πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Firefox makes it easier for users to dodge ad-trackers ⚠

Firefox has introduced a new set of controls to make it easier for privacy-conscious users to protect themselves from online ad trackers.

πŸ“– Read

via "Naked Security".
⚠ Privilege escalation vulnerability uncovered in Microsoft Exchange ⚠

A researcher has discovered an alarming way that an attacker controlling a Microsoft Exchange mailbox account could potentially elevate their privileges to become a Domain Administrator.

πŸ“– Read

via "Naked Security".
πŸ” Facebook slammed over covert app that pays teenagers for data πŸ”

The Facebook Research app pays teenagers $20 for extensive access to their phone and web activity.

πŸ“– Read

via "Security on TechRepublic".
⚠ Sophos Home’s been updated, and it’s got some cool new features ⚠

There’s a new version of Sophos Home out today, and it comes with a whole host of new features.

πŸ“– Read

via "Naked Security".
⚠ Matrix under the microscope: what a niche ransomware can teach us ⚠

The malware middle ground is full of journeymen, wallflowers and also-rans that'll bite you hard, if you let them.

πŸ“– Read

via "Naked Security".
πŸ” New DDoS campaign serving four times the number of packets as 2018's major GitHub attack πŸ”

The potency of DDoS attacks lies in the number of packets being sent rather than the relative bandwidth involved in the attack.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why you should use a Managed Security Service Provider instead of in-house security πŸ”

​MSSPs provide flexibility, expertise, and efficiencies in scale. Learn about more advantages below.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Open Source & Machine Learning: A Dynamic Duo πŸ•΄

If machine learning can be demonstrated to solve particular use cases in an open forum, more analysts will be willing to adopt the technology in their workflows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Access Control Lists: 6 Key Principals to Keep in Mind πŸ•΄

Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come.before adding them to the toolbox.

πŸ“– Read

via "Dark Reading: ".
❌ Apple Blasts Facebook Over Data-Sucking β€˜Research’ App ❌

Another one of Facebook's apps has been banned from Apple's ecosystem due to the level of data that it collects and how it was distributed.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Centrally manage account security by joining ESXi hosts to Active Directory πŸ”

VMware host servers require advanced software to manage them en masse. Admins can restrict access using AD services to authenticate and manage user account security.

πŸ“– Read

via "Security on TechRepublic".
❌ Stealthy Malware Disguises Itself as a WordPress License Key ❌

A spam injector hides in plain site within WordPress theme files.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Discover Issues New Cards Following Data Breach πŸ•΄

The credit card company reports Discover's card systems were not involved in the breach, discovered in August 2018.

πŸ“– Read

via "Dark Reading: ".
⚠ Ep. 017 – DNS hijacking, a weird breach and a cybersecurity confession [PODCAST] ⚠

Here's the latest Naked Security podcast - enjoy!

πŸ“– Read

via "Naked Security".
πŸ” Apple revokes Facebook's ability to deploy apps internally amid privacy scandal dispute πŸ”

Facebook allegedly violated Apple's developer policy by operating a "focus group" paying users $20/month to agree to activity monitoring, and is now paying the price.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Access Control Lists: 6 Key Principals to Keep in Mind πŸ•΄

Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come.before adding them to the toolbox.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Yes, You Can Patch Stupid πŸ•΄

Before you start calling users stupid, remember that behind every stupid user is a stupider security professional.

πŸ“– Read

via "Dark Reading: ".
❌ Attackers Can Track Kids’ Locations via Connected Watches ❌

A severe flaw exposes sensitive information for 35,000 kids and 20,000 individual accounts.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Massive DDoS Attack Generates 500 Million Packets per Second πŸ•΄

January 10 torrent involved nearly four times as many packets as last year's huge attack on GitHub, says Imperva.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Rubrik Data Leak is Another Cloud Misconfiguration Horror Story πŸ•΄

A server security mishap exposed vast stores of data belonging to clients of Rubrik, a security and cloud management firm.

πŸ“– Read

via "Dark Reading: ".