πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Solving cyber security's diversity problem πŸ“’

Why failing to address a shortage of women in senior cyber security positions may open businesses up to greater threats

πŸ“– Read

via "ITPro".
πŸ“’ How to boot Windows 11 in Safe Mode πŸ“’

Unless you’re a complete Windows 11 novice, you’ll have come across Safe Mode before - but what exactly is it, and how do you access it in Windows 11?

πŸ“– Read

via "ITPro".
πŸ“’ China to introduce cyber security reviews for companies listing overseas πŸ“’

The country continues to gain oversight of its tech sector as it begins to implement laws proposed last year

πŸ“– Read

via "ITPro".
πŸ“’ IT Pro News In Review: Microsoft Y2K22 bug, RIP BlackBerry smartphones, Apple hits $3 trillion πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
πŸ“’ Google, Facebook fined €210 million for making it difficult for users to reject cookies πŸ“’

Data regulator CNIL gives companies three months to provide a system for refusing cookies that is as easy as single click consent

πŸ“– Read

via "ITPro".
πŸ•΄ IT/OT Convergence Is More Than a Catchy Phrase πŸ•΄

The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cerberus Sentinel Acquires True Digital Security πŸ•΄

US cybersecurity services firm expands security services and network monitoring capabilities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ MSP Thrive Acquires InCare Technologies πŸ•΄

Partnership extends Thrive's cloud and cybersecurity managed services platform to clients in the southern United States.

πŸ“– Read

via "Dark Reading".
❌ Cyberattackers Hit Data of 80K Fertility Patients ❌

Fertility Centers of Illinois' security measures protected electronic medical records, but the attackers still got at extremely intimate data in admin files.

πŸ“– Read

via "Threat Post".
πŸ•΄ NHS Warns of Attackers Targeting Log4j Flaws in VMware Horizon πŸ•΄

An unknown threat group has been observed attacking VMware Horizon servers running versions with Log4j vulnerabilities.

πŸ“– Read

via "Dark Reading".
❌ EoL Systems Stonewalling Log4j Fixes for Fed Agencies ❌

End of life, end of support, pandemic-induced shipping delays and remote work, scanning failures: It’s a recipe for a patching nightmare, federal cyberserurity CTO Matt Keller says.

πŸ“– Read

via "Threat Post".
⚠ Honda cars in flashback to 2002 β€“ β€œCan’t Get You Out Of My Head” ⚠

Where were YOU on the night of 17 May 2002? And what about the day after that?

πŸ“– Read

via "Naked Security".
β™ŸοΈ Norton 360 Now Comes With a Cryptominer β™ŸοΈ

Norton 360, one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers' computers. Norton's parent firm says the cloud-based service that activates the program and enables customers to profit from the scheme -- in which the company keeps 15 percent of any currencies mined -- is "opt-in," meaning users have to agree to enable it. But many Norton users complain the mining program is difficult to remove, and reactions from longtime customers have ranged from unease and disbelief to, "Dude, where's my crypto?"

πŸ“– Read

via "Krebs on Security".
πŸ“’ Simple Active Directory tweak helps block BlackMatter ransomware attacks πŸ“’

Security researchers reverse engineer the infamous ransomware strain and discover a way to stymie its file encryption process, even if it reaches a corporate network

πŸ“– Read

via "ITPro".
πŸ—“οΈ The blame game: EU criticized for β€˜fragmented and slow’ approach to cyber-attack attribution πŸ—“οΈ

Cyber sanctions can send a powerful message – why aren’t they being used more widely?

πŸ“– Read

via "The Daily Swig".
🦿 URL parsing: A ticking time bomb of security exploits 🦿

The modern world would grind to a halt without URLs, but years of inconsistent parsing specifications have created an environment ripe for exploitation that puts countless businesses at risk.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ City of Grass Valley, California, suffers data breach – employee and citizen information exposed πŸ—“οΈ

Social Security numbers and medical information has been accessed, city confirms

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-22270 β€Ό

An implicit Intent hijacking vulnerability in Dialer prior to SMR Jan-2022 Release 1 allows unprivileged applications to access contact information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40026 β€Ό

There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22268 β€Ό

Incorrect implementation of Knox Guard prior to SMR Jan-2022 Release 1 allows physically proximate attackers to temporary unlock the Knox Guard via Samsung DeX mode.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45231 β€Ό

A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".