🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
âš  Cloud computing giant PCM hacked âš 

The attackers allegedly stole admin credentials for Office 365 accounts, and planned to use stolen data to conduct gift card fraud.

📖 Read

via "Naked Security".
🕴 Too Many Tools? Tidy Up in 'KonMari' Style 🕴

You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.

📖 Read

via "Dark Reading: ".
🕴 Planning a Bug Bounty Program? Follow In Shopify's Footsteps 🕴

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

📖 Read

via "Dark Reading: ".
🕴 To Pay or Not To Pay? That Is the (Ransomware) Question 🕴

From Albany, New York, to Atlanta, Georgia, to Del Rio, Texas, cities across the US have been hit with ransomware attacks.

📖 Read

via "Dark Reading: ".
🕴 Back to Basics with Log Management, SIEMs & MSSPs 🕴

Still not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.

📖 Read

via "Dark Reading: ".
🕴 Staying Ahead of the Bot Landscape 🕴

Thinking of the bot landscape as homogeneous paints an overly simplistic picture.

📖 Read

via "Dark Reading: ".
🕴 How to Defend Credentials From Automated Attack Tools 🕴

The following recommendations can help both end users and Web defenders mitigate credential abuse attacks.

📖 Read

via "Dark Reading: ".
🕴 3 Security Imperatives And The Evolving Digital Topology 🕴

No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.

📖 Read

via "Dark Reading: ".
🕴 DHS's Bob Kolasky Goes All in on Risk Management 🕴

As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.

📖 Read

via "Dark Reading: ".
🕴 Capture the Flag: Training Made Fun 🕴

CTFs require participants to be creative while using their critical-thinking and problem-solving skills to ultimately arrive at a functional solution.

📖 Read

via "Dark Reading: ".
🕴 Security Considerations in a BYOD Culture 🕴

The 'bring your own device' movement has put security pros on high alert for a new breed of predator on the hunt to find ways to exploit the ever-expanding attack surface.

📖 Read

via "Dark Reading: ".
🕴 The 10 Essential Basics of Infosec Forensics 🕴

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

📖 Read

via "Dark Reading: ".
🕴 The Truth About Vulnerabilities in Open Source Code 🕴

The problem isn't with the code itself, experts say.

📖 Read

via "Dark Reading: ".
🕴 Keep Your Eye on Digital Certificates 🕴

X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expiration and must be managed.

📖 Read

via "Dark Reading: ".
🕴 A Security-First Approach to DevOps 🕴

A lack of a security mandate in the development process has given rise to the recognized need for application security.

📖 Read

via "Dark Reading: ".
🕴 There's a Security Incident in the Cloud: Who's Responsible? 🕴

It's a valid question, and one many enterprises remain unsure of amid a mass migration that has transformed business over the past few years.

📖 Read

via "Dark Reading: ".
🕴 VPNs' Future: Less Reliant on Users, More Transparent, And Smarter 🕴

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the Internet of Things need protection.

📖 Read

via "Dark Reading: ".
🕴 What Every Security Team Should Know About Internet Threats 🕴

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

📖 Read

via "Dark Reading: ".
🕴 How to Create Smarter Risk Assessments 🕴

Quantitative measurements - likelihood of loss, hard-dollar financial impact -- are what executives and directors need to make more informed decisions about security risks

📖 Read

via "Dark Reading: ".
🕴 Consumer Data, Upcoming Elections Are at Risk, Black Hat Survey Says 🕴

Newly published '2019 Black Hat USA Attendee Survey' recommends users stay off social media and remain wary of products that promise to solve security problems.

📖 Read

via "Dark Reading: ".