πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Digital Ad-Fraud Losses Decline πŸ•΄

Even so, more work remains to be done to address online ad fraud operations that cause billions of dollars in losses annually for advertisers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why human error is still the top cybersecurity risk for organizations πŸ”

C-suite executives are turning to AI and machine learning-based security solutions to combat threats, according to an Oracle report.

πŸ“– Read

via "Security on TechRepublic".
❌ Ad Server Patched to Stop Possible Malware Distribution ❌

Revive Adserver patches two vulnerability, one of which may have been used to allow hackers to deliver malware to third-party websites.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro πŸ•΄

Breach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint.

πŸ“– Read

via "Dark Reading: ".
πŸ” Evidence of backdoors in Huawei equipment collapse under light scrutiny πŸ”

A cursory search finds identical "backdoors" in D-Link, Cisco, and Sony devices, among others, as poor security practices do not equate to malicious intent.

πŸ“– Read

via "Security on TechRepublic".
⚠ US Government halves deadline for applying critical patches to 15 days ⚠

US federal agencies must fix their security bugs twice as quickly under new rules issued by the Department of Homeland Security (DHS).

πŸ“– Read

via "Naked Security".
⚠ Extortionists leak data of huge firms after IT provider refuses to pay ⚠

The data was published after "Boris Bullet-Dodger" failed to get Citycomp to cough up.

πŸ“– Read

via "Naked Security".
⚠ Is a sticky label the answer to the IoT’s security problems? ⚠

How can IoT security be improved? The UK Government just published new details of its surprising and unfashionable answer.

πŸ“– Read

via "Naked Security".
⚠ DHS policies allow unlimited, warrantless device search ⚠

Newly revealed policies show border agents can search devices for pretty much any reason, including if some other agency asked them to.

πŸ“– Read

via "Naked Security".
πŸ” Companies are still failing to effectively manage passwords πŸ”

Though most businesses have complex password requirements in place, many are falling into other traps of poor password management, according to a survey from OneLogin.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to protect your business from account takeover attacks: 3 tips πŸ”

Account takeovers are one of the fastest-growing email security threats hitting Office 365 accounts, according to Barracuda.

πŸ“– Read

via "Security on TechRepublic".
⚠ World Password Day – what (NOT!) to do ⚠

Yeah, yeah, yeah... we really ought to get around to picking proper passwords for everything - and here's why!

πŸ“– Read

via "Naked Security".
πŸ” Digital transformation increases cyber risk for 8 out of 10 companies πŸ”

Organizations are not prepared to handle cyber breaches due to gaps in IT security and basic operations, according to a 1E survey.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Hackers impersonate Microsoft more than any other brand in phishing attacks πŸ”

Phishers tend to focus on business during the week, social media and finance on the weekend, according to a Vade Secure report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ World Password Day or Groundhog Day? πŸ•΄

Despite decades trying to fortify our passwords with bolt-on solutions, attackers have always found ways to defeat them. Here are four reasons why.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Are We Still Celebrating World Password Day? πŸ•΄

Calls to eliminate the password abound on this World Password Day - and the technology to change is ready. So why can't we get off our password habit?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Facebook, Instagram Are Phishers' Favorite Social Platforms πŸ•΄

Cloud companies continue to represent the most phishing URLs, but social media saw the most growth in Q1 2019.

πŸ“– Read

via "Dark Reading: ".
❌ Cisco Warns of Critical Nexus 9000 Data Center Flaw ❌

Part of a slew of patches from the networking vendor, the CVSS 9.8 bug allows remote takeover of a vulnerable device.

πŸ“– Read

via "Threatpost".
πŸ” 6 ways to strengthen your password πŸ”

Make an effort to secure your digital life with these helpful, easy-to-follow password tips.

πŸ“– Read

via "Security on TechRepublic".
πŸ” NIST Sets New Standard for Data Encryption Testing πŸ”

NIST has updated the Federal Information Processing Standard, or FIPS, to align with the international standard, ISO 19790 for the first time,

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2018-14559 (ac10_firmware, ac7_firmware, ac9_firmware)

An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A buffer overflow vulnerability exists in the router's web server (httpd). When processing the list parameters for a post request, the value is directly written with sprintf to a local variable placed on the stack, which overrides the return address of the function, causing a buffer overflow.

πŸ“– Read

via "National Vulnerability Database".