πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Man posing as Hollywood superstar scams woman out of a β€˜fortune’ ⚠

She must have been star-struck, she said, after the fraudster hid behind the Fast & Furious star's photo and reached out from a fan page.

πŸ“– Read

via "Naked Security".
⚠ Facebook under investigation for harvesting 1.5m users’ contact lists ⚠

For years, Facebook asked some new users for email passwords, then grabbed their contacts without consent (or any way to stop the process).

πŸ“– Read

via "Naked Security".
⚠ Docker breach of 190,000 users exposes lack of two-factor authentication ⚠

The containerisation platform has asked 190k users to change their passwords after hackers gained access to a database of personal data.

πŸ“– Read

via "Naked Security".
πŸ” 61% of IT pros have experienced a serious data breach πŸ”

Cybercriminals continue to target intellectual property, putting companies at risk for financial and brand reputation hits, according to McAfee.

πŸ“– Read

via "Security on TechRepublic".
⚠ Securing edge devices – how to keep the crooks out of your network ⚠

The Good Guys from the Cyber Threat Alliance just published a report to help you keep the Bad Guys out of your network

πŸ“– Read

via "Naked Security".
πŸ•΄ Researchers Explore Remote Code Injection in macOS πŸ•΄

Deep Instinct analysts test three code injection methods and a custom-built Mach-O loader to load malicious files from memory.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why third-party providers pose a security risk to organizations πŸ”

A dependency on third-party cloud and hosting providers leaves businesses more vulnerable to potential cyber threats, according to RiskRecon and the Cyentia Institute.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Threat Intelligence Firms Look to AI, but Still Require Humans πŸ•΄

Machine learning and artificial intelligence are helping threat-intelligence firms cover a greater area of the darknet, but human analysts will always be necessary, experts say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How to Help Your Board Navigate Cybersecurity's Legal Risks πŸ•΄

What's worse than a massive data breach? A massive data breach followed by a shareholder derivative lawsuit. Learn what's at stake and what CISOs can do to mitigate the damage.

πŸ“– Read

via "Dark Reading: ".
⚠ Android users: watch out for this fake address bar trick ⚠

When is an address bar not an address bar? When it's a fake.

πŸ“– Read

via "Naked Security".
πŸ” Android Security Bulletin April 2019: What you need to know πŸ”

Another month is here and Android finds itself with a mixture of critical and high vulnerabilities.

πŸ“– Read

via "Security on TechRepublic".
❌ BEC Hack Cons Catholic Church Out of $1.75 Million ❌

An Ohio parish lost a whopping $1.75 million after attackers breached two employees' email accounts - and then tricked other employees into sending wire transfers to a fraudulent bank account.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2015-9286

Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.

πŸ“– Read

via "National Vulnerability Database".
❌ Researchers Compromise Netflix Content in Widevine DRM Hack ❌

A bug in the popular anti-piracy framework allows a side-channel attack on premium content.

πŸ“– Read

via "Threatpost".
πŸ” The Best Tools & Techniques for Employee Security Awareness Training πŸ”

Phishing simulation training? Audits? Incentivizing training? We talked to 18 infosec leaders and asked them what the best tools and techniques for employee security awareness training are.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Microsoft 365 Updated with New Compliance, Encryption, Privacy Controls πŸ•΄

New tools, such as Compliance Manager and Advanced Message Encryption, aim to give businesses more options for data privacy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ California Consumer Privacy Act: 4 Compliance Best Practices πŸ•΄

Companies that get ahead of the January 2020 data privacy deadline can minimize the risk of sanctions and also gain a competitive advantage in the marketplace.

πŸ“– Read

via "Dark Reading: ".
❌ New β€˜Sodinokibi’ Ransomware Exploits Critical Oracle WebLogic Flaw ❌

A recently-patched critical flaw in Oracle WebLogic is being actively exploited to peddle a new ransomware variant, which researchers call "Sodinokibi."

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-10055 (tensorflow)

Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.

πŸ“– Read

via "National Vulnerability Database".
❌ Fake Jason Statham Bilks a Fan Out of Serious Money ❌

A scam version of the actor convinced a woman he was in love with her.

πŸ“– Read

via "Threatpost".
πŸ•΄ Confluence Vulnerability Opens Door to GandCrab πŸ•΄

An exploit of the vulnerability offers attackers a ransomware surface that doesn't need email.

πŸ“– Read

via "Dark Reading: ".