πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Patrolling the New Cybersecurity Perimeter πŸ•΄

Remote work and other developments demand a shift to managing people rather than devices.

πŸ“– Read

via "Dark Reading: ".
πŸ” The KGB's eavesdropping and spying devices in everyday items πŸ”

The KGB Espionage Museum's curator Agne Urbaityte explains why and how plates and ashtrays were used as eavesdropping and spying devices.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Startup Raises $13.7M to Stop Breaches with Behavioral Analytics πŸ•΄

TrueFort plans to use the funding to expand sales, marketing, R&D, customer support, and go-to-market initiatives.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-7404

OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Pledges to Not Pay Ransomware Hit Reality πŸ•΄

While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 6/21 Edition πŸ”

A $600,000 ransom is paid, a phishing attack yields more victims than expected, and a trio of university data breaches - catch up on the week's news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Four CVEs Describe SACKs of Linux and FreeBSD Vulnerabilities πŸ•΄

Four new CVEs present issues that have a potential DoS impact on almost every Linux user.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-15694

When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cyber-Risks Hiding Inside Mobile App Stores πŸ•΄

As the number of blacklisted apps on Google Play continues to drop, attackers find new ways to compromise smartphones.

πŸ“– Read

via "Dark Reading: ".
❌ Podcast: Dating App Privacy and NASA Cyberattack ❌

The Threatpost team discusses the top news of the week - from a NASA cyberincident to dating app privacy issues.

πŸ“– Read

via "Threatpost".
❌ Microsoft Outlook for Android Open to XSS Attacks ❌

A spoofing bug (CVE-2019-1105) can open the door to an email attack chain.

πŸ“– Read

via "Threatpost".
❌ MobOk Malware Hides in Photo Editors on Google Play, Siphons Cash ❌

Pink Camera apps secretly signed users up for premium subscription services.

πŸ“– Read

via "Threatpost".
πŸ” How to view your privacy settings for Microsoft Office 365 πŸ”

You can and should review your privacy settings for Microsoft Office 365. Learn how in this step-by-step tutorial.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 20 stories of the week ⚠

From Bella Thorne publishing her own nudes to the Yubikey recall - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Facebook posts reveal your hidden illnesses, say researchers ⚠

The language we use could be indicators of disease and, with patient consent, could be monitored just like physical symptoms.

πŸ“– Read

via "Naked Security".
⚠ Desjardins’ employee from hell spills 2.9m records ⚠

The leak, carried out by a since-fired rogue employee, affected 2.7 million people and 173,000 businesses - about 41% of its clientele.

πŸ“– Read

via "Naked Security".
⚠ Mobile apps riddled with high-risk vulnerabilities, warns report ⚠

Be careful before installing that mobile app on your iOS or Android device - many mobile applications are riddled with vulnerabilities.

πŸ“– Read

via "Naked Security".
⚠ Mozilla patched two Firefox zero-day flaws in one week ⚠

Two emergency zero days affecting a browser in one week counts as unusual - especially when they pop up as separate alerts two days apart.

πŸ“– Read

via "Naked Security".
❌ The Modern-Day Heist: IP Theft Techniques That Enable Attackers ❌

There's more than one way to get inside a company.

πŸ“– Read

via "Threatpost".
❌ Iran Targeting U.S. With Destructive Wipers, Warns DHS ❌

The Department of Homeland Security is warning that U.S. agencies are being targeted by Iranian-backed cyberattacks with destructive wiper malware.

πŸ“– Read

via "Threatpost".
πŸ•΄ Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks πŸ•΄

The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.

πŸ“– Read

via "Dark Reading: ".