πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Nvidia patches eight security flaws in graphics products ⚠

Chip maker Nvidia has released a security update, fixing eight CVE flaws in its Windows and Linux graphics display drivers.

πŸ“– Read

via "Naked Security".
❌ Bronze Union APT Updates Remote Access Trojans in Fresh Wave of Attacks ❌

The China-linked threat group has returned in 2018 using updated RATs to launch its attacks, including ZxShell, Gh0st RAT, and SysUpdate malware.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Why businesses fear cyberattacks from ex-employees more than nation states πŸ”

A major data breach would likely shut down half of SMBs permanently, according to an AppRiver report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Ep.021 – Leaked calls, a social media virus and passwords exposed [PODCAST] ⚠

Here's the latest Naked Security podcast - enjoy!

πŸ“– Read

via "Naked Security".
πŸ•΄ Embracing DevSecOps: 5 Processes to Improve DevOps Security πŸ•΄

In the cyber threat climate of the 21st century, sticking with DevOps is no longer an option.

πŸ“– Read

via "Dark Reading: ".
❌ Thunderclap Flaws Shatter Peripheral Security ❌

Many machines, including almost all Apple laptops and desktops produced since 2011, are vulnerable to data exfiltration via weaponized peripherals.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” New detection method identifies cryptomining and other fileless malware attacks πŸ”

SentinelOne and Intel announced a new method to detect cryptomining and cryptojacking attacks using hardware-based detection technology.

πŸ“– Read

via "Security on TechRepublic".
❌ Cisco Patches High-Severity Webex Vulnerability For Third Time ❌

Third time's hopefully a charm for Cisco, which has patched a high-severity flaw once again in its Webex video conferencing platform.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Ring Doorbell Flaw Opens Door to Spying ❌

Researchers are urging Ring users to update to the latest version of the smart doorbell after a serious flaw triggered privacy concerns.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Card-Skimming Scripts Hide Behind Google Analytics, Angular ❌

The campaign is marked by a significant level of customization, with an β€œindividualized yet very consistent approach to every compromise.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Whose Line Is It? When Voice Phishing Attacks Get Sneaky πŸ•΄

Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is GLBA Compliance? Understanding the Data Protection Requirements of the Gramm-Leach-Bliley Act in 2019 πŸ”

Learn about what GLBA means for data protection and how to achieve GLBA compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Software vulnerabilities are becoming more numerous, less understood πŸ”

Operating a database of software vulnerabilities is a challenging undertaking, according to private vulnerability database operator Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Stay Ahead of the Curve by Using AI in Compliance πŸ•΄

Although human oversight is required, advanced technologies built on AI will become pivotal in building safer financial markets and a safer world.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Former Albany College Student Charged with Computer Damage πŸ•΄

Vishwanath Akuthota has been accused of using a 'USB killer device' to destroy dozens of computers, officials report.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ European Security Firm to Offer Free Hacking Toolkit πŸ•΄

CQTools suite includes both exploit kits and information-extraction functions, its developers say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Booter Owner Pleads Guilty in Federal Court πŸ•΄

Illinois man offered "DDoS for hire" services that hit millions of victims.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Intel Focuses on Data Center, Firmware Security Ahead of RSAC πŸ•΄

The new Intel SGX Card is intended to extend application memory security using Intel SGX in existing data center infrastructure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Persistent Attackers Rarely Use Bespoke Malware πŸ•΄

Study of the Bronze Union group-also known as APT27 or Emissary Panda-underscores how most advanced persistent threat (APT) groups now use administrative tools or slight variants of well-known tools.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ More Than 22,000 Vulns Were Disclosed in 2018, 27% Without Fixes πŸ•΄

As in previous years, input validation vulnerabilities accounted for a substantial proportion of total, Risk Based Security report shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ IoT, APIs, and Criminal Bots Pose Evolving Dangers πŸ•΄

A pair of reports reach similar conclusions about some of the threats growing in cyberspace and the industries likely to be most affected.

πŸ“– Read

via "Dark Reading: ".