πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Contrast Security Boosts App Security with Self-Protecting Software πŸ•΄

Vulnerability rates in application software remain as high as they were 15 years ago, according to Jeff Williams, CTO of Contrast Security. But by injecting intelligent agents into code, app software gets instruments with thousands of smart, agile sensors that detect and correct vulnerabilities before deployment, and protect apps in operation.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Code42: Data Loss Protection is the New DLP πŸ•΄

Data loss protection helps companies get more proactive than data loss prevention and will help customers in an era of Big Data, says Vijay Ramanathan of Code 42. Data loss protection helps with both time to awareness and time to response; its reliance on automation also means greater volumes of data can be managed.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ AT&T Cybersecurity Ensures Companies SOAR with Security Strategy πŸ•΄

SOAR, or Security Orchestration, Automation and Response, helps customers ensure the sanctity of their infrastructure, data and end-users, according to Sanjay Ramnath, vice president, product marketing, of AT&T Cybersecurity. Integrating analytics, automation and threat intelligence helps customers eliminate the seams where the bad guys get in.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to choose the right cybersecurity framework πŸ”

Does your organization need NIST, CSC, ISO, or FAIR frameworks? Here's how to start making sense of security frameworks.

πŸ“– Read

via "Security on TechRepublic".
❌ RSA Conference 2019: NIST’s Privacy Framework Starts to Take Shape ❌

The Privacy Framework is being developed to be risk-based/outcome-based and non-prescriptive, unlike the GDPR.

πŸ“– Read

via "Threatpost".
πŸ•΄ Raytheon IIS Seizes the Moment with Cybersecurity as a Service πŸ•΄

Tapping the flexibility and reach of the cloud makes good sense for customers, according to Jon Check, senior director, cyber protection solutions for Raytheon Intelligence, Information and Services. Cybersecurity as a Service (CYaaS) ensures both data resilience and cyber resilience by integrating analytics and automation features into the mix.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ NTT Security Confirms WhiteHat Acquisition πŸ•΄

WhiteHat Security will continue to operate as an independent subsidiary of NTT Security following the deal.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Facebook Plans Makeover as Privacy-Focused Network πŸ•΄

CEO Mark Zuckerberg published a lengthy post detailing the company's shift from open platform to privacy-focused communications.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Regular User Awareness Training Still the Best Security Tactic πŸ•΄

Email continues to be the largest area of exposure for most organizations, and phishing emails lead the charge, according to Stu Sjouwerman, founder and CEO of KnowBe4. And while AI and machine learning can make a difference, these same tools are used by the bad guys, Sjouwerman adds. Regular, monthly trainings help reduce phishing click rates.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to generate SSH keys on macOS Mojave πŸ”

macOS is perfectly capable of working with SSH keys, for more secure remote connections. Jack Wallen shows you how to generate the necessary keys and copy them to a server.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Termite and EarthWorm testing tool weaponized to create multi-platform botnet πŸ”

Hacker groups in Asia have weaponized the networking and pentesting tools in a series of attacks first identified in March 2018, as well as the high-profile SingHealth attack.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-20799 (pfsense)

In pfSense 2.4.4_1, blocking of source IP addresses on the basis of failed HTTPS authentication is inconsistent with blocking of source IP addresses on the basis of failed SSH authentication (the behavior does not match the sshguard documentation), which might make it easier for attackers to bypass intended access restrictions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 4 Ways At-Work Apps Are Vulnerable to Attack πŸ•΄

Collaboration applications make users and IT teams more efficient. But they come with an added cost: security.

πŸ“– Read

via "Dark Reading: ".
⚠ Backdoored GitHub accounts spewed secret sneakerbot software ⚠

Researchers have uncovered a network of GitHub accounts containing backdoored versions of legitimate software.

πŸ“– Read

via "Naked Security".
πŸ•΄ eSentire: Boost Security with Managed Detection & Orchestrated Response πŸ•΄

By integrating endpoint security with network security, end-users can reduce their risk and greatly improve their overall security, says Ashley Fidler of eSentire. For managed detection to deliver an orchestrated response, they must tap a reliable framework for decision-making and management, she adds.

