πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 How organizations are beefing up their cybersecurity to combat ransomware 🦿

Most organizations surveyed by Hitachi ID are moving partly to software-as-a-service. Less than half have adopted a Zero Trust strategy.

πŸ“– Read

via "Tech Republic".
❌ Cybercriminals Target Alibaba Cloud for Cryptomining, Malware ❌

Cybercriminals are targeting Alibaba Elastic Computing Service (ECS) instances, disabling certain security features to further their cryptomining goals. Alibaba offers a few unique options that make it a highly attractive target for attackers, researchers noted. According to research from Trend Micro, the Chinese giant’s cloud (also known as Aliyun) has a preinstalled security agent. While […]

πŸ“– Read

via "Threat Post".
πŸ” FTC Updates Safeguards Rule for Consumer Financial Information πŸ”

The FTC recently made changes to the Gramm-Leach-Bliley Act’s Safeguards Rule that should pose further privacy obligations to covered financial institutions.

πŸ“– Read

via "".
❌ High-Severity Intel Processor Bug Exposes Encryption Keys ❌

CVE-2021-0146, arising from a debugging functionality with excessive privileges, allows attackers to read encrypted files.

πŸ“– Read

via "Threat Post".
πŸ•΄ Name That Toon: Cubicle for Four πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
❌ The Best Ransomware Response, According to the Data  ❌

An analysis of ransomware attack negotiation-data offers best practices.

πŸ“– Read

via "Threat Post".
πŸ•΄ FBI Attributes Abuse of Its Email Account to Software 'Misconfiguration' πŸ•΄

A wave of phony emails from an FBI mail server originated from an issue with the agency's Law Enforcement Enterprise Portal.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Norton Special Report Reveals Nearly 1 in 2 Gamers Have Experienced a Cyberattack πŸ•΄

Three in four say they were impacted financially as a result, losing more than $700 on average.

πŸ“– Read

via "Dark Reading".
🦿 Cybersecurity is a growing field that can benefit from hiring veterans 🦿

There is a real need for "boots-on-the-ground" cybersecurity professionals, so why not tap into a pool of trained and motivated veterans?

πŸ“– Read

via "Tech Republic".
πŸ•΄ Trend Micro: 90% of IT Decision Makers Believe Organizations Compromise on Cybersecurity in Favor of Other Goals πŸ•΄

Trend Micro study reveals need for new way to discuss business risk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ MacOS Zero-Day Used in Watering-Hole Attacks πŸ•΄

Attackers targeted Chinese pro-democracy groups using a vulnerability fixed in September along with a second vulnerability fixed early in the year, Google says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Immersive Labs Acquires Snap Labs to Power Cyber Simulations With New Depth and Realism πŸ•΄

Integrated offering to deliver hyper-realistic team exercises specific to customer environments for more relevant cyber knowledge, skills, and judgment.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Troubling Rise of Internet Access Brokers πŸ•΄

Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ HTTP header smuggling attack against AWS API Gateway exposes systems to cache poisoning πŸ—“οΈ

New hacking technique may pave the way for other serious attacks

πŸ“– Read

via "The Daily Swig".
🦿 Fear and shame are making it harder to fight ransomware and accidental data loss, report finds 🦿

A third of employees admit lying to hide the fact that they accidentally deleted data, most doing so out of embarrassment or fear of punishment. Even more would lie about a ransomware infection.

πŸ“– Read

via "Tech Republic".
❌ Emotet Resurfaces on the Back of TrickBot After Nearly a Year ❌

Researchers observed what looks like the Emotet botnet – the "world’s most dangerous malware" – reborn and distributed by the trojan it used to deliver.

πŸ“– Read

via "Threat Post".
⚠ Emotet malware: β€œThe report of my death was an exaggeration” ⚠

"Old malware rarely dies." The best way to predict the future is to look at the past... if it worked before, it will probably work again.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Server-side vulnerabilities in Concrete CMS put thousands of websites under threat πŸ—“οΈ

Web admins urged to apply patches now

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Navigating the Complexity of Today's Digital Supply Chain πŸ•΄

An efficient way to monitor security is to model user behavior using time series data and watching for anomalies.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Number of cyber-attacks infiltrating critical New Zealand networks soars πŸ—“οΈ

National cybersecurity agency also observes rise in automated probing for web security flaws

πŸ“– Read

via "The Daily Swig".
⚠ The self-driving smart suitcase… that the person behind you can hijack! ⚠

Apparently, we need a self-driving IoT Bluetooth robot suitcase. Who knew?

πŸ“– Read

via "Naked Security".