πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Why real-estate businesses need to defend against these cybersecurity threats πŸ”

BEC scams, ransomware, and malware are some of the cybersecurity threats that cybercriminals use against real-estate agencies. Here's security advice, including scam prevention tips from the FBI.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the cloud is evolving to improve enterprise security πŸ”

Microsoft's executive vice president Jason Zander sat down with Dan Patterson to discuss cloud migration and how it benefits security in the enterprise.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Unknown, Unprotected Database Exposes Info on 80 Million US Households πŸ•΄

A database with no login required has been found to contain names, addresses, age, and more for over 80 million U.S. households.

πŸ“– Read

via "Dark Reading: ".
❌ Apple Defends Parental Control App Removal Amid Backlash ❌

After facing criticism for removing or restricting several parental control apps over the past year, Apple cited security and privacy reasons.

πŸ“– Read

via "Threatpost".
❌ MuddyWater APT Hones an Arsenal of Custom Tools ❌

The attack group shows a moderate level of sophistication, but the stage is set for MuddyWater to take things to the next level.

πŸ“– Read

via "Threatpost".
❌ Malware Infests Popular Pirate Streaming Hardware ❌

Hardware that supports pirated video streaming content comes packed with malware.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 Types of Experiences Every Security Pro Should Have πŸ•΄

As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Credit Card Compromise Up 212% as Hackers Eye Financial Sector πŸ•΄

Financial services firms saw upticks in credential leaks and credit card compromise as cybercriminals go where the money is.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Peer-to-Peer Vulnerability Exposes Millions of IoT Devices πŸ•΄

A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Docker Forces Password Reset for 190,000 Accounts After Breach πŸ•΄

Organizations impacted by breach, which gave attackers illegal access to a database containing sensitive account information, need to check their container images.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat USA Offers an Inside Look at Intel's Security Engine πŸ•΄

Come to the August event and learn how Intel's Converged Security and Manageability Engine has been fine-tuned to guard against low-level firmware attacks.

πŸ“– Read

via "Dark Reading: ".
⚠ Man posing as Hollywood superstar scams woman out of a β€˜fortune’ ⚠

She must have been star-struck, she said, after the fraudster hid behind the Fast & Furious star's photo and reached out from a fan page.

πŸ“– Read

via "Naked Security".
⚠ Facebook under investigation for harvesting 1.5m users’ contact lists ⚠

For years, Facebook asked some new users for email passwords, then grabbed their contacts without consent (or any way to stop the process).

πŸ“– Read

via "Naked Security".
⚠ Docker breach of 190,000 users exposes lack of two-factor authentication ⚠

The containerisation platform has asked 190k users to change their passwords after hackers gained access to a database of personal data.

πŸ“– Read

via "Naked Security".
πŸ” 61% of IT pros have experienced a serious data breach πŸ”

Cybercriminals continue to target intellectual property, putting companies at risk for financial and brand reputation hits, according to McAfee.

πŸ“– Read

via "Security on TechRepublic".
⚠ Securing edge devices – how to keep the crooks out of your network ⚠

The Good Guys from the Cyber Threat Alliance just published a report to help you keep the Bad Guys out of your network

πŸ“– Read

via "Naked Security".
πŸ•΄ Researchers Explore Remote Code Injection in macOS πŸ•΄

Deep Instinct analysts test three code injection methods and a custom-built Mach-O loader to load malicious files from memory.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why third-party providers pose a security risk to organizations πŸ”

A dependency on third-party cloud and hosting providers leaves businesses more vulnerable to potential cyber threats, according to RiskRecon and the Cyentia Institute.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Threat Intelligence Firms Look to AI, but Still Require Humans πŸ•΄

Machine learning and artificial intelligence are helping threat-intelligence firms cover a greater area of the darknet, but human analysts will always be necessary, experts say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How to Help Your Board Navigate Cybersecurity's Legal Risks πŸ•΄

What's worse than a massive data breach? A massive data breach followed by a shareholder derivative lawsuit. Learn what's at stake and what CISOs can do to mitigate the damage.

πŸ“– Read

via "Dark Reading: ".
⚠ Android users: watch out for this fake address bar trick ⚠

When is an address bar not an address bar? When it's a fake.

πŸ“– Read

via "Naked Security".