πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to improve cybersecurity for your business: 6 tips πŸ”

Business cyber risks rates are holding steady for US companies, according to the US Chamber of Commerce and FICO. Here's how to stay safe.

πŸ“– Read

via "Security on TechRepublic".
❌ Authentication Bypass Bug Hits Top Enterprise VPNs ❌

Business users of Cisco, F5 Networks, Palo Alto Networks and Pulse Secure platforms are impacted, according the U.S. government.

πŸ“– Read

via "Threatpost".
πŸ•΄ US-CERT, CISA Warn of Vuln in at Least 4 Major VPNs πŸ•΄

VPN products by Cisco, Palo Alto Networks, F5 Networks, Pulse Secure, insecurely store session cookies.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to configure the Enpass clipboard timeout πŸ”

Learn how to receive a bit more security from the Enpass Password Manager, by changing the clipboard timeout.

πŸ“– Read

via "Security on TechRepublic".
❌ Fake Instagram Apps on Google Play Harvest User Logins ❌

The apps, which claim to help users rack up followers, are well-rated and have been downloaded tens of thousands of times.

πŸ“– Read

via "Threatpost".
πŸ” Trade Secret Theft Victim Downplays Chinese Espionage Angle πŸ”

The manufacturer, which recently won a intellectual property case involving the theft of proprietary algorithms, source code, and programming language scripts, doesn't deny it was a victim of corporate theft but disagrees with the implication it was "Chinese espionage."

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ TRITON Attacks Underscore Need for Better Defenses πŸ•΄

As attackers focus on cyber-physical systems, companies must improve their visibility into IT system compromises as well as limit actions on operational-technology networks, experts say.

πŸ“– Read

via "Dark Reading: ".
❌ TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids ❌

A popular Australian smartwatch's tracking capabilities expose its user's locations, personal data and more.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Details Emerge on Windows Zero Day πŸ•΄

The CVE-2019-0859 vulnerability, patched last week, is the latest in a string of Windows local privilege escalation bugs discovered at Kaspersky Lab.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Downplays Scope of Email Attack πŸ•΄

An unknown attacker used a support agent's credentials to access email content belonging to some Outlook, Hotmail users.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Data on Thousands of Law Enforcement Personnel Exposed in Breach πŸ•΄

Unknown hackers broke into databases of nonprofit and have posted online personal info on FBI, Secret Service, Capitol Police, US Park Police, others.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-16966

There is a CSRF vulnerability in the mndpsingh287 File Manager plugin 3.0 for WordPress via the page=wp_file_manager_root public_path parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ Security weakness in popular VPN clients ⚠

Numerous enterprise VPN clients could be vulnerable to a potentially serious security weakness that could be used to spoof access.

πŸ“– Read

via "Naked Security".
⚠ Watch out! Don’t fall for the Instagram β€˜Nasty List’ phishing attack ⚠

Instagram users have been receiving odd messages from followers expressing shock that their accounts have somehow ended up on something called the β€œNasty List.”

πŸ“– Read

via "Naked Security".
⚠ US feds’ names, home and email addresses hacked and posted online ⚠

A group of hackers that doxxed thousands of federal law enforcement employees last week has struck again.

πŸ“– Read

via "Naked Security".
⚠ Google’s location history data shared routinely with police ⚠

Law enforcement officials in the US have been routinely mining Google’s location history data for criminal investigations.

πŸ“– Read

via "Naked Security".
πŸ” 73% of IT security teams are understaffed, and CISOs are turning to automation for help πŸ”

With a cybersecurity talent shortage, AI and machine learning solutions are filling gaps, according to Ponemon Institute report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent rootkit-enabled malware Scranos from harming your organization πŸ”

The Scranos rootkit malware can do significant damage by stealing passwords and data through a fradulent certificate. But it can be removed, according to security firm Bitdefender.

πŸ“– Read

via "Security on TechRepublic".
❌ Malspam Campaigns Distribute HawkEye Keylogger Post Ownership Change ❌

After the HawkEye malware kit underwent an ownership change and new development, researchers are spotting the keylogger used in several malicious email campaigns.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Attacks (and Old Attacks Made New) πŸ•΄

Although new attacks might get the most attention, don't assume old one have gone away.

πŸ“– Read

via "Dark Reading: ".
πŸ” How SMBs can better protect their business and customer data πŸ”

These tips from the National Cyber Security Alliance and the Better Business Bureau can help guard your business against breaches and other vulnerabilities that could compromise your data.

πŸ“– Read

via "Security on TechRepublic".