πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” The Best Tools & Techniques for Employee Security Awareness Training πŸ”

Phishing simulation training? Audits? Incentivizing training? We talked to 18 infosec leaders and asked them what the best tools and techniques for employee security awareness training are.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Microsoft 365 Updated with New Compliance, Encryption, Privacy Controls πŸ•΄

New tools, such as Compliance Manager and Advanced Message Encryption, aim to give businesses more options for data privacy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ California Consumer Privacy Act: 4 Compliance Best Practices πŸ•΄

Companies that get ahead of the January 2020 data privacy deadline can minimize the risk of sanctions and also gain a competitive advantage in the marketplace.

πŸ“– Read

via "Dark Reading: ".
❌ New β€˜Sodinokibi’ Ransomware Exploits Critical Oracle WebLogic Flaw ❌

A recently-patched critical flaw in Oracle WebLogic is being actively exploited to peddle a new ransomware variant, which researchers call "Sodinokibi."

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-10055 (tensorflow)

Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.

πŸ“– Read

via "National Vulnerability Database".
❌ Fake Jason Statham Bilks a Fan Out of Serious Money ❌

A scam version of the actor convinced a woman he was in love with her.

πŸ“– Read

via "Threatpost".
πŸ•΄ Confluence Vulnerability Opens Door to GandCrab πŸ•΄

An exploit of the vulnerability offers attackers a ransomware surface that doesn't need email.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Database Leaks, Network Traffic Top Data Exfiltration Methods πŸ•΄

Intellectual property and personally identifiable information tie for the type of data IT practitioners are worried about losing.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Financial Data for Multiple Companies Dumped Online in Failed Extortion Bid πŸ•΄

Potential victims reportedly include Oracle, Volkswagen, Airbus and Porsche.

πŸ“– Read

via "Dark Reading: ".
⚠ Crooks using hacked Microsoft email accounts to steal cryptocurrency ⚠

Hacked Microsoft email accounts are being used by criminals to compromise victims' cryptocurrency exchange accounts and empty their funds.

πŸ“– Read

via "Naked Security".
⚠ Mystery database exposes data on 80 million US households ⚠

Put on your detective hat - the researchers who found it say it's full of people's data, but not who it belongs to.

πŸ“– Read

via "Naked Security".
⚠ Diabetics are hunting down obsolete insulin pumps with a security flaw ⚠

The flaw makes it possible to overwrite the devices' programming and insert an algorithm that turns them into artificial pancreases.

πŸ“– Read

via "Naked Security".
⚠ Millions of consumer smart devices exposed by serious security flaw ⚠

This IoT software flaw could render millions of consumer devices, including baby monitors and webcams, open to remote discovery and hijack.

πŸ“– Read

via "Naked Security".
⚠ Keeping your data safe when traveling ⚠

Our data is especially vulnerable when we ourselves are too: at border crossings and when in unfamiliar environments.

πŸ“– Read

via "Naked Security".
❌ Muhstik Botnet Variant Targets Just-Patched Oracle WebLogic Flaw ❌

Researchers are urging Oracle WebLogic users to update quickly - after new Muhstik botnet samples started targeting a critical flaw in the servers.

πŸ“– Read

via "Threatpost".
πŸ” Are passwords obsolete? 5 things that could replace them πŸ”

Employees are still using "123456" and "qwerty" far too often. Here are five ID forms that could better protect the enterprise to consider on World Password Day.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Digital Transformation Exposes Operational Technology & Critical Infrastructure πŸ•΄

The convergence of OT and IP-based IT networks makes society more vulnerable, requiring CISOs to rethink defense.

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft 365 to offer tighter security and privacy controls πŸ”

New controls will be able to help businesses better manage encrypted emails, block the sharing of sensitive information, and investigate possible security issues.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Dell vs. Lenovo: Which laptops are better for business? πŸ”

Dell unveiled the latest generation of the Latitude series of business laptops. Here's how they stack up to Lenovo's ThinkPad lineup.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 7 Types of Experiences Every Security Pro Should Have πŸ•΄

As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.

πŸ“– Read

via "Dark Reading: ".
❌ Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos ❌

Ricardo Milos joined Ben 10, Adventure Time and We Bare Bear videos on its websites over the weekend.

πŸ“– Read

via "Threatpost".