from the Department of Homeland Security provides "required actions" for U.S. government agencies to prevent widespread DNS hijacking attacks.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” How to authenticate a Linux client with LDAP server πŸ”

If you've ever wanted to authenticate a Linux desktop to an OpenLDAP server, here's how it's done.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to authenticate a Linux client with LDAP server πŸ”

With OpenLDAP, you can manage users on a centralized directory server and then configure each desktop to authenticate to that server.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Think Twice Before Paying a Ransom πŸ•΄

Why stockpiling cryptocurrency or paying cybercriminals is not the best response.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybercriminals Home in on Ultra-High Net Worth Individuals πŸ•΄

Research shows that better corporate security has resulted in some hackers shifting their sights to the estates and businesses of wealthy families.

πŸ“– Read

via "Dark Reading: ".
πŸ” Security is the no. 1 IT barrier to cloud and SaaS adoption πŸ”

More than 70% of tech professionals said security spending has increased in the past year, according to a Ping Identity report.

πŸ“– Read

via "Security on TechRepublic".
❌ β€˜Chaos’ iPhone X Attack Alleges Remote Jailbreak ❌

The attack makes use of previously disclosed critical vulnerabilities in the Apple Safari web browser and iOS.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” How to Lock a User Account After X Number of Incorrect Logins on Cent OS 7 πŸ”

Jack Wallen shows you how to lock out users after failed login attempts in CentOS 7.

πŸ“– Read

via "Security on TechRepublic".
❌ 6 Signs of Successful Threat Hunting ❌

Here are six tips to put threat hunters in the driver's seat so they can outsmart their adversaries.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Modular Anatova ransomware encrypts data as quickly as possible before detection πŸ”

The new malware is being propagated on P2P networks, and demands a ransom equivalent to $725 USD, according to McAfee Labs.

πŸ“– Read

via "Security on TechRepublic".