πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ New Phishing Campaign Hits With Triple Threat πŸ•΄

Attack threatens victims with three "deadly malware" infestations if they don't give up critical email account credentials.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Phishing Campaign Packs Triple Threat πŸ•΄

Attack threatens victims with three "deadly malware" infestations if they don't give up critical email account credentials.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to integrate SSH key authentication into KeePassXC πŸ”

Make using SSH key authentication a snap with the new ssh-agent feature found in KeePassXC.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Collateral Damage: When Cyberwarfare Targets Civilian Data πŸ•΄

You can call it collateral damage. You can call it trickledown cyberwarfare. Either way, foreign hacker armies are targeting civilian enterprises - as a means of attacking rival government targets.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Database of 24 Million Mortgage, Loan Records Left Exposed Online πŸ•΄

Breach latest example of how misconfigurations, human errors undermine security in a big way, experts say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyberattackers Bait Financial Firms with Google Cloud Platform πŸ•΄

A new wave of attacks abuses the Google Cloud Platform URL redirection in PDF decoys, sending users to a malicious link.

πŸ“– Read

via "Dark Reading: ".
❌ Fighting Fire with Fire: API Automation Risks ❌

A look at API attack trends such as the current (and failing) architectural designs for addressing security of these API transactions.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Cisco Study Finds Fewer Data Breaches at GDPR-Ready Firms πŸ•΄

Many organizations find that getting their data privacy house in order is paying off.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-18359

PostGIS 2.x before 2.3.3, as used with PostgreSQL, allows remote attackers to cause a denial of service via crafted ST_AsX3D function input, as demonstrated by an abnormal server termination for "SELECT ST_AsX3D('LINESTRING EMPTY');" because empty geometries are mishandled.

πŸ“– Read

via "National Vulnerability Database".
⚠ Facebook debuts scam ads reporting tool ⚠

Adverts on Facebook featuring fake celebrity endorsements scam people out of their savings, and Facebook is now doing something about it.

πŸ“– Read

via "Naked Security".
⚠ Cops catch $15m crypto-crook ⚠

A man has been arrested a year after stealing €10m ($15m) of the IoT-focused cryptocurrency IOTA using bogus software that tricked users.

πŸ“– Read

via "Naked Security".
⚠ US gov declares emergency after wave of domain hijacking attacks ⚠

The US Department of Homeland Security (DHS) has issued an emergency directive tightening DNS security after a recent wave of domain hijacking attacks targeting government websites.

πŸ“– Read

via "Naked Security".
⚠ Fighting Emotet: lessons from the front line ⚠

Emotet is moving, shape-shifting target for admins and their security software. Here's what we've learned from dealing with outbreaks.

πŸ“– Read

via "Naked Security".
πŸ” 7 bug bounty myths, busted πŸ”

Interest in bug bounty programs is exploding, as companies look to crowdsourcing to combat hackers. But several misconceptions remain.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-18332 (mdm9607_firmware, mdm9635m_firmware, mdm9640_firmware, mdm9645_firmware, mdm9650_firmware, mdm9655_firmware, msm8909w_firmware, msm8996au_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_425_firmware, sd_430_firmware, sd_450_firmware, sd_625_firmware, sd_650_firmware, sd_652_firmware, sd_670_firmware, sd_710_firmware, sd_712_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sda660_firmware, sdx20_firmware, sxr1130_firmware)

Security keys are logged when any WCDMA call is configured or reconfigured in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDX20, SXR1130

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The 5 Stages of CISO Success, Past & Future πŸ•΄

In cybersecurity, as in history, security leaders who forget the lessons of the past will be doomed to repeat them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Credential Compromises By the Numbers πŸ•΄

Recent statistics show just how much credential stealing has become a staple in the attacker playbook.

πŸ“– Read

via "Dark Reading: ".
❌ Razy Malware Attacks Browser Extensions to Steal Cryptocurrency ❌

The malware targets victims in multiple, sneaky ways as they move around the web.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Satya Nadella: Privacy Is a Human Right πŸ•΄

In a talk at the World Economic Forum, Microsoft's CEO voiced support for GDPR and expressed hope the United States creates a similar approach to privacy.

πŸ“– Read

via "Dark Reading: ".