πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter ❌

Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world.

πŸ“– Read

via "Threatpost".
❌ Intel Fixes Critical, High-Severity Flaws Across Several Products ❌

Intel has issued fixes for a slew of vulnerabilities, separate from the side-channel bugs disclosed last week.

πŸ“– Read

via "Threatpost".
πŸ” Why post-quantum encryption will be critical to protect current classical computers πŸ”

Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.

πŸ“– Read

via "Security on TechRepublic".
❌ Mozilla Tackles Two Critical Flaws with Firefox 67 Release ❌

Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox, which touts better speed and privacy.

πŸ“– Read

via "Threatpost".
πŸ•΄ Satan Ransomware Adds More Evil Tricks πŸ•΄

The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to change the complexity of your Windows PIN πŸ”

Learn how to create a Windows PIN with more than four digits.

πŸ“– Read

via "Security on TechRepublic".
⚠ Most hackers for hire are scammers, research shows ⚠

Google & UC-San Diego researchers found that only 5 of 27 hacker-for-hire services actually launched attacks against their targets.

πŸ“– Read

via "Naked Security".
⚠ Don’t break Windows 10 by deleting SID, Microsoft warns ⚠

Sometimes it's best not to tinker under the hood - especially when it comes to security IDs.

πŸ“– Read

via "Naked Security".
⚠ Some Androids don’t call 911 when you tell them to call an ambulance ⚠

Sometimes you get a list of ambulance companies, sometimes a blog post on when it's OK to call an ambulance.

πŸ“– Read

via "Naked Security".
⚠ Cache of 49 million Instagram records found online ⚠

A security researcher has discovered a massive cache of data on millions of Instagram influencers, publicly accessible for everyone to see.

πŸ“– Read

via "Naked Security".
πŸ•΄ What You Need to Know About Zero Trust Security πŸ•΄

The zero trust model might be the answer to a world in which perimeters are made to be breached. Is it right for your organization?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Learn to Hack Non-Competes & Sell 0-Days at Black Hat USA πŸ•΄

Plus, hear from key figures about the history and the enduring influence of The Cult of the Dead Cow this August in Las Vegas.

πŸ“– Read

via "Dark Reading: ".
❌ Google Stored G Suite Passwords in Plaintext Since 2005 ❌

Google said it had stored G Suite enterprise users' passwords in plain text since 2005 marking a giant security faux pas.

πŸ“– Read

via "Threatpost".
πŸ•΄ Consumer IoT Devices Are Compromising Enterprise Networks πŸ•΄

While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.

πŸ“– Read

via "Dark Reading: ".
πŸ” Arm suspends cooperation with Huawei, endangering mobile and server business πŸ”

UK-based Arm Holdings has issued a memo to staff indicating it must stop working with Chinese equipment manufacturer Huawei, following a US trade dispute.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The 3 Cybersecurity Rules of Trust πŸ•΄

Every day, keeping anything secure requires being smart about trust. The rules of trust will keep you and your data safer.

πŸ“– Read

via "Dark Reading: ".
πŸ” Tech news roundup: GDPR turns 1, and who makes the best apps? πŸ”

Karen Roby reports on this week's biggest tech news, including Huawei's Android license and the one year anniversary of GDPR. How have businesses been affected by the legislation and what does Microsoft have to say about a potential version of the law in the US?

πŸ“– Read

via "Security on TechRepublic".
❌ Windows Zero-Day Drops on Twitter, Developer Promises 4 More ❌

SandboxEscaper has released her latest local privilege-escalation exploit for Windows.

πŸ“– Read

via "Threatpost".
πŸ” Tech news roundup: GDPR turns 1, and who makes the best apps? πŸ”

Karen Roby reports on this week's biggest tech news, including Huawei's Android license and the one year anniversary of GDPR. How have businesses been affected by the legislation and what does Microsoft have to say about a potential version of the law in the US?

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-1991

IBM API Connect 5.0.0.0, and 5.0.8.6 could could return sensitive information that could provide critical information as to the underlying software stack in CMC UI headers. IBM X-Force ID: 154284.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-10750

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

πŸ“– Read

via "National Vulnerability Database".