πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 3 Security Imperatives And The Evolving Digital Topology πŸ•΄

No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Capture the Flag: Training Made Fun πŸ•΄

CTFs require participants to be creative while using their critical-thinking and problem-solving skills to ultimately arrive at a functional solution.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Keep Your Eye on Digital Certificates πŸ•΄

X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expiration and must be managed.

πŸ“– Read

via "Dark Reading: ".
⚠ ETERNALBLUE sextortion scam puts your password where your name should be ⚠

Here's a sextortