πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” 5 incident response best practices your company needs πŸ”

More than half of incident response employees have encountered counter-IR instances in the form of log destruction and evasion tactics, according to Carbon Black.

πŸ“– Read

via "Security on TechRepublic".
⚠ Possible Toyota data breach affecting 3.1 million customers ⚠

Several Toyota companies have announced that they might have suffered data breach attempts, with one affecting 3.1 million customers.

πŸ“– Read

via "Naked Security".
❌ Financial Apps are Ripe for Exploit via Reverse Engineering ❌

White hat hacker reverse engineers financial apps and finds a treasure trove of security issues.

πŸ“– Read

via "Threatpost".
⚠ VMware patches critical vulnerabilities ⚠

VMware has released patches for several critical security vulnerabilities, days after two were unveiled at Pwn2Own.

πŸ“– Read

via "Naked Security".
⚠ Are there viable alternatives to Facebook and Twitter? ⚠

There's growing interest in social networks that prioritize user control. Two of the popular ones are Mastodon and Diaspora.

πŸ“– Read

via "Naked Security".
⚠ TP-Link router zero-day that offers your network up to hackers ⚠

Downgrade attack lets any user take over - just ask for old-style access to the debugging port and you won't need a password

πŸ“– Read

via "Naked Security".
πŸ•΄ Rapid7 Buys Network Monitoring Firm NetFort πŸ•΄

New technology will be integrated into Rapid7's cloud-based security analytics platform.

πŸ“– Read

via "Dark Reading: ".
πŸ” How financial institutions are risking customer data through insecure mobile apps πŸ”

An investigation of mobile apps from 30 financial institutions reveals weak encryption, data leakage, insecure data storage, and other vulnerabilities.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why women still make up only 24% of cybersecurity pros πŸ”

More millennial women are entering the field, but wage gap issues remain, according to an (ISC)Β² report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Government spyware hidden in Google Play store apps ⚠

The malware, dubbed Exodus, records and steals all manner of data and leaves phones vulnerable to further hacking and data tampering.

πŸ“– Read

via "Naked Security".
πŸ•΄ Airports & Operational Technology: 4 Attack Scenarios πŸ•΄

As OT systems increasingly fall into the crosshairs of cyberattackers, aviation-industry CISOs have become hyper-focused on securing them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Sentence Handed Down in $4.2 Million BEC Scheme πŸ•΄

Maryland man conspired in a business email compromise scheme that stole from at least 13 separate victims over the course of a year.

πŸ“– Read

via "Dark Reading: ".
πŸ” How companies are dealing with the security threats of an evolving remote workforce πŸ”

Multi-factor authentication is a common strategy, while Zero Trust is gaining traction, according to an Okta report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Assessing third-party vendor risk: Top 6 challenges πŸ”

Third-party cyber threats are impacting major business decisions, according to a BitSight and CeFPro report. Here are some of the biggest challenges.

πŸ“– Read

via "Security on TechRepublic".
❌ Google’s April Android Security Bulletin Warns of 3 Critical Bugs ❌

Google's April Android Security update fixed 12 Android-specific vulnerabilities including three critical remote code execution flaws.

πŸ“– Read

via "Threatpost".
❌ Mobile-First Phishing Kit Targets Verizon Customers ❌

The kit's authors demonstrate a knowledge of Verizon's infrastructure.

πŸ“– Read

via "Threatpost".
πŸ•΄ FireEye Creates Free Attack Toolset for Windows πŸ•΄

The security services company releases a distribution of 140 programs for penetration testers who need to launch attacks and tools from an instance of Windows.

πŸ“– Read

via "Dark Reading: ".
πŸ” How a former Apple lead plans to make developers key to security solutions πŸ”

Security has tended to be a bolt-on to enterprise software, but Sqreen hopes to make it part of the normal way developers work.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ War on Zero-Days: 4 Lessons from Recent Google & Microsoft Vulns πŸ•΄

When selecting targets, attackers often consider total cost of 'pwnership' -- the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy.

πŸ“– Read

via "Dark Reading: ".
πŸ” POS Malware Continues to Evolve, Infect Restaurants πŸ”

The latest breach appears to have impacted at least two million credit card numbers across six restaurants, for 10 months.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Privacy & Regulatory Considerations in Enterprise Blockchain πŸ•΄

People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success.

πŸ“– Read

via "Dark Reading: ".