πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 2018 Was Second-Most Active Year for Data Breaches πŸ•΄

Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.

πŸ“– Read

via "Dark Reading: ".
⚠ Top tips for Valentine’s Day – and the rest of the year! [VIDEO] ⚠

Our top tips for Valentine's Day and beyond - all in just 5 minutes. Enjoy!

πŸ“– Read

via "Naked Security".
πŸ” Burnout warning: High stress levels impacting CISOs' physical, mental health πŸ”

Increasing pressure, hefty workloads, and budgetary deficits have significant negative effects on CISOs worldwide, according to a Nominet report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Update now! Microsoft and Adobe’s February 2019 Patch Tuesday is here ⚠

Internet Explorer (IE) may have launched way back in 1995 but nearly a quarter of a century later it’s still creating work for Microsoft and Windows users.

πŸ“– Read

via "Naked Security".
⚠ Google paid out $3.4m in bug bounties last year ⚠

317 researchers from 78 countries turned 2018 into a worldwide bug-crunching spree.

πŸ“– Read

via "Naked Security".
⚠ Apple App Store stuffed with hardcore porn and gambling apps ⚠

The apps, which violate content policies, got in there via the same Enterprise Certificate program that Facebook and Google exploited.

πŸ“– Read

via "Naked Security".
❌ Critical OkCupid Flaw Exposes Daters to App Takeovers ❌

The flaw is only one of many romance-related security issues as bad actors take advantage of Valentine's Day.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ What’s behind this 1,000-character phishing URL? ⚠

Bleeping Computer learned of a strange phishing campaign which uses an unusually long URL - but why?

πŸ“– Read

via "Naked Security".
πŸ•΄ Learn New Malware-Fighting Tools & Techniques at Black Hat Asia πŸ•΄

There's no better place to brush up on the latest malware than Black Hat Asia in Singapore next month with a cornucopia of practical Trainings, Briefings, and Arsenal tool demos.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Spills: 9 Problems Causing the Most Stress πŸ•΄

Security practitioners reveal what's causing them the most frustration in their roles.

πŸ“– Read

via "Dark Reading: ".
πŸ” Pirates found abusing Apple Developer Enterprise Program to distribute modified apps πŸ”

Following revelations that Facebook, Google, Amazon, as well as purveyors of illicit content are abusing the Developer Enterprise Program, new reports show pirates are as well. Who's left?

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How to Create a Dream Team for the New Age of Cybersecurity πŸ•΄

When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.

πŸ“– Read

via "Dark Reading: ".
❌ Google Play Cracks Down on Malicious Apps ❌

Google Play said that app suspensions increased by 66 percent in 2018 on its platform.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Inside a GandCrab targeted ransomware attack on a hospital ⚠

A recent attack on a US hospital gives us a colourful picture of both how a targeted ransomware attack happens, and how it can be stopped.

πŸ“– Read

via "Naked Security".
❌ Coffee Meets Bagel Dating App Warns Users of Breach ❌

The dating site said users' names and email addresses that were added to the system prior to May 2018 may be impacted.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security ❌

A Threatpost poll found that 52 percent don't feel prepared to prevent a mobile security incident from happening. The results reflect a challenging mobile security landscape.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Ever-Changing Emotet Evolves Again with Fresh Evasion Tactic ❌

It has added the technique of using malicious XML files as its delivery method.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Top Considerations for Choosing a Managed Detection & Response Provider πŸ”

A panel of data security experts discuss the the top considerations for choosing a Managed Detection & Response provider, including scale, technology, experience, and cost.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Diversity Is Vital to Advance Security πŸ•΄

Meet five female security experts who are helping to move our industry further than ever before.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Professional Development Institute Aims to Combat Cybersecurity Skills Shortage πŸ•΄

The (ISC)2 announces a new institute for working cybersecurity professionals to continue their education.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Coffee Meets Bagel Confirms Hack on Valentine's Day πŸ•΄

The dating app says users' account data may have been obtained by an unauthorized party.

πŸ“– Read

via "Dark Reading: ".