πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ SAS 2019: Meet β€˜TajMahal,’ A New and Highly Advanced APT Framework ❌

A highly sophisticated APT framework has been found targeting a single Central Asian diplomatic entity for years.

πŸ“– Read

via "Threatpost".
❌ SAS 2019: Gaza Cybergang Blends Sophistication Levels in Highly Effective Spy Effort ❌

The SneakyPastes campaign was highly effective but hardly advanced.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'MuddyWater' APT Spotted Attacking Android πŸ•΄

Cyber espionage attack group adds mobile malware to its toolset.

πŸ“– Read

via "Dark Reading: ".
⚠ Two teens charged with jamming school Wi-Fi to get out of exams ⚠

They're facing charges of computer criminal activity after allegedly disrupting the network at the request of their friends.

πŸ“– Read

via "Naked Security".
⚠ Two robocallers fined $3m for Google listings scam ⚠

The robocall scammers were defrauding small businesses who were scared of seeing their Google search listings drop off.

πŸ“– Read

via "Naked Security".
⚠ Mar-a-Lago intruder had instant-malware-inflicting thumb drive ⚠

Ms. Zhang's infected USB drive instantly went to work on a Secret Service agent's PC. He shut it down immediately "to halt the corruption."

πŸ“– Read

via "Naked Security".
❌ SAS 2019: Triton ICS Malware Hits A Second Victim ❌

In only the second known attack of the Russia-linked malware, which shut down an oil refinery in 2017, another Mideast target has been hit.

πŸ“– Read

via "Threatpost".
⚠ Update now! Here’s the April Patch Tuesday roundup ⚠

Microsoft and Adobe Patch Tuesday updates are here. Find out more about the most serious bugs and how to patch them.

πŸ“– Read

via "Naked Security".
πŸ” How hotel booking confirmation links can leak personal information to third parties πŸ”

Passing booking information as URL arguments allows third parties to intercept booking information for data collection, according to Symantec.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Mozilla uses AI to manage Firefox bug reports πŸ”

The company created a homegrown artificial intelligence tool dubbed BugBug to classify and categorize each bug report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Check your Verizon FiOS Quantum Gateway G1100 router now ⚠

Owners of Verizon’s FiOS Quantum Gateway (G1100) routers should check the firmware has been updated after a security company made public three significant security flaws.

πŸ“– Read

via "Naked Security".
⚠ Ep. 027 – Honeypots, GPS rollover and the MySpace data vortex ⚠

Guess how long it takes crooks to find a new device when you plug it in? All this and more in the latest Naked Security podcast- enjoy!

πŸ“– Read

via "Naked Security".
πŸ•΄ Safe Harbor Programs: Ensuring the Bounty Isn't on White Hat Hackers' Heads πŸ•΄

As crowdsourced security-testing surges in popularity, companies need to implement safe harbor provisions to protect good-faith hackers -- and themselves.

πŸ“– Read

via "Dark Reading: ".
❌ Yahoo Offers $117.5M Settlement in Data Breach Lawsuit ❌

Yahoo is taking a second stab at settling a massive lawsuit regarding the data breaches that the Internet company faced between 2013 and 2016.

πŸ“– Read

via "Threatpost".
πŸ” 10 questions to consider when developing a Disaster Recovery Plan πŸ”

Properly backing up your data in a secure manner is tantamount to keeping your cherished memories and important files stored safely.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to stop Google from tracking and storing your locations πŸ”

Don't want Google to keep track of your whereabouts? Here's how to disable location history and tracking on your mobile devices.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Android Phones Now Double as Physical Security Keys πŸ•΄

Google debuted a series of security updates at Next 2019, giving users the option to use their phone as a second authentication factor.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Merging Companies, Merging Clouds πŸ•΄

Integrating cloud environments is anything but easy. Evaluating the security risks in doing so must be a starting component of an overall M&A strategy.

πŸ“– Read

via "Dark Reading: ".
πŸ” State Agencies, Department of Human Services Offices, Frequent Targets of Phishing Scams πŸ”

State executive agencies, namely Department of Human Services offices, have increasingly found themselves the victims of successful phishing scams.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” State Agencies, Department of Human Services Offices, Being Hit Hard by Phishing Scams πŸ”

State executive agencies, namely Department of Human Services offices, have increasingly found themselves the victims of successful phishing scams.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ SAS 2019: Joe FitzPatrick Warns of the β€˜$5 Supply Chain Attack’ ❌

At the Security Analyst Summit, Threatpost editor Tara Seals catches up with Joe FitzPatrick, researcher with Securing Hardware, to discuss supply chain threats.

πŸ“– Read

via "Threatpost".