πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Update now! Apple releases first 2019 iOS and macOS patches ⚠

Apple has issued its January security updates fixing a list of mostly shared CVE flaws affecting iOS and macOS with a smattering for Safari, watchOS, tvOS, and iCloud for Windows.

πŸ“– Read

via "Naked Security".
πŸ” 3 enterprise cybersecurity trends CISOs must pay attention to πŸ”

With the CISO at the table, organizations must focus on products, processes, and people to stay secure, according to the executive director of the National Cyber Security Alliance.

πŸ“– Read

via "Security on TechRepublic".
⚠ How to stop a hacker home invasion! [VIDEO] ⚠

Did you see the story about the US family whose Nest camera "warned" them of an impending nuclear attack? Here's how to keep hackers out...

πŸ“– Read

via "Naked Security".
⚠ Supreme Court won’t consider case against defamatory reviews on Yelp ⚠

The decision means Yelp, and other platforms, are still protected from liability for user-submitted content under the CDA's Section 230.

πŸ“– Read

via "Naked Security".
⚠ Bomb threat spam may stem from GoDaddy DNS weakness ⚠

A bomb threat spam campaign that hit North America last month may have been engineered using a flaw in GoDaddy’s domain management process, it was revealed this week.

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Asia Offers New IoT Security Tools & Tricks πŸ•΄

Come to Black Hat Asia in March for an expert look at what's happening in the world of Internet of Things, and what you can do to secure it.

πŸ“– Read

via "Dark Reading: ".
πŸ” Photos: The top 10 computer security applications of 2019 πŸ”

These apps will help keep your enterprise safe from malware and other cybersecurity threats.

πŸ“– Read

via "Security on TechRepublic".
❌ Bit-and-Piece DDoS Method Emerges to Torment ISPs ❌

Perpetrators are using smaller, bit-and-piece methods to inject junk into legitimate traffic, causing attacks to bypass detection rather than sounding alarms with large, obvious attack spikes.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” IoT credential compromise attacks open your devices up to spying πŸ”

Security updates for the lifespan of a given device are critical to protecting your connected device against hackers, according to a Barracuda report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Rise of multicloud: 58% of businesses using combination of AWS, Azure, or Google Cloud πŸ”

Multicloud is much more popular than hybrid cloud, with only 33% of professionals using a hybrid model, according to a Kentik report.

πŸ“– Read

via "Security on TechRepublic".
❌ ThreatList: Credential-Sniffing Phishing Attacks Erupted in 2018 ❌

Credential compromise emerged the main target for phishing campaigns in 2018 - rather than infecting victims' devices with malware.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Cloud Customers Faced 681M Cyberattacks in 2018 πŸ•΄

The most common attacks involved software vulnerabilities, stolen credentials, Web applications, and IoT devices.

πŸ“– Read

via "Dark Reading: ".
πŸ” Hackers are still using cloud services to mask attack origin and build false trust πŸ”

Using Google App Engine to mask the destination of links is a staggeringly easy way to conduct a phishing campaign, but Google claims it is not their problem.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Phishing Campaign Hits With Triple Threat πŸ•΄

Attack threatens victims with three "deadly malware" infestations if they don't give up critical email account credentials.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Phishing Campaign Packs Triple Threat πŸ•΄

Attack threatens victims with three "deadly malware" infestations if they don't give up critical email account credentials.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to integrate SSH key authentication into KeePassXC πŸ”

Make using SSH key authentication a snap with the new ssh-agent feature found in KeePassXC.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Collateral Damage: When Cyberwarfare Targets Civilian Data πŸ•΄

You can call it collateral damage. You can call it trickledown cyberwarfare. Either way, foreign hacker armies are targeting civilian enterprises - as a means of attacking rival government targets.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Database of 24 Million Mortgage, Loan Records Left Exposed Online πŸ•΄

Breach latest example of how misconfigurations, human errors undermine security in a big way, experts say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyberattackers Bait Financial Firms with Google Cloud Platform πŸ•΄

A new wave of attacks abuses the Google Cloud Platform URL redirection in PDF decoys, sending users to a malicious link.

πŸ“– Read

via "Dark Reading: ".
❌ Fighting Fire with Fire: API Automation Risks ❌

A look at API attack trends such as the current (and failing) architectural designs for addressing security of these API transactions.

πŸ“– Read

via "Threatpost | The first stop for security news".