πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Microsoft fixes reflected XSS in Exchange Server πŸ—“οΈ

Researchers’ bid to reproduce ProxyShell yields something entirely new

πŸ“– Read

via "The Daily Swig".
❌ FBI Says Its System Was Exploited to Email Fake Cyberattack Alert ❌

The alert was mumbo jumbo, but it was indeed sent from the bureau's email system, from the agency’s own internet address.

πŸ“– Read

via "Threat Post".
πŸ•΄ JupiterOne and Cisco Announce Launch of Secure Cloud Insights πŸ•΄

The partnership is designed to provide businesses with a range of cybersecurity services.

πŸ“– Read

via "Dark Reading".
🦿 Don't fall for LinkedIn phishing: How to watch for this credential-stealing attack 🦿

Cybercriminals are now using LinkedIn to find a way into your files. Learn how to detect phishing on LinkedIn and protect yourself from it.

πŸ“– Read

via "Tech Republic".
πŸ•΄ How to Negotiate With Ransomware Attackers πŸ•΄

Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.

πŸ“– Read

via "Dark Reading".
🦿 How organizations are beefing up their cybersecurity to combat ransomware 🦿

Most organizations surveyed by Hitachi ID are moving partly to software-as-a-service. Less than half have adopted a Zero Trust strategy.

πŸ“– Read

via "Tech Republic".
❌ Cybercriminals Target Alibaba Cloud for Cryptomining, Malware ❌

Cybercriminals are targeting Alibaba Elastic Computing Service (ECS) instances, disabling certain security features to further their cryptomining goals. Alibaba offers a few unique options that make it a highly attractive target for attackers, researchers noted. According to research from Trend Micro, the Chinese giant’s cloud (also known as Aliyun) has a preinstalled security agent. While […]

πŸ“– Read

via "Threat Post".
πŸ” FTC Updates Safeguards Rule for Consumer Financial Information πŸ”

The FTC recently made changes to the Gramm-Leach-Bliley Act’s Safeguards Rule that should pose further privacy obligations to covered financial institutions.

πŸ“– Read

via "".
❌ High-Severity Intel Processor Bug Exposes Encryption Keys ❌

CVE-2021-0146, arising from a debugging functionality with excessive privileges, allows attackers to read encrypted files.

πŸ“– Read

via "Threat Post".
πŸ•΄ Name That Toon: Cubicle for Four πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
❌ The Best Ransomware Response, According to the Data  ❌

An analysis of ransomware attack negotiation-data offers best practices.

πŸ“– Read

via "Threat Post".
πŸ•΄ FBI Attributes Abuse of Its Email Account to Software 'Misconfiguration' πŸ•΄

A wave of phony emails from an FBI mail server originated from an issue with the agency's Law Enforcement Enterprise Portal.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Norton Special Report Reveals Nearly 1 in 2 Gamers Have Experienced a Cyberattack πŸ•΄

Three in four say they were impacted financially as a result, losing more than $700 on average.

πŸ“– Read

via "Dark Reading".
🦿 Cybersecurity is a growing field that can benefit from hiring veterans 🦿

There is a real need for "boots-on-the-ground" cybersecurity professionals, so why not tap into a pool of trained and motivated veterans?

πŸ“– Read

via "Tech Republic".
πŸ•΄ Trend Micro: 90% of IT Decision Makers Believe Organizations Compromise on Cybersecurity in Favor of Other Goals πŸ•΄

Trend Micro study reveals need for new way to discuss business risk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ MacOS Zero-Day Used in Watering-Hole Attacks πŸ•΄

Attackers targeted Chinese pro-democracy groups using a vulnerability fixed in September along with a second vulnerability fixed early in the year, Google says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Immersive Labs Acquires Snap Labs to Power Cyber Simulations With New Depth and Realism πŸ•΄

Integrated offering to deliver hyper-realistic team exercises specific to customer environments for more relevant cyber knowledge, skills, and judgment.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Troubling Rise of Internet Access Brokers πŸ•΄

Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ HTTP header smuggling attack against AWS API Gateway exposes systems to cache poisoning πŸ—“οΈ

New hacking technique may pave the way for other serious attacks

πŸ“– Read

via "The Daily Swig".
🦿 Fear and shame are making it harder to fight ransomware and accidental data loss, report finds 🦿

A third of employees admit lying to hide the fact that they accidentally deleted data, most doing so out of embarrassment or fear of punishment. Even more would lie about a ransomware infection.

πŸ“– Read

via "Tech Republic".
❌ Emotet Resurfaces on the Back of TrickBot After Nearly a Year ❌

Researchers observed what looks like the Emotet botnet – the "world’s most dangerous malware" – reborn and distributed by the trojan it used to deliver.

πŸ“– Read

via "Threat Post".