πŸ“– Read

via "Dark Reading: ".
🕳 March Event Spotlight: RSA 2019, IAPP DPI: UK 2019, Privacy Insight Series Webinar, and GBI Events 🕳

<code>Media</code><code>_____________________________________________________________________________</code><code>Media</code><code>RSA 2019
March 4-8  
San Francisco, CA  </code><code>RSA Conference 2019 takes place March 4 to 8 in San Francisco. This year’s theme is, to put it simply, Better. Which means working hard to find better solutions. Making better connections with peers from around the world. And keeping the digital world safe so everyone can get on with making the real world a better place. RSA Conference is about bringing all cybersecurity professionals together and empowering the collective β€œwe” in the industry.</code><code>TrustArc will be exhibiting at RSA! Stop by booth #6571 in the North Hall!</code><code>> Register here</code><code>_____________________________________________________________________________</code><code>Media</code><code>IAPP Data Protection Intensive: UK 2019
March 13-14
London</code><code>In today’s data protection environment, the line between global and local is blurryβ€”when it exists at all. Learn to adapt and thrive in this era of global change at the IAPP Data Protection Intensive: UK 2019.</code><code>The GDPR and U.K. Data Protection Act are in full force. New laws like the California Consumer Privacy Law and India’s Personal Data Protection Bill are on the horizon. Brexit looms over the U.K. data protection community. Come to the Intensive and find direction.</code><code>TrustArc will be sponsoring, speaking and exhibiting at this event.  TrustArc SVP Consulting Eleanor Treharne-Jones will be speaking on β€œGDPR Compliance: Convince Customers, Partners, and the Board you are Compliance” on 14 March at 16:00.  Stop by booth #24 to say hello!</code><code>> Learn more here</code><code>_____________________________________________________________________________</code><code>Media</code><code>Global Business Intelligence: CIO Event @ Oxford University
March 19
Oxford</code><code>The CIO was first introduced to lead the Data Processing and Information Systems departments of the past. Today, the job is a much different role. The skill set and responsibilities are worlds apart from what they were a decade or two ago. And the role continues to adapt to the changing face of the modern business enterprise.</code><code>Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, CIO Event gives you the opportunity to meet leading decision makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.</code><code>TrustArc will be co-sponsoring at this event with Truyo and TrustArc’s Eleanor Treharne-Jones will be hosting the roundtable, β€œMeasuring Risk in a Post-GDPR World”.</code><code>> Learn more here</code><code>_____________________________________________________________________________</code><code>Media</code><code>Privacy Insight Series Webinar
Pragmatic Consent Management: Meeting Compliance and Business Needs
March 20 @ 9AM PT | 12PM ET | 5PM GMT
Online Webinar  </code><code>As the dusts settles on the first wave of GDPR implementation initiatives, businesses are left with a multitude of questions. Is implementing a simple cookie banner enough? How can I manage consents across multiple systems? How can I ensure our policies are being implemented? Do I really need a β€œDo Not Sell” button to comply with CCPA? Will all this change under the ePrivacy Regulation anyway? What kind of records do I need if a regulator asks?</code><code>As a privacy professional or a marketer you’re responsible for advising the business and working through the realities of balancing compliance with ongoing demand for data-driven insights and growth. Join this webinar for a playbook of key tips and guidance to help you juggle these requirements…
⚠ Monero cryptominers hijack hundreds of unpatched Docker hosts ⚠

A recently-disclosed vulnerability in the Docker containerisation platform is being exploited by cybercriminals to mine the Monero (XMR) cryptocurrency on hundreds of servers.

πŸ“– Read

via "Naked Security".
πŸ” How to password protect the GRUB boot loader in Ubuntu πŸ”

Password protecting the GRUB boot loader protects against unwanted rebooting and logging into your system, and stops unwanted users from gaining access to single user mode.

πŸ“– Read

via "Security on TechRepublic".
⚠ NSA might shut down phone snooping program, whatever that means ⚠

We've heard this tale before. This time, it was mentioned by a congressional aide. Also, the NSA released Ghidra, a free reverse-engineering tool.

πŸ“– Read

via "Naked Security".
❌ RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat ❌

When it comes to domestic abuse, smart products around the house are turning into new threats, a panel of experts said at RSA.

πŸ“– Read

via "Threatpost".
⚠ Unclosable browser popup! 13-year-old charged for sharing code ⚠

She didn't create it, but she allegedly shared it. That's enough to get in trouble in Japan, with its history of being tough on cyber crime.

πŸ“– Read

via "Naked Security".