πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Your Employees Want to Learn. How Should You Teach Them? πŸ•΄

Security practitioners are most likely to stay at organizations that offer career development. Here are eight tips to consider as you plan your course of action.

πŸ“– Read

via "Dark Reading: ".
⚠ ICANN demands DNSSEC to combat DNS hijacking ⚠

DNS security is under serious threat from cyberattackers and domain overseer ICANN wants internet companies to do something about it.

πŸ“– Read

via "Naked Security".
πŸ•΄ Come to Black Hat Asia and See the Future of Cloud Security πŸ•΄

Whether you're looking to perfect your AWS auditing skills or practice the latest cloud exploitation techniques, next month's Black Hat Asia can help you achieve your goals.

πŸ“– Read

via "Dark Reading: ".
❌ Critical WinRAR Flaw Found Actively Being Exploited ❌

The spam campaign is being used to spread a malicious .exe file, taking advantage of a vulnerability in WinRAR which was patched in January.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ A 'Cloudy' Future for OSSEC πŸ•΄

As more organizations move to the public cloud and to DevOps and DevSecOps processes, the open source alternative for host-based intrusion detection is finding new uses.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ TurboTax Hit with Cyberattack, Tax Returns Compromised πŸ•΄

Officials report an unauthorized party obtained tax return data by using credentials obtained from an outside source.

πŸ“– Read

via "Dark Reading: ".
❌ High-Severity SHAREit App Flaws Open Files for the Taking ❌

SHAREit has fixed two flaws in its app that allowed bad actors to authenticate their devices and steal files from a victim's device.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Attackers Continue to Focus on Users, Well-Worn Techniques πŸ•΄

From WannaCry and phishing to credential stuffing and cryptomining, attackers relied on many oldie-but-goodie attacks in 2018, according to a pair of new security threat reports.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How Enterprises Are Developing Secure Applications πŸ•΄

IT security and application development are disparate processes that are increasingly coming together. Here's a look at how that's happening.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Kenna Security and Sonatype Partner for Open Source Vulnerability Intelligence πŸ•΄

The pairing brings Sonatype data on open source components to the Kenna Security platform.

πŸ“– Read

via "Dark Reading: ".
❌ β€˜Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud ❌

A known vulnerability combined with a weakness in bare-metal server reclamation opens the door to powerful, high-impact attacks.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 'Cloudborne': Bare-Metal Cloud Servers Vulnerable to Attack πŸ•΄

Firmware vulnerabilities provide direct access to server hardware, enabling attackers to install malware that can pass from customer to customer.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to cloud-enable Enpass Password Manager πŸ”

Learn how to combine Enpass and Dropbox into a perfect, cloud-ready password manager.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why AI and ML are not cybersecurity solutions--yet πŸ”

AI and ML are often touted as silver bullets, but real-world applications for the technology seem thin on the ground.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DIY Botnet Detection: Techniques and Challenges πŸ•΄

Botnets continue to spread to places never dreamed of a few years ago. But you can fight them off, and these tips can help.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Social Media Platforms Double as Major Malware Distribution Centers πŸ•΄

Because many organizations tend to overlook or underestimate the threat, social media sites, including Facebook, Twitter, and Instagram, are a huge blind spot in enterprise defenses.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Former Kaspersky Lab Expert Sentenced in Russia for Treason πŸ•΄

Ruslan Stoyanov gets 14 years in Russian prison.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Build Framework for Browser-Based Botnets πŸ•΄

HTML5 used to build persistent malware on victims' computers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Senator Asks Healthcare Industry What It's Doing to Prevent Cyberattacks πŸ”

With insight from stakeholders, the politician hopes to develop a strategy to improve the healthcare industry's cybersecurity posture.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ Millions of utilities customers’ passwords stored in plain text ⚠

Plain-text, unencrypted passwords were sent instead of having users reset them. There was no breach, the firm claims, but how would it know?

πŸ“– Read

via "Naked Security".