πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Your data, stolen twice: Pirated phishing kit contains hidden backdoor πŸ”

A commercial phishing platform that targets Apple users has proven popular enough for other criminals to pirate, though the pirated version transmits harvested data through a hidden back channel.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to improve cloud provider security: 4 tips πŸ”

Many IT pros remain concerned with the risk of data loss and leakage in the cloud, according to a new survey from AlgoSec.

πŸ“– Read

via "Security on TechRepublic".
❌ Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable ❌

A flaw in the Secure Boot trusted hardware root-of-trust affects enterprise, military and government network gear, including routers, switches and firewalls.

πŸ“– Read

via "Threatpost".
πŸ•΄ KnowBe4 Focuses on Security Culture with CLTRe Acquisition πŸ•΄

The acquisition solidifies KnowBe4's European presence and shows a focus on building and measuring security culture.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Narrow the Cyber Skills Gap with Attackers, Cut the Red Tape πŸ•΄

Attackers are getting further ahead, and entrenched corporate rules shoulder much of the blame.

πŸ“– Read

via "Dark Reading: ".
πŸ” Half A Million DPOs in Place One Year Post-GDPR πŸ”

One year after GDPR was first implemented, an estimated 500,000 organizations have registered data protection officers in place.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 49 Million Instagram Influencer Records Exposed in Open Database πŸ•΄

An AWS-hosted database was configured with no username or password required for access to personal data.

πŸ“– Read

via "Dark Reading: ".
❌ Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter ❌

Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world.

πŸ“– Read

via "Threatpost".
❌ Intel Fixes Critical, High-Severity Flaws Across Several Products ❌

Intel has issued fixes for a slew of vulnerabilities, separate from the side-channel bugs disclosed last week.

πŸ“– Read

via "Threatpost".
πŸ” Why post-quantum encryption will be critical to protect current classical computers πŸ”

Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.

πŸ“– Read

via "Security on TechRepublic".
❌ Mozilla Tackles Two Critical Flaws with Firefox 67 Release ❌

Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox, which touts better speed and privacy.

πŸ“– Read

via "Threatpost".
πŸ•΄ Satan Ransomware Adds More Evil Tricks πŸ•΄

The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to change the complexity of your Windows PIN πŸ”

Learn how to create a Windows PIN with more than four digits.

πŸ“– Read

via "Security on TechRepublic".
⚠ Most hackers for hire are scammers, research shows ⚠

Google & UC-San Diego researchers found that only 5 of 27 hacker-for-hire services actually launched attacks against their targets.

πŸ“– Read

via "Naked Security".
⚠ Don’t break Windows 10 by deleting SID, Microsoft warns ⚠

Sometimes it's best not to tinker under the hood - especially when it comes to security IDs.

πŸ“– Read

via "Naked Security".
⚠ Some Androids don’t call 911 when you tell them to call an ambulance ⚠

Sometimes you get a list of ambulance companies, sometimes a blog post on when it's OK to call an ambulance.

πŸ“– Read

via "Naked Security".
⚠ Cache of 49 million Instagram records found online ⚠

A security researcher has discovered a massive cache of data on millions of Instagram influencers, publicly accessible for everyone to see.

πŸ“– Read

via "Naked Security".
πŸ•΄ What You Need to Know About Zero Trust Security πŸ•΄

The zero trust model might be the answer to a world in which perimeters are made to be breached. Is it right for your organization?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Learn to Hack Non-Competes & Sell 0-Days at Black Hat USA πŸ•΄

Plus, hear from key figures about the history and the enduring influence of The Cult of the Dead Cow this August in Las Vegas.

πŸ“– Read

via "Dark Reading: ".
❌ Google Stored G Suite Passwords in Plaintext Since 2005 ❌

Google said it had stored G Suite enterprise users' passwords in plain text since 2005 marking a giant security faux pas.

πŸ“– Read

via "Threatpost".
πŸ•΄ Consumer IoT Devices Are Compromising Enterprise Networks πŸ•΄

While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.

πŸ“– Read

via "Dark Reading: ".