πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ New Mirai Version Targets Business IoT Devices πŸ•΄

The notorious Internet of Things botnet is evolving to attack more types of devices - including those found in enterprises.

πŸ“– Read

via "Dark Reading: ".
πŸ” The 3 least secure programming languages πŸ”

These coding languages have the most open source vulnerabilities, according to a WhiteSource report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Businesses failing to meet California Consumer Privacy Act compliance goals πŸ”

Set to go into effect on January 1, 2020, the CCPA will affect lots of companies doing business in California, but 86% have yet to meet compliance goals.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Crowdsourced vs. Traditional Pen Testing πŸ•΄

A side-by-side comparison of key test features and when best to apply them based on the constraints within your budget and environment.

πŸ“– Read

via "Dark Reading: ".
❌ Norsk Hydro Calls Ransomware Attack β€˜Severe’ ❌

When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.

πŸ“– Read

via "Threatpost".
⚠ Microsoft won’t patch Windows registry warning problem ⚠

A security researcher has found a way to tinker with Windows’ core settings while persuading users to accept the changes.

πŸ“– Read

via "Naked Security".
πŸ•΄ Stealing Corporate Funds Still Top Goal of Messaging Attacks πŸ•΄

Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile.

πŸ“– Read

via "Dark Reading: ".
❌ Researcher Says NSA’s Ghidra Tool Can Be Used for RCE ❌

Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.

πŸ“– Read

via "Threatpost".
πŸ•΄ Norsk Hydro Shuts Plants Amid Ransomware Attack πŸ•΄

The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.

πŸ“– Read

via "Dark Reading: ".
⚠ New scam accuses you of child abuse, offers to remove evidence ⚠

This scam is both intimidating and disturbing - the crooks are presenting themselves as corrupt CIA officials who will take a bribe.

πŸ“– Read

via "Naked Security".
❌ Old Tech Spills Digital Dirt on Past Owners ❌

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Case of the Missing Data πŸ•΄

The latest twist in the Equifax breach has serious implications for organizations.

πŸ“– Read

via "Dark Reading: ".
πŸ” Help Needed to Solve AI Data Protection Challenges πŸ”

The UK's data protection authority is hoping that advances to artificial intelligence incorporate data protection by design and is seeking the public's opinion on how to do so.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 6 Ways Mature DevOps Teams Are Killing It in Security πŸ•΄

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.

πŸ“– Read

via "Dark Reading: ".
❌ Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack ❌

Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.

πŸ“– Read

via "Threatpost".
πŸ•΄ DDoS Attack Size Drops 85% in Q4 2018 πŸ•΄

The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.

πŸ“– Read

via "Dark Reading: ".
❌ Host of Flaws Found in CUJO Smart Firewall ❌

Some of the flaws would allow remote code-execution.

πŸ“– Read

via "Threatpost".
❌ Cardinal RAT Resurrected to Target FinTech Firms ❌

A long-quiet malware family has been spotted targeting financial technology firms, armed with new obfuscation techniques to avoid detection.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Office Dominates Most Exploited List πŸ•΄

Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.

πŸ“– Read

via "Dark Reading: ".
⚠ Elsevier exposes users’ emails and passwords online ⚠

The science publisher is blaming a misconfigured server that exposed a constant stream of its users’ credentials.

πŸ“– Read

via "Naked Security".
⚠ Hacked tornado warning systems leave Texans in the dark ⚠

Add this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents.

πŸ“– Read

via "Naked Security".