πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Former Kaspersky Lab Expert Sentenced in Russia for Treason πŸ•΄

Ruslan Stoyanov gets 14 years in Russian prison.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Build Framework for Browser-Based Botnets πŸ•΄

HTML5 used to build persistent malware on victims' computers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Senator Asks Healthcare Industry What It's Doing to Prevent Cyberattacks πŸ”

With insight from stakeholders, the politician hopes to develop a strategy to improve the healthcare industry's cybersecurity posture.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ Millions of utilities customers’ passwords stored in plain text ⚠

Plain-text, unencrypted passwords were sent instead of having users reset them. There was no breach, the firm claims, but how would it know?

πŸ“– Read

via "Naked Security".
⚠ Police bust their own radio shop manager for dodgy software updates ⚠

Police allege that he updated radios with fraudulent software from a radio enthusiast who allegedly hacked encrypted radios for drug cartels.

πŸ“– Read

via "Naked Security".
⚠ Researchers break e-signatures in 22 common PDF viewers ⚠

Researchers have discovered a flaw in some PDF document viewers that allows new content to be added to documents without breaking the electronic signatures.

πŸ“– Read

via "Naked Security".
⚠ Nvidia patches eight security flaws in graphics products ⚠

Chip maker Nvidia has released a security update, fixing eight CVE flaws in its Windows and Linux graphics display drivers.

πŸ“– Read

via "Naked Security".
❌ Bronze Union APT Updates Remote Access Trojans in Fresh Wave of Attacks ❌

The China-linked threat group has returned in 2018 using updated RATs to launch its attacks, including ZxShell, Gh0st RAT, and SysUpdate malware.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Why businesses fear cyberattacks from ex-employees more than nation states πŸ”

A major data breach would likely shut down half of SMBs permanently, according to an AppRiver report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Ep.021 – Leaked calls, a social media virus and passwords exposed [PODCAST] ⚠

Here's the latest Naked Security podcast - enjoy!

πŸ“– Read

via "Naked Security".
πŸ•΄ Embracing DevSecOps: 5 Processes to Improve DevOps Security πŸ•΄

In the cyber threat climate of the 21st century, sticking with DevOps is no longer an option.

πŸ“– Read

via "Dark Reading: ".
❌ Thunderclap Flaws Shatter Peripheral Security ❌

Many machines, including almost all Apple laptops and desktops produced since 2011, are vulnerable to data exfiltration via weaponized peripherals.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” New detection method identifies cryptomining and other fileless malware attacks πŸ”

SentinelOne and Intel announced a new method to detect cryptomining and cryptojacking attacks using hardware-based detection technology.

πŸ“– Read

via "Security on TechRepublic".
❌ Cisco Patches High-Severity Webex Vulnerability For Third Time ❌

Third time's hopefully a charm for Cisco, which has patched a high-severity flaw once again in its Webex video conferencing platform.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Ring Doorbell Flaw Opens Door to Spying ❌

Researchers are urging Ring users to update to the latest version of the smart doorbell after a serious flaw triggered privacy concerns.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Card-Skimming Scripts Hide Behind Google Analytics, Angular ❌

The campaign is marked by a significant level of customization, with an β€œindividualized yet very consistent approach to every compromise.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Whose Line Is It? When Voice Phishing Attacks Get Sneaky πŸ•΄

Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is GLBA Compliance? Understanding the Data Protection Requirements of the Gramm-Leach-Bliley Act in 2019 πŸ”

Learn about what GLBA means for data protection and how to achieve GLBA compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Software vulnerabilities are becoming more numerous, less understood πŸ”

Operating a database of software vulnerabilities is a challenging undertaking, according to private vulnerability database operator Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Stay Ahead of the Curve by Using AI in Compliance πŸ•΄

Although human oversight is required, advanced technologies built on AI will become pivotal in building safer financial markets and a safer world.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Former Albany College Student Charged with Computer Damage πŸ•΄

Vishwanath Akuthota has been accused of using a 'USB killer device' to destroy dozens of computers, officials report.

πŸ“– Read

via "Dark Reading: ".