πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Digital Transformation Exposes Operational Technology & Critical Infrastructure πŸ•΄

The convergence of OT and IP-based IT networks makes society more vulnerable, requiring CISOs to rethink defense.

πŸ“– Read

via "Dark Reading: ".
πŸ” Microsoft 365 to offer tighter security and privacy controls πŸ”

New controls will be able to help businesses better manage encrypted emails, block the sharing of sensitive information, and investigate possible security issues.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Dell vs. Lenovo: Which laptops are better for business? πŸ”

Dell unveiled the latest generation of the Latitude series of business laptops. Here's how they stack up to Lenovo's ThinkPad lineup.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 7 Types of Experiences Every Security Pro Should Have πŸ•΄

As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.

πŸ“– Read

via "Dark Reading: ".
❌ Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos ❌

Ricardo Milos joined Ben 10, Adventure Time and We Bare Bear videos on its websites over the weekend.

πŸ“– Read

via "Threatpost".
πŸ” More Cybersecurity Regulation Oversight Possible Under New NYDFS Division πŸ”

The creation of a new NYDFS division to review and respond to cybersecurity events and enforce policy around financial crimes could lead to increased oversight under the department’s watershed Cybersecurity Rule (23 NYCRR 500).

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Staffing the Software Security Team: Who You Gonna Call? πŸ•΄

Recruiting developers and testers from the product group is a great way to build a top-notch application security team. Here's why.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Huge DDoS Attacks Shift Tactics in 2019 πŸ•΄

Analysis of two high-volume DDoS attacks show they're becoming more difficult to remediate with changes to port and address strategies.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 8 Personality Traits for Cybersecurity πŸ•΄

Personality assessment firm Hogan Assessments lists top characteristics for a 'successful' cybersecurity hire.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Study Exposes Breadth of Cyber Risk πŸ•΄

New study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well.

πŸ“– Read

via "Dark Reading: ".
❌ DHS Shortens Deadline For Gov Agencies to Fix Critical Flaws ❌

A new binding directive gives U.S. agencies just 15 days - as opposed to 30 days - to remediate critical flaws on their systems.

πŸ“– Read

via "Threatpost".
❌ Wipro Attackers Have Operated Under the Radar for Years ❌

The adversaries have the hallmarks of an advanced, organized group, with well-established infrastructure.

πŸ“– Read

via "Threatpost".
πŸ•΄ Digital Ad-Fraud Losses Decline πŸ•΄

Even so, more work remains to be done to address online ad fraud operations that cause billions of dollars in losses annually for advertisers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why human error is still the top cybersecurity risk for organizations πŸ”

C-suite executives are turning to AI and machine learning-based security solutions to combat threats, according to an Oracle report.

πŸ“– Read

via "Security on TechRepublic".
❌ Ad Server Patched to Stop Possible Malware Distribution ❌

Revive Adserver patches two vulnerability, one of which may have been used to allow hackers to deliver malware to third-party websites.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro πŸ•΄

Breach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint.

πŸ“– Read

via "Dark Reading: ".
πŸ” Evidence of backdoors in Huawei equipment collapse under light scrutiny πŸ”

A cursory search finds identical "backdoors" in D-Link, Cisco, and Sony devices, among others, as poor security practices do not equate to malicious intent.

πŸ“– Read

via "Security on TechRepublic".
⚠ US Government halves deadline for applying critical patches to 15 days ⚠

US federal agencies must fix their security bugs twice as quickly under new rules issued by the Department of Homeland Security (DHS).

πŸ“– Read

via "Naked Security".
⚠ Extortionists leak data of huge firms after IT provider refuses to pay ⚠

The data was published after "Boris Bullet-Dodger" failed to get Citycomp to cough up.

πŸ“– Read

via "Naked Security".
⚠ Is a sticky label the answer to the IoT’s security problems? ⚠

How can IoT security be improved? The UK Government just published new details of its surprising and unfashionable answer.

πŸ“– Read

via "Naked Security".
⚠ DHS policies allow unlimited, warrantless device search ⚠

Newly revealed policies show border agents can search devices for pretty much any reason, including if some other agency asked them to.

πŸ“– Read

via "Naked Security".