πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Palo Alto Networks to Buy Demisto for $560M πŸ•΄

This marks Palo Alto Networks' latest acquisition and its first of 2019.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Tax Season Tips for Security Pros πŸ•΄

Here are some practical ways to ensure your company's safety as Uncle Sam comes calling.

πŸ“– Read

via "Dark Reading: ".
⚠ Facebook flaw could have allowed an attacker to hijack accounts ⚠

The CSRF bypass flaw has now been fixed, and the researcher who discovered it has netted $25,000.

πŸ“– Read

via "Naked Security".
πŸ•΄ Breach in Stanford System Exposes Student Records πŸ•΄

A wide variety of data was visible through the vulnerability.

πŸ“– Read

via "Dark Reading: ".
❌ ATM Jackpotting Malware Hones Its Heist Tools ❌

The WinPot malware takes its cues from slot machines.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ New GandCrab Decryptor Unlocks Files of Updated Ransomware ❌

This is the third update to the prolific GandCrab malware within the past year.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Making the Case for a Cybersecurity Moon Shot πŸ•΄

There are severe and unsolved problems in our industry that justify a sustained effort and substantial investment. It's worth picking one.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 19 Minutes to Escalation: Russian Hackers Move the Fastest πŸ•΄

New data from CrowdStrike's incident investigations in 2018 uncover just how quickly nation-state hackers from Russia, North Korea, China, and Iran pivot from patient zero in a target organization.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: APT Adversaries Up the Ante on Speed, Target Telecom ❌

Russia-linked actors need just 18 minutes to go from compromise to lateral movement.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Microsoft to Kill Updates for Legacy OS Using SHA-1 ❌

Windows 7 and Windows Server 2008 users are being asked to upgrade their encryption support.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Google Research: No Simple Fix For Spectre-Class Vulnerabilities πŸ•΄

Chip makers' focus on performance has left microprocessors open to numerous side-channel attacks that cannot be fixed by software updates - only by hard choices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ North Korea's Lazarus Group Targets Russian Companies For First Time πŸ•΄

In an unusual development, the group known for its attacks against companies in countries viewed as geopolitical foes is now going after companies in a country considered an ally, Check Point Software says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Formjacking' Compromises 4,800 Sites Per Month. Could Yours Be One? πŸ•΄

Cybercriminals see formjacking as a simple opportunity to take advantage of online retailers - and all they need is a small piece of JavaScript.

πŸ“– Read

via "Dark Reading: ".
⚠ Google’s working on stopping sites from blocking Incognito mode ⚠

Google Chrome's Incognito mode hasn't been an impenetrable privacy shield: For years, it's been a snap for web developers to detect when Chrome users are browsing in private mode and to block site visitors who use it. Now it looks like Google plans to close that loophole.

πŸ“– Read

via "Naked Security".
⚠ Hackers unleash social media worm after bug report ignored ⚠

Is it ok to launch a benign proof of concept that you know will go wide, to bring a flaw to people's attention, or should you stay quiet?

πŸ“– Read

via "Naked Security".
⚠ Facebook tracks users it thinks may harm its employees ⚠

Threat makers are sometimes geolocated to determine how credible their threats are, as in, are they near enough to really attack?

πŸ“– Read

via "Naked Security".
⚠ Ep. 020 – Leaky containers, careless coders and risky USB cables [PODCAST] ⚠

Here's the latest Naked Security podcast... enjoy!

πŸ“– Read

via "Naked Security".
πŸ•΄ Prep for The Next Cybersecurity Arms Race at Black Hat Asia πŸ•΄

Don't miss out on some of the world-class Briefings and Trainings on offer for cybersecurity professionals concerned about the most pressing threats of 2019.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to help CISOs understand their role in cloud security πŸ”

Some 90% of CISOs are confused about their role in securing a SaaS environment, according to an Oracle and KPMG report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Anatomy of a Lazy Phish πŸ•΄

A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft: Russia’s Fancy Bear Working to Influence EU Elections ❌

As hundreds of millions of Europeans prepare to go to the polls in May, Fancy Bear ramps up cyber-espionage and disinformation efforts.

πŸ“– Read

via "Threatpost | The first stop for security news".