πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Useful Resources for CISOs: Blogs, Papers, Conferences & More πŸ”

We've collected 50 resources, including blogs, videos, research, and databases, to help CISOs keep up with the demands of their busy job.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to block SSH attacks on Linux with denyhosts πŸ”

If you depend on secure shell, learn how you can better protect your servers from SSH attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Patches Are Freezing Older PCs Running Sophos, Avast πŸ•΄

Computers running Sophos or Avast software have been failing to boot following the latest Patch Tuesday update.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ In Security, All Logs Are Not Created Equal πŸ•΄

Prioritizing key log sources goes a long way toward effective incident response.

πŸ“– Read

via "Dark Reading: ".
πŸ” SQL injection attacks: A cheat sheet for business pros πŸ”

SQL injection has been a major security risk since the early days of the internet. Find out what's at risk, and how cybersecurity pros can defend their organizations.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Julian Assange Arrested in London πŸ•΄

The WikiLeaks founder, who was taken from the Ecuadorian Embassy by British police, has been convinced of skipping bail in 2012.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Tax Hacks: How Seasonal Scams Cause Yearlong Problems πŸ•΄

Tax season is marked with malware campaigns, tax fraud, and identity theft, with money and data flowing through an underground economy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Dragonblood' Vulnerabilities Seep Into WPA3 Secure Wifi Handshake πŸ•΄

A new set of vulnerabilities may put some early adopters of strong Wifi security at greater security risk.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New 'HOPLIGHT' Malware Appears in Latest North Korean Attacks, Say DHS, FBI πŸ•΄

The FBI and Department of Homeland Security release malware analysis report, indicators of compromise for nine different executable files.

πŸ“– Read

via "Dark Reading: ".
⚠ Android phones transformed into anti-phishing security tokens ⚠

A new security feature allows users of Android 7 and later to use their smartphones to authenticate themselves to their Google accounts.

πŸ“– Read

via "Naked Security".
⚠ Flickr tackling online image theft with new AI service ⚠

Photo sharing website Flickr is trying to combat copyright infringement with a service that spots copies of its users' images online.

πŸ“– Read

via "Naked Security".
⚠ Feds say Russian 2016 election meddling spanned all US states ⚠

A multi-agency report has strengthened claims that Russia meddled with election systems in all 50 US states during the last presidential race.

πŸ“– Read

via "Naked Security".
⚠ Assange arrested, faces extradition for hacking ⚠

The Ecuadorean embassy finally decided it wasn't willing to shelter Julian Assange any more, so it let in UK police to arrest him.

πŸ“– Read

via "Naked Security".
πŸ” How IBM's expanding blockchain-based grocery store network will improve food safety πŸ”

Albertsons is the latest grocery store to adopt the blockchain-based system for tracing food from farm to store shelf.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Vulnerabilities discovered in industrial equipment increased 30% in 2018 πŸ”

As state-sponsored attackers increase their activity and cyberwar escalates, security researchers are focusing their attention on industrial systems to surface vulnerabilities.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 emerging risks businesses face πŸ”

With the onset of GDPR, privacy regulation compliance now tops talent shortages as the largest emerging business risk, according to Gartner.

πŸ“– Read

via "Security on TechRepublic".
❌ ThreatList: Tax Scammers Launch a Raft of Fake Mobile Apps ❌

Convincing phishing pages and millions of suspicious apps are plaguing tax season.

πŸ“– Read

via "Threatpost".
❌ WordPress Yellow Pencil Plugin Flaws Actively Exploited ❌

Yet another Wordpress plugin, Yellow Pencil Visual Theme Customizer, is being exploited in the wild after two software vulnerabilities were discovered.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cloudy with a Chance of Security Breach πŸ•΄

Businesses must be aware of the security weaknesses of the public cloud and not assume that every angle is covered.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Home Office Apologizes for EU Citizen Data Exposure πŸ•΄

The Home Office has admitted to compromising private email addresses belonging to EU citizens hoping to settle in the UK.

πŸ“– Read

via "Dark Reading: ".
❌ North Korea’s Hidden Cobra Strikes U.S. Targets with HOPLIGHT ❌

The custom malware is a spy tool and can also disrupt processes at U.S. assets.

πŸ“– Read

via "Threatpost".