πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 3 Drivers Behind the Increasing Frequency of DDoS Attacks πŸ•΄

What's causing the uptick? Motivation, opportunity, and new capabilities.

πŸ“– Read

via "Dark Reading: ".
⚠ Warning issued as Netflix subscribers hit by phishing attack ⚠

Netflix phishing scammers are at it again, sending emails that try to steal sensitive details from subscribers.

πŸ“– Read

via "Naked Security".
⚠ Bitcoin flaw could have allowed dreaded 51% takeover ⚠

The scenario was always hypothetical but the fact such a thing was even possible until this week has left some in the Bitcoin community feeling alarmed.

πŸ“– Read

via "Naked Security".
πŸ•΄ Executive Branch Makes Significant Progress As DMARC Deadline Nears πŸ•΄

The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.

πŸ“– Read

via "Dark Reading: ".
πŸ” You can now trade oil and wheat on the blockchain, as commodities hit the platform πŸ”

In an effort to increase transparency and prevent fraud, blockchain may be the next platform for trading goods.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Data Manipulation: How Security Pros Can Respond to an Emerging Threat πŸ•΄

Industry leaders are scrambling to address the issue, which will take new thinking to overcome.

πŸ“– Read

via "Dark Reading: ".
❌ Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution ❌

Microsoft said that it's working on a fix for a zero-day flaw in its JET Database Engine.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ US Approves Cyber Weapons Against Foreign Enemies πŸ•΄

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Security Training Hacks to Increase Cyber IQ Org-Wide πŸ•΄

Move beyond generic, annual security awareness training with these important tips.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-7203

gitolite before commit fa06a34 might allow local users to read arbitrary files in repositories via vectors related to the user umask when running gitolite setup.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4451

gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware πŸ•΄

Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.

πŸ“– Read

via "Dark Reading: ".
❌ Delphi Packer Looks for Human Behavior Before Deploying Payload ❌

Many different threat actors are using this crypting service/tool for their operations, possibly buying it from the developer itself.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Twitter Flaw Exposed Direct Messages To External Developers ❌

The company said it has issued a patch for the issue, which has been ongoing since May 2017.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” 10 signs you aren't cut out to be a cybersecurity specialist πŸ”

A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?

πŸ“– Read

via "Security on TechRepublic".
πŸ” 10 signs you aren't cut out to be a cybersecurity specialist πŸ”

A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The 'Opsec Fail' That Helped Unmask a North Korean State Hacker πŸ•΄

How Park Jin Hyok - charged by the US government for alleged computer crimes for the Sony, Bank of Bangladesh, WannaCry cyberattacks - inadvertently blew his cover via email accounts.

πŸ“– Read

via "Dark Reading: ".
❌ Critical Vulnerability Found in Cisco Video Surveillance Manager ❌

Cisco has patched vulnerability in its video surveillance manager software that could give an unauthenticated, remote attacker the ability to execute arbitrary commands on targeted systems.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” ProTip: Automate setting a firmware password on Apple computers πŸ”

Securing Mac computers means more than just protecting the data. Limiting the ways a user can gain access to a device--including bypassing the existing OS or resetting account passwords is easily enabled with a simple command.

πŸ“– Read

via "Security on TechRepublic".
❌ Podcast: Two Billion IoT Devices Still Vulnerable to BlueBorne Bug ❌

Up to two billion devices are still vulnerable to the BlueBorne IoT attack - and may not ever get a patch.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Monday review – the hot 19 stories of the week ⚠

From iOS security updates to Netflix phishing attacks, catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".