πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ ShadowHammer Shows Supply Chain Risks πŸ•΄

Trusted relationships can become critical risks when suppliers' systems are breached.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install and use Firefox Lockbox πŸ”

Firefox Lockbox allows you to easily view your saved Firefox passwords and is a viable tool for certain users.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Restaurant Chains Hit in PoS Attack πŸ•΄

Buca di Beppo, Earl of Sandwich, and Planet Hollywood were among the chains hit in a nearly year-long breach of their point-of-sale systems.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-8023

EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the Networker Client execution service (nsrexecd) when oldauth authentication method is used. An unauthenticated remote attacker could send arbitrary commands via RPC service to be executed on the host system with the privileges of the nsrexecd service, which runs with administrative privileges.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Nuanced Approach Needed to Deal With Huawei 5G Security Concerns πŸ•΄

Governments need to adopt strategic approach for dealing with concerns over telecom vendor's suspected ties to China's intelligence apparatus, NATO-affiliated body says.

πŸ“– Read

via "Dark Reading: ".
⚠ Wrecked Teslas hang onto your (unencrypted) data ⚠

Sold at salvage and auctions, they contain info from drivers' paired mobile devices, plus highly personal pre-crash video.

πŸ“– Read

via "Naked Security".
πŸ” 5 incident response best practices your company needs πŸ”

More than half of incident response employees have encountered counter-IR instances in the form of log destruction and evasion tactics, according to Carbon Black.

πŸ“– Read

via "Security on TechRepublic".
⚠ Possible Toyota data breach affecting 3.1 million customers ⚠

Several Toyota companies have announced that they might have suffered data breach attempts, with one affecting 3.1 million customers.

πŸ“– Read

via "Naked Security".
❌ Financial Apps are Ripe for Exploit via Reverse Engineering ❌

White hat hacker reverse engineers financial apps and finds a treasure trove of security issues.

πŸ“– Read

via "Threatpost".
⚠ VMware patches critical vulnerabilities ⚠

VMware has released patches for several critical security vulnerabilities, days after two were unveiled at Pwn2Own.

πŸ“– Read

via "Naked Security".
⚠ Are there viable alternatives to Facebook and Twitter? ⚠

There's growing interest in social networks that prioritize user control. Two of the popular ones are Mastodon and Diaspora.

πŸ“– Read

via "Naked Security".
⚠ TP-Link router zero-day that offers your network up to hackers ⚠

Downgrade attack lets any user take over - just ask for old-style access to the debugging port and you won't need a password

πŸ“– Read

via "Naked Security".
πŸ•΄ Rapid7 Buys Network Monitoring Firm NetFort πŸ•΄

New technology will be integrated into Rapid7's cloud-based security analytics platform.

πŸ“– Read

via "Dark Reading: ".
πŸ” How financial institutions are risking customer data through insecure mobile apps πŸ”

An investigation of mobile apps from 30 financial institutions reveals weak encryption, data leakage, insecure data storage, and other vulnerabilities.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why women still make up only 24% of cybersecurity pros πŸ”

More millennial women are entering the field, but wage gap issues remain, according to an (ISC)Β² report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Government spyware hidden in Google Play store apps ⚠

The malware, dubbed Exodus, records and steals all manner of data and leaves phones vulnerable to further hacking and data tampering.

πŸ“– Read

via "Naked Security".
πŸ•΄ Airports & Operational Technology: 4 Attack Scenarios πŸ•΄

As OT systems increasingly fall into the crosshairs of cyberattackers, aviation-industry CISOs have become hyper-focused on securing them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Sentence Handed Down in $4.2 Million BEC Scheme πŸ•΄

Maryland man conspired in a business email compromise scheme that stole from at least 13 separate victims over the course of a year.

πŸ“– Read

via "Dark Reading: ".
πŸ” How companies are dealing with the security threats of an evolving remote workforce πŸ”

Multi-factor authentication is a common strategy, while Zero Trust is gaining traction, according to an Okta report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Assessing third-party vendor risk: Top 6 challenges πŸ”

Third-party cyber threats are impacting major business decisions, according to a BitSight and CeFPro report. Here are some of the biggest challenges.

πŸ“– Read

via "Security on TechRepublic".
❌ Google’s April Android Security Bulletin Warns of 3 Critical Bugs ❌

Google's April Android Security update fixed 12 Android-specific vulnerabilities including three critical remote code execution flaws.

πŸ“– Read

via "Threatpost".