πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ When Every Attack Is a Zero Day πŸ•΄

Stopping malware the first time is an ideal that has remained tantalizingly out of reach. But automation, artificial intelligence, and deep learning are poised to change that.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Exploits for Adobe Vulnerabilities Spiked in 2018 πŸ•΄

With Flash Player on way out, attackers are renewing their focus on Acrobat Reader, RiskSense found.

πŸ“– Read

via "Dark Reading: ".
πŸ” Breaking Down the Nigeria Data Protection Regulation πŸ”

The regulation, issued in January, could pace Nigeria as a leader in data protection in Africa.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ App Exposes Wi-Fi Credentials for Thousands of Private Networks πŸ•΄

A database used by WiFi Finder was left open and unprotected on the Internet.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ City of Stuart Still Recovering from Ryuk Ransomware Attack πŸ•΄

Officials are investigating an April 13 ransomware attack that targeted Stuart's city servers and forced it offline.

πŸ“– Read

via "Dark Reading: ".
❌ Carbanak Source Code Unveils a Startlingly Complex Malware ❌

The malware is behind billions in banking and credit-card losses.

πŸ“– Read

via "Threatpost".
πŸ•΄ Demonstration Showcase Brings DevOps to Interop19 πŸ•΄

Attendees will learn how orchestration and automation can be a part of network operations and security, even at smaller companies.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google File Cabinet Plays Host to Malware Payloads πŸ•΄

Researchers detect a new drive-by download attack in which Google Sites' file cabinet template is a delivery vehicle for malware.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Stuxnet Family Tree Grows πŸ•΄

What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack.

πŸ“– Read

via "Dark Reading: ".
πŸ” Small business owners: Don't rush into using AI πŸ”

An artificial intelligence strategist advises small business owners to focus on revenue and growth and not AI in of itself--at least for now--because the ROI is not there.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Vendor risk management: What to consider when shopping for a VRM solution πŸ”

A vendor risk management program could curtail Third-Party Vendor-initiated data breaches. Here's what to look for in a VRM solution.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Azure Sentinel: Microsoft's thoroughly modern SIEM πŸ”

Microsoft's new cloud-hosted security information and event management service rolls out in a public preview.

πŸ“– Read

via "Security on TechRepublic".
⚠ DNS over HTTPS is coming whether ISPs and governments like it or not ⚠

DNS over HTTPS (DoH), backed by Google, Mozilla and Cloudflare, is about to make web surveillance a lot more difficult.

πŸ“– Read

via "Naked Security".
⚠ Gunpoint domain hijack turns out to have been a family affair ⚠

The owner of State Snaps hired his cousin to break into the home of the owner of DoItForState.com to force him to transfer the domain.

πŸ“– Read

via "Naked Security".
⚠ NYPD forgets to redact facial recognition docs, asks for them back ⚠

The privacy think tank had them for 20 days, and one of the docs was already displayed at a conference, but the NYPD is still clawing them back.

πŸ“– Read

via "Naked Security".
⚠ Ex-student records himself using USB Killer to fry college computers ⚠

Vishwanath Akuthota faces a potential ten-year stretch after killing at least 66 computers at his former college.

πŸ“– Read

via "Naked Security".
❌ Facial Recognition is Here: But Are We Ready? ❌

As U.S. citizens realize that facial recognition is present in real-life applications, more questions are arising about consent, how data is shared - and what regulation exists.

πŸ“– Read

via "Threatpost".
❌ Latest Qbot Variant Evades Detection, Infects Thousands ❌

Ever-changing Qbot trojan has been spotted in a fresh campaign with a new β€œcontext aware” delivery technique.

πŸ“– Read

via "Threatpost".
πŸ” Major DDoS attacks increased 967% this year πŸ”

DDoS attacks sized 100Gbps and higher exploded in Q1 2019, with 77% of all attacks targeting two or more vectors.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The key challenges and contradictions that frustrate security professionals πŸ”

The role of employees, the needs of the supply chain, and a reliance on antivirus products are three Catch 22s for security pros, according to a study from Glasswall Solutions.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How online merchants can combat e-commerce fraud πŸ”

A study of a stolen credit card by cybersecurity provider IntSights reveals how scammers use card information and how merchants can guard against this type of fraud.

πŸ“– Read

via "Security on TechRepublic".