πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 4 Ways At-Work Apps Are Vulnerable to Attack πŸ•΄

Collaboration applications make users and IT teams more efficient. But they come with an added cost: security.

πŸ“– Read

via "Dark Reading: ".
⚠ Backdoored GitHub accounts spewed secret sneakerbot software ⚠

Researchers have uncovered a network of GitHub accounts containing backdoored versions of legitimate software.

πŸ“– Read

via "Naked Security".
πŸ•΄ eSentire: Boost Security with Managed Detection & Orchestrated Response πŸ•΄

By integrating endpoint security with network security, end-users can reduce their risk and greatly improve their overall security, says Ashley Fidler of eSentire. For managed detection to deliver an orchestrated response, they must tap a reliable framework for decision-making and management, she adds.

πŸ“– Read

via "Dark Reading: ".
🕳 March Event Spotlight: RSA 2019, IAPP DPI: UK 2019, Privacy Insight Series Webinar, and GBI Events 🕳

<code>Media</code><code>_____________________________________________________________________________</code><code>Media</code><code>RSA 2019
March 4-8  
San Francisco, CA  </code><code>RSA Conference 2019 takes place March 4 to 8 in San Francisco. This year’s theme is, to put it simply, Better. Which means working hard to find better solutions. Making better connections with peers from around the world. And keeping the digital world safe so everyone can get on with making the real world a better place. RSA Conference is about bringing all cybersecurity professionals together and empowering the collective β€œwe” in the industry.</code><code>TrustArc will be exhibiting at RSA! Stop by booth #6571 in the North Hall!</code><code>> Register here</code><code>_____________________________________________________________________________</code><code>Media</code><code>IAPP Data Protection Intensive: UK 2019
March 13-14
London</code><code>In today’s data protection environment, the line between global and local is blurryβ€”when it exists at all. Learn to adapt and thrive in this era of global change at the IAPP Data Protection Intensive: UK 2019.</code><code>The GDPR and U.K. Data Protection Act are in full force. New laws like the California Consumer Privacy Law and India’s Personal Data Protection Bill are on the horizon. Brexit looms over the U.K. data protection community. Come to the Intensive and find direction.</code><code>TrustArc will be sponsoring, speaking and exhibiting at this event.  TrustArc SVP Consulting Eleanor Treharne-Jones will be speaking on β€œGDPR Compliance: Convince Customers, Partners, and the Board you are Compliance” on 14 March at 16:00.  Stop by booth #24 to say hello!</code><code>> Learn more here</code><code>_____________________________________________________________________________</code><code>Media</code><code>Global Business Intelligence: CIO Event @ Oxford University
March 19
Oxford</code><code>The CIO was first introduced to lead the Data Processing and Information Systems departments of the past. Today, the job is a much different role. The skill set and responsibilities are worlds apart from what they were a decade or two ago. And the role continues to adapt to the changing face of the modern business enterprise.</code><code>Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, CIO Event gives you the opportunity to meet leading decision makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.</code><code>TrustArc will be co-sponsoring at this event with Truyo and TrustArc’s Eleanor Treharne-Jones will be hosting the roundtable, β€œMeasuring Risk in a Post-GDPR World”.</code><code>> Learn more here</code><code>_____________________________________________________________________________</code><code>Media</code><code>Privacy Insight Series Webinar
Pragmatic Consent Management: Meeting Compliance and Business Needs
March 20 @ 9AM PT | 12PM ET | 5PM GMT
Online Webinar  </code><code>As the dusts settles on the first wave of GDPR implementation initiatives, businesses are left with a multitude of questions. Is implementing a simple cookie banner enough? How can I manage consents across multiple systems? How can I ensure our policies are being implemented? Do I really need a β€œDo Not Sell” button to comply with CCPA? Will all this change under the ePrivacy Regulation anyway? What kind of records do I need if a regulator asks?</code><code>As a privacy professional or a marketer you’re responsible for advising the business and working through the realities of balancing compliance with ongoing demand for data-driven insights and growth. Join this webinar for a playbook of key tips and guidance to help you juggle these requirements…
⚠ Monero cryptominers hijack hundreds of unpatched Docker hosts ⚠

A recently-disclosed vulnerability in the Docker containerisation platform is being exploited by cybercriminals to mine the Monero (XMR) cryptocurrency on hundreds of servers.

