πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ US feds’ names, home and email addresses hacked and posted online ⚠

A group of hackers that doxxed thousands of federal law enforcement employees last week has struck again.

πŸ“– Read

via "Naked Security".
⚠ Google’s location history data shared routinely with police ⚠

Law enforcement officials in the US have been routinely mining Google’s location history data for criminal investigations.

πŸ“– Read

via "Naked Security".
πŸ” 73% of IT security teams are understaffed, and CISOs are turning to automation for help πŸ”

With a cybersecurity talent shortage, AI and machine learning solutions are filling gaps, according to Ponemon Institute report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent rootkit-enabled malware Scranos from harming your organization πŸ”

The Scranos rootkit malware can do significant damage by stealing passwords and data through a fradulent certificate. But it can be removed, according to security firm Bitdefender.

πŸ“– Read

via "Security on TechRepublic".
❌ Malspam Campaigns Distribute HawkEye Keylogger Post Ownership Change ❌

After the HawkEye malware kit underwent an ownership change and new development, researchers are spotting the keylogger used in several malicious email campaigns.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Attacks (and Old Attacks Made New) πŸ•΄

Although new attacks might get the most attention, don't assume old one have gone away.

πŸ“– Read

via "Dark Reading: ".
πŸ” How SMBs can better protect their business and customer data πŸ”

These tips from the National Cyber Security Alliance and the Better Business Bureau can help guard your business against breaches and other vulnerabilities that could compromise your data.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ IT Outsourcing Firm Wipro Investigates Data Breach πŸ•΄

Employee accounts may have been compromised in a sophisticated phishing campaign.

πŸ“– Read

via "Dark Reading: ".
❌ Windows Zero-Day Emerges in Active Exploits ❌

Patched just last week, the Windows kernel bug is being used for full system takeover.

πŸ“– Read

via "Threatpost".
πŸ” 5 things you need to know about Google's new Android developer policies πŸ”

Google is changing its app review process to address developer complaints. Here's what you need to know about it.

πŸ“– Read

via "Security on TechRepublic".
❌ Wipro Confirms Hack and Supply Chain Attacks on Customers ❌

The IT giant's networks were infiltrated and used to mount supply-chain attacks on its enterprise customers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Benefiting from Data Privacy Investments πŸ•΄

GDPR-ready companies experience lower overall costs associated with data breaches, research finds.

πŸ“– Read

via "Dark Reading: ".
❌ RatVermin Spyware Targets Ukraine Gov Agencies ❌

Researchers are pinning a recent phishing campaign against Ukraine government agencies on the Luhansk People's Republic, a proto-state in eastern Ukraine which declared independence in 2015.

πŸ“– Read

via "Threatpost".
πŸ•΄ Meet Scranos: New Rootkit-Based Malware Gains Confidence πŸ•΄

The cross-platform operation, first tested on victims in China, has begun to spread around the world.

πŸ“– Read

via "Dark Reading: ".
πŸ” RoboKiller v. Nomorobo: Which robocall blocker should iOS users choose? πŸ”

Call blockers have made significant advancements, but so have telemarketers' tactics for getting you to pick up. See how call blockers RoboKiller and Nomorobo compare.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Recapping Proposed Changes to the California Consumer Privacy Act πŸ”

Because of ongoing tweaks, like a recent amendment that would expand consumers' private right to action, the California Consumer Privacy Act remains in constant flux.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2018-18489

The ping feature in the Diagnostic functionality on TP-LINK WR840N v2 Firmware 3.16.9 Build 150701 Rel.51516n devices allows remote attackers to cause a denial of service (HTTP service termination) by modifying the packet size to be higher than the UI limit of 1472.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Threat Group Exploits Chrome Bug to Serve Malicious Ads to iOS Users πŸ•΄

A new exploit developed by eGobbler is allowing it to distribute malvertisements-more than 500 million to date-at huge scale, Confiant says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Decoding a 'New' Elite Cyber Espionage Team πŸ•΄

Stealthy and well-heeled hacking group went undetected for five years and wields a massive attack framework of some 80 different modules.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Audit Shows Gains, Though Privacy Lags πŸ•΄

The 2018 Online Trust Audit shows that "encryption everywhere" is improving security, while fuzzy language is slowing privacy gains.

πŸ“– Read

via "Dark Reading: ".
⚠ Microsoft confirms Outlook.com and Hotmail accounts were breached ⚠

Between 1 January and 28 March this year hackers were able to access a β€œlimited number” of consumer Outlook.com, Hotmail and MSN Mail email accounts, Microsoft has confirmed.

πŸ“– Read

via "Naked Security".