πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ NIST Brings Threat Modeling into the Spotlight πŸ•΄

NIST recommendations typically become part of government procurement, which means threat modeling will soon be written into questions for organizations that sell to the federal government.

πŸ“– Read

via "Dark Reading".
πŸ•΄ UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data πŸ•΄

The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.

πŸ“– Read

via "Dark Reading".
πŸ•΄ SAIC Appoints Kevin Brown as Chief Information Security Officer πŸ•΄

Industry leader with decades of information security experience manages SAIC’s security strategy and oversees critical cybersecurity operations.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How to Implement a Security Champions Program πŸ•΄

A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top of mind throughout the business.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Exchange Autodiscover Flaw Leaks Thousands of Credentials πŸ•΄

Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol.

πŸ“– Read

via "Dark Reading".
πŸ•΄ FamousSparrow APT Group Flocks to Hotels, Governments, Businesses πŸ•΄

The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Supply Chain and Ransomware Threats Drove 60% Increase in Global Cyber Intelligence Sharing Among Financial Firms πŸ•΄

AMEX, Banco Falabella, IAG, and UBS win global award for annual cyber intelligence sharing efforts.

πŸ“– Read

via "Dark Reading".
πŸ•΄ A Cyber-Resilience Model for the Next Era πŸ•΄

Digital dilemmas have driven security to the forefront of business leaders' priorities. Understanding how to provide security at the speed of change and build a cyber-resilient organization will drive competitive advantage and help organizations run and transform with ease.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 6 Lessons From Major Data Breaches This Year πŸ•΄

Though many incidents stemmed from familiar security failures, they served up β€” or resurfaced β€” some important takeaways.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Panorays Closes $42 Million Series B Funding Round πŸ•΄

Funding comes on the heels of 500% growth in client base.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Apple Patches Zero-Days in iOS, Known Vuln in macOS πŸ•΄

One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS flaws.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Google Spots New Technique to Sneak Malware Past Detection Tools πŸ•΄

The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Password Reuse Problems Persist Despite Known Risks πŸ•΄

The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a variation, a survey finds.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Who Is BlackMatter? πŸ•΄

Researchers piece together the origins of the group that made headlines this week as the perpetrator behind a ransomware attack on New Cooperative.

πŸ“– Read

via "Dark Reading".
πŸ•΄ What Are the Different Types of Cyber Insurance? πŸ•΄

Even with the best cybersecurity defenses in place, organizations can fall victim to a cyberattack.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Bitcoin.org hack nets giveaway scammers $17,000 overnight πŸ—“οΈ

Open source project back online after fraudsters dangled double-your-money lure

πŸ“– Read

via "The Daily Swig".
❌ Critical Cisco Bugs Allow Code Execution on Wireless, SD-WAN ❌

Unauthenticated cyberattackers can also wreak havoc on networking device configurations.

πŸ“– Read

via "Threat Post".
πŸ•΄ Our Eye Is on the SPARROW πŸ•΄

How unauthorized users can exploit wireless infrastructures for covert communication.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Contrast Application Security Platform Scales to Support OWASP Risks πŸ•΄

Contrast's platform detects and prevents against OWASP Top Ten risks from development to production with out-of-the-box policy rules and automated compliance reporting.

πŸ“– Read

via "Dark Reading".
🦿 10,000 employees at Stanley Black & Decker go passwordless 🦿

Here's how TruU's Passwordless Protection could make hybrid work easier and beef up security in the enterprise.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Meet TruffleHog – a browser extension for finding secret keys in JavaScript code πŸ—“οΈ

API keys are accidentally being leaked by websites. Here’s how to find them

πŸ“– Read

via "The Daily Swig".