πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How a malicious USB could lead to a years-long cryptomining infection on your PC πŸ”

Despite their ubiquity, USB devices remain a critical cybersecurity threat.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Walmart now uses blockchain to trace food, will others follow? πŸ”

Walmart and Sam's Club will now trace leafy greens with blockchain technology, demonstrating its value in logistics and supply chain applications.

πŸ“– Read

via "Security on TechRepublic".
❌ VPNFilter’s Arsenal Expands With Newly Discovered Modules ❌

Seven new modules discovered in VPNFilter further fill in the blanks about how the malware operates and reveals a wider breath of capabilities.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ A 'Cyber Resilience' Report Card for the Public Sector πŸ•΄

Government agencies are making great strides in defending themselves against cyberattacks, according to new research from Accenture. But technology alone won't solve the problem.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SEC Slams Firm with $1M Fine for Weak Security Policies πŸ•΄

This is the first SEC enforcement cracking down on violation of the Identity Theft Red Flags Rule, intended to protect confidential data.

πŸ“– Read

via "Dark Reading: ".
πŸ” 10 biggest moments in IT from the last decade πŸ”

From 4G to AI and Chromebooks to Android, tech's evolution over the past decade has introduced us to new technologyβ€”and new security issues.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ VPNFilter Evolving to Be a More Dangerous Threat πŸ•΄

VPNFilter malware is adding capabilities to become a more fully-featured tool for threat actors.

πŸ“– Read

via "Dark Reading: ".
❌ 2018 Has Been Open Season on Open Source Supply Chains ❌

Hackers see green field opportunities in vulnerable software supply chains.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Uber Agrees to Pay $148 Million in Nationwide Settlement πŸ•΄

Riding-sharing company settles legal cases with 50 states and the District of Columbia for its handling of 2016 data breach.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-15608

Inedo ProGet before 5.0 Beta5 has CSRF, allowing an attacker to change advanced settings.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Critical Linux Kernel Flaw Gives Root Access to Attackers πŸ•΄

All versions of Red Hat Enterprise Linux, CentOS vulnerable to 'Mutagen Astronomy' flaw, according to Qualys.

πŸ“– Read

via "Dark Reading: ".
⚠ Malware hits fashion giant SHEIN; 6.42 million online shoppers affected ⚠

The online fashion store is now contacting affected users and asking them to change passwords for their online store accounts.

πŸ“– Read

via "Naked Security".
⚠ Spotify offers playlists tailored to your DNA ⚠

Spotify and Ancestry have teamed up to let you use your real DNA to tell your β€œmusical” DNA.

πŸ“– Read

via "Naked Security".
⚠ Firefox Monitor starts tracking breached email addresses ⚠

Mozilla has formally launched Firefox Monitor, a privacy-engineered website that hooks up to Troy Hunt’s Have I Been Pwned? (HIBP) breach notification database.

πŸ“– Read

via "Naked Security".
πŸ•΄ Google to Stop Automatically Logging Users into Chrome πŸ•΄

The decision comes days after security researcher had blasted company for jeopardizing user privacy with browser update.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Learn New Ways to Spot and Plug Vulnerabilities at Black Hat Europe πŸ•΄

Come out to London Dec 3-6 and learn to use new tools (including the laws of physics) to identify hidden vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ” How cybersecurity will evolve in a 5G connected world πŸ”

A panel of cybersecurity and tech professionals gathered at the 2018 AT&T Business Summit to discuss the future of 5G security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” British Airways data theft demonstrates need for cross-site scripting restrictions πŸ”

A major airline suffered a data breach involving a cross-site scripting attack. Learn how it happened and how you can protect your organization.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Managing Data the Way We Manage Money πŸ•΄

In the data-driven enterprise, myriad types of data have become a new form and flow of currency. Why, then, hasn't the CISO achieved parity with the CFO?

πŸ“– Read

via "Dark Reading: ".