πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Highly Critical Drupal RCE Flaw Affects Millions of Websites ❌

Admins should update immediately to fix a remote code-execution vulnerability.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” How to regenerate certificates on VMware host servers πŸ”

Regenerating certificates may securely resolve authentication traffic, which is not being properly encrypted.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to set the AppArmor mode for a service in Ubuntu Server πŸ”

If you work with a service outside of its standard behavior, you may need to change its AppArmor profile mode.

πŸ“– Read

via "Security on TechRepublic".
❌ Adobe Re-Patches Critical Acrobat Reader Flaw ❌

Adobe has issued yet another patch for a critical vulnerability in its Acrobat Reader - a week after the original fix.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Cyber Extortionists Can Earn $360,000 a Year πŸ•΄

Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Free Tool Scans for Chrome Extension Safety πŸ•΄

CRXcavator scans extensions in real time based on factors including permissions, external calls, and third-party libraries.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Porn-Focused Malware Triples, Dark Web Loves It ❌

Premium-access credentials to porn sites are hot in the cyber-underground, as credential-harvesting malware proliferates.

πŸ“– Read

via "Threatpost | The first stop for security news".
ATENTIONβ€Ό New - CVE-2013-5654 (yingzhipython)

Vulnerability in YingZhi Python Programming Language v1.9 allows arbitrary anonymous uploads to the phone's storage

πŸ“– Read

via "National Vulnerability Database".
πŸ” Cybersecurity Higher Education: The Top Cybersecurity Colleges and Degrees in 2019 πŸ”

Top higher education institutions around the world are offering cybersecurity degrees and research programs for information security professionals looking to further their careers. The following are 82 of the top degree and research programs for cybersecurity studies.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Why Cybersecurity Burnout Is Real (and What to Do About It) πŸ•΄

The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Human Negligence to Blame for the Majority of Insider Threats πŸ•΄

In 98% of the assessments conducted for its research, Dtex found employees exposed proprietary company information on the Web - a 20% jump from 2018.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attack Campaign Experiments with Rapid Changes in Email Lure Content πŸ•΄

It's like polymorphic behavior - only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content.

πŸ“– Read

via "Dark Reading: ".
⚠ Bluetooth β€œgas station” warning on Facebook – truth or hoax? [VIDEO] ⚠

Can your phone reliably detect card skimmers using Bluetooth alone? Find out in the latest Naked Security Live video...

πŸ“– Read

via "Naked Security".
⚠ Facebook lets Android users block location tracking ⚠

Facebook announced it's tweaking its Android version, which was tracking your location even when the app wasn't in use.

πŸ“– Read

via "Naked Security".
❌ Threatpost Poll: Are Password Managers Too Risky? ❌

Weigh in on password managers with our Threatpost poll.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Flash β€œsecurity bypass” list hidden in Microsoft Edge browser ⚠

Until this month, the Edge browser could bypass its own warnings about Flash content on 58 websites, thanks to a hidden list.

πŸ“– Read

via "Naked Security".
⚠ Microsoft fixes DDoS bug in its web server ⚠

Overzealous use of HTTP/2 flow control settings in IIS could have brought servers to their knees.

πŸ“– Read

via "Naked Security".
⚠ Pedos pollute YouTube comments on kids’ videos, advertisers flee ⚠

Can YouTube ever keep video comments under control, or it is time to kill off comments altogether?

πŸ“– Read

via "Naked Security".
πŸ” ​5 tips: Choosing the best cloud vendor πŸ”

When it comes to cloud security, know the difference between a great--or just okay--cloud vendor.

πŸ“– Read

via "Security on TechRepublic".