πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Can I Have XDR Without EDR? πŸ•΄

Yes, extended detection and response is possible without endpoint detection and response, but here's why having both is helpful.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-43997 β€Ό

Amazon FreeRTOS 10.2.0 through 10.4.5 on the ARMv7-M and ARMv8-M MPU platforms does not prevent non-kernel code from calling the xPortRaisePrivilege and vPortResetPrivilege internal functions. This is fixed in 10.4.6 and in 10.4.3-LTS Patch 2.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CISA Releases Incident and Vulnerability Response Playbooks to Strengthen Cybersecurity for Federal Civilian Agencies πŸ•΄

Effort part of President Biden’s executive order to improve the nation’s sybersecurity.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Sift Acquires Passwordless Authentication Pioneer Keyless to Provide Secure, Frictionless Authentication πŸ•΄

Biometric authentication innovator eliminates password-based account takeover and enables PSD2 Strong Customer Authentication while preserving user privacy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Palo Alto Networks Delivers What's Next in Security at Ignite '21 πŸ•΄

Cybersecurity company introduces solutions aimed at network security, cloud security and security operations.

πŸ“– Read

via "Dark Reading".
πŸ“’ Intel CPU flaw could enable hackers to attack PCs, cars, and medical devices πŸ“’

Vulnerability found in Pentium, Celeron, and Atom processors

πŸ“– Read

via "ITPro".
πŸ“’ What are cookies πŸ“’

What do they do, how they work, and why does every website want you to accept them?

πŸ“– Read

via "ITPro".
πŸ“’ Identity-focussed security for your zero trust journey πŸ“’

Steps to protect your business from identity-driven threats

πŸ“– Read

via "ITPro".
πŸ“’ Iranian hacking groups are evolving, warns Microsoft πŸ“’

Cyber espionage groups are increasingly utilizing ransomware to either collect funds or disrupt their targets

πŸ“– Read

via "ITPro".
πŸ“’ NCSC: COVID-19 vaccines were prime target for hackers in 2021 πŸ“’

The GCHQ's cyber arm says 20% of cyber attacks this year targeted the health sector and key organisations involved in the vaccine rollout

πŸ“– Read

via "ITPro".
πŸ“’ Cryptomixers are helping hackers to launder ransomware payments πŸ“’

The services enable cyber criminals to anonymously clean proceeds from illicit activities

πŸ“– Read

via "ITPro".
πŸ“’ How do you become an ethical hacker? πŸ“’

We examine what certifications do you need, what jobs are available and how much you can expect to be paid

πŸ“– Read

via "ITPro".
πŸ“’ Emotet infrastructure has almost doubled since resurgence was confirmed πŸ“’

Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation

πŸ“– Read

via "ITPro".
πŸ“’ Over a third of applications have high-risk vulnerabilities πŸ“’

Synopsys report reveals that 97% exhibit some form of vulnerability

πŸ“– Read

via "ITPro".
πŸ—“οΈ Clubhouse launches bug bounty platform with $3,000 on offer for critical vulnerabilities πŸ—“οΈ

Audio-based social media platform prioritizes access control bypasses and information disclosure flaws

πŸ“– Read

via "The Daily Swig".
❌ Spear-Phishing Campaign Exploits Glitch Platform to Steal Credentials ❌

Threat actors are targeting Middle-East-based employees of major corporations in a scam that uses a specific β€˜ephemeral’ aspect of the project-management tool to link to SharePoint phishing pages.

πŸ“– Read

via "Threat Post".
❌ How to Choose the Right DDoS Protection Solution ❌

Pankaj Gupta, Senior Director at Citrix, outlines how distributed denial of service attacks have become increasingly sophisticated, bigger and economically motivated.

πŸ“– Read

via "Threat Post".
⚠ Apple’s Mail Privacy Protection feature – watch out if you have a Watch! ⚠

Apple's "Protect Mail Activity" is a handy privacy enhancement for your messaging habits. As long as you know its limitations...

πŸ“– Read

via "Naked Security".
πŸ—“οΈ β€˜Everyone is welcome’ – Microsoft security panel offers different perspectives on vulnerability disclosure process πŸ—“οΈ

BlueHat is back following pandemic-induced hiatus

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Swarm Intelligence May Be Just the Ticket for Improved Network & Device Security πŸ•΄

Based on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing data and giving orders.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep59: Emotet, an FBI hoax, Samba bugs, and a hijackable suitcase [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".