πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ RSA Conference 2019: Cryptographers’ Panel Decries Adi Shamir’s Visa Issues ❌

Panelists react to missing noted cryptographer Adi Shamir who was denied a visa to enter the US to attend the RSAC.

πŸ“– Read

via "Threatpost".
πŸ•΄ Fighting Alert Fatigue with Actionable Intelligence πŸ•΄

By fine-tuning security system algorithms, analysts can make alerts intelligent and useful, not merely generators of noise.

πŸ“– Read

via "Dark Reading: ".
⚠ Serious Chrome zero-day – Google says update β€œright this minute” ⚠

When a security expert on the Chrome team says, "update your Chrome installs... like right this minute" - well, here's how to check!

πŸ“– Read

via "Naked Security".
πŸ•΄ It's Time to Rethink Your Vendor Questionnaire πŸ•΄

To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin.

πŸ“– Read

via "Dark Reading: ".
❌ RSA Conference 2019: How to Defend Against an AI vs AI β€˜Flash War’ ❌

Offensive cyber attack chains are accelerating rapidly thanks to a combination of artificial intelligence, machine learning and broadening threat landscape.

πŸ“– Read

via "Threatpost".
❌ RSA Conference 2019: The Sky’s the Limit For Satellite Hacks ❌

Satellites are spotted with vulnerabilities and design flaws - and hackers are taking note, researchers report at the RSA Conference.

πŸ“– Read

via "Threatpost".
πŸ” New Insider Threat Report Breaks Down Scenarios, Statistics πŸ”

Verizon's Insider Threat Report breaks down five categories of inside threat actors and outlines 11 steps to reduce risk and defend against malicious insiders.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Meet the New 'Public-Interest Cybersecurity Technologist' πŸ•΄

A grassroots movement is emerging to train high-risk groups and underrepresented communities in cybersecurity protection and skills - all for the public good.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Threat Group Using Old Technique to Run Custom Malware πŸ•΄

Whitefly is exploiting DLL hijacking with considerable success against organizations since at least 2017, Symantec says.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-1912

IBM DOORS Next Generation (DNG/RRC) 6.0.2 through 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152736.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-1911

IBM DOORS Next Generation (DNG/RRC) 5.0 through 5.0.2 and 6.0 through 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152735.

πŸ“– Read

via "National Vulnerability Database".
❌ RSA Conference 2019: UniKey Patches BleedingBit Flaws Granting Access To Hotel Rooms, Cars ❌

BleedingBit's impact continues to spread across various devices, researchers at RSA Conference 2019 said.

πŸ“– Read

via "Threatpost".
πŸ” Myki might be the Android password manager you've been wanting πŸ”

If you're looking for an easy to use password manager that doesn't save your data to a third-party server, Jack Wallen believes Myki might be what you're looking for.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Code42: Data Loss Protection is the New DLP πŸ•΄

Data loss protection helps companies get more proactive than data loss prevention and will help customers in an era of Big Data, says Vijay Ramanathan of Code 42. Data loss protection helps with both time to awareness and time to response; its reliance on automation also means greater volumes of data can be managed.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Lockpath Advocates Benefits of Continuous Security Management πŸ•΄

Risk management and compliance technologies emerge from the intersection of technology, security, and regulation; continuous security management helps professionals from multiple departments and disciplines access the info they need, when they need it, according to Sam Abadir of Lockpath.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Improve Security, We Must Focus on Its People πŸ•΄

New technology can help cybersecurity bridge the talent gap, but tech won't do much without people to operate it.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ From Silicon to Security: Synopsys Bolsters App Security with New Platform πŸ•΄

Application security is always important to infosec professionals, and as Ravi Iyer of Synopsys points out, software development trends like Agile, DevOps and CI/CD push app security to the forefront. Polaris, the new software integrity platform from Synopsys, can help with early detection of software vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Gemalto Helps Navigate Security in the Cloud Era πŸ•΄

With digital transformation in full swing and Big Data accumulating, end-user organizations have their hands full to manage, store and protect all their data, according to Todd Moore of Gemalto. While end-users have access to cloud-based encryption and other security services, Moore warns that the bad guys have access to them too.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Anomali: Integration of Disparate Security Systems is Essential πŸ•΄

With a record number of cyber-attacks recorded in 2018 and even more expected this year, integrating multiple security sub-systems is essential for enterprises, says Anomali's Hugh Njemanze. He also encourages companies to operationalize their threat intelligence and to get better at sharing threat intel data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Endgame Encourages Users to Balance Detection and Response Vs. Prevention πŸ•΄

Not all security data that's publicly shared gets analyzed or vetted, but Forrester's recent independent analysis of MITRE ATT&CK evaluation offers up useful insights to infosec pros and can guide their procurement and security strategy, according to Mike Nichols of Endgame. These reports can help with intelligent evaluation of detection and response versus prevention approaches.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deep Instinct Touts Predictive Aspects of Deep Learning πŸ•΄

Deep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company's security posture, says Deep Instinct's Guy Caspi. Deep learning's predictive capabilities also change the security management equation reactive to proactive, an important breakthrough in forecasting and risk management.

πŸ“– Read

via "Dark Reading: ".