πŸ“– Read

via "Naked Security".
πŸ” How to password protect the GRUB boot loader in Ubuntu πŸ”

Password protecting the GRUB boot loader protects against unwanted rebooting and logging into your system, and stops unwanted users from gaining access to single user mode.

πŸ“– Read

via "Security on TechRepublic".
⚠ NSA might shut down phone snooping program, whatever that means ⚠

We've heard this tale before. This time, it was mentioned by a congressional aide. Also, the NSA released Ghidra, a free reverse-engineering tool.

πŸ“– Read

via "Naked Security".
❌ RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat ❌

When it comes to domestic abuse, smart products around the house are turning into new threats, a panel of experts said at RSA.

πŸ“– Read

via "Threatpost".
⚠ Unclosable browser popup! 13-year-old charged for sharing code ⚠

She didn't create it, but she allegedly shared it. That's enough to get in trouble in Japan, with its history of being tough on cyber crime.

πŸ“– Read

via "Naked Security".
πŸ” Iranian Hackers Stole Corporate Secrets From 200 Oil, Gas, Manufacturing Firms πŸ”

The campaign, which counts oil, gas, and heavy machinery manufacturers among its victims, has been responsible for millions of dollars in lost productivity and data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to enable and configure Auditd on CentOS 7 πŸ”

Learn how to install Auditd on CentOS 7 and how to add a new rule to watch for file system changes.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Iranian Hackers Stole Corporate Secrets; 200 Oil, Gas, Manufacturing Firms Targeted πŸ”

The campaign, which counts oil, gas, and heavy machinery manufacturers among its victims, has been responsible for millions of dollars in lost productivity and data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2018-11783

sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Debunking 5 Myths About Zero Trust Security πŸ•΄

cc

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deep Instinct Touts Predictive Aspects of Deep Learning πŸ•΄

Deep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company's security posture, says Deep Instinct's Guy Caspi. Deep learning's predictive capabilities also change the security management equation reactive to proactive, an important breakthrough in forecasting and risk management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deep Instinct Touts Predictive Aspects of Deep Learning πŸ•΄

Deep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company's security posture, says Deep Instinct's Guy Caspi. Deep learning's predictive capabilities also change the security management equation reactive to proactive, an important breakthrough in forecasting and risk management.

πŸ“– Read

via "Dark Reading: ".
πŸ” 5G cybersecurity concerns and physical challenges: What you need to know πŸ”

Dan Patterson discusses how 5G will enable IoT, AR, VR, 3D renderings, and more. He also talks about the numerous cybersecurity concerns with 5G.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 5G cybersecurity concerns and physical challenges: What you need to know πŸ”

Dan Patterson discusses how 5G will enable IoT, AR, VR, 3D renderings, and more. He also talks about the numerous cybersecurity concerns with 5G.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ IoT Anomaly Detection 101: Data Science to Predict the Unexpected πŸ•΄

Yes! You can predict the chance of a mechanical failure or security breach before it happens . Here's how.

πŸ“– Read

via "Dark Reading: ".
❌ RSA Conference 2019: Ultrasound Hacked in Two Clicks ❌

In a proof-of-concept hack, researchers penetrated an ultrasound and were able to download and manipulate patient files, then execute ransomware.

πŸ“– Read

via "Threatpost".
❌ RSA Conference 2019: Firms Continue to Fail at IoT Security ❌

IoT is growing more popular in the home - and so to are the attacks that target these devices featuring valuable data, researchers said at RSA 2019.

πŸ“– Read

via "Threatpost".