πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Mobile-First Phishing Kit Targets Verizon Customers ❌

The kit's authors demonstrate a knowledge of Verizon's infrastructure.

πŸ“– Read

via "Threatpost".
πŸ•΄ FireEye Creates Free Attack Toolset for Windows πŸ•΄

The security services company releases a distribution of 140 programs for penetration testers who need to launch attacks and tools from an instance of Windows.

πŸ“– Read

via "Dark Reading: ".
πŸ” How a former Apple lead plans to make developers key to security solutions πŸ”

Security has tended to be a bolt-on to enterprise software, but Sqreen hopes to make it part of the normal way developers work.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ War on Zero-Days: 4 Lessons from Recent Google & Microsoft Vulns πŸ•΄

When selecting targets, attackers often consider total cost of 'pwnership' -- the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy.

πŸ“– Read

via "Dark Reading: ".
πŸ” POS Malware Continues to Evolve, Infect Restaurants πŸ”

The latest breach appears to have impacted at least two million credit card numbers across six restaurants, for 10 months.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Privacy & Regulatory Considerations in Enterprise Blockchain πŸ•΄

People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Women Now Hold One-Quarter of Cybersecurity Jobs πŸ•΄

New data from ISC(2) shows younger women are making more money than in previous generations in the field - but overall gender pay disparity persists.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Half of All Attacks Aim at Supply Chain ❌

Attackers these days want to β€˜own’ your entire system, including partners and suppliers.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-6049

Detcon Sitewatch Gateway, all versions without cellular, an attacker can edit settings on the device using a specially crafted URL.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-6047

Detcon Sitewatch Gateway, all versions without cellular, Passwords are presented in plaintext in a file that is accessible without authentication.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-18364 (phpfk)

phpFK lite has XSS via the faq.php, members.php, or search.php query string or the user.php user parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Major Mobile Financial Apps Harbor Built-in Vulnerabilities πŸ•΄

A wide variety of financial services companies' apps suffer from poor programing practices and unshielded data.

πŸ“– Read

via "Dark Reading: ".
⚠ Patch Android now! April updates fixes three critical flaws ⚠

Android’s April update includes two critical CVE-level patches among a total of 11 affecting handsets running versions 7, 8, and 9.

πŸ“– Read

via "Naked Security".
⚠ 2m credit cards ripped off from restaurant chain, sold on the dark web ⚠

PoS malware affected some Buca di Beppo, Earl of Sandwich, Planet Hollywood, Chicken Guy!, Mixology and Tequila Taqueria locations.

πŸ“– Read

via "Naked Security".
⚠ Is your hard drive exposed online? ⚠

Over 13,500 internet-connected storage devices have been exposed online by users who didn't set passwords for them.

πŸ“– Read

via "Naked Security".
⚠ Researchers trick Tesla’s Autopilot into driving into oncoming traffic ⚠

They placed unobtrusive stickers that drivers wouldn't see but would fool autopilot into thinking the lane was veering off to the left.

πŸ“– Read

via "Naked Security".
πŸ” Why insider security threats are on the rise and so difficult to detect πŸ”

Some 73% of IT professionals said insider attacks have become more frequent in the past year, according to a Bitglass report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why businesses are at risk over poor data privacy practices πŸ”

Multiple data sources, data sharing agreements, and data inventory are some of the challenges of managing data privacy cited in a survey from Integris Software.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 6 Essential Skills Cybersecurity Pros Need to Develop in 2019 πŸ•΄

In a time of disruption in the security and tech worlds, cybersecurity professionals can't afford to become complacent - even in the face of a skills shortage.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Financial Firms Scrutinize Third-Party Supplier Risk πŸ•΄

But executives aren't confident in the accuracy of cybersecurity assessment data received from their vendors, a new study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Aqua Security Closes $62M in Funding πŸ•΄

Aqua Security Closes $62M in Funding

πŸ“– Read

via "Dark Reading: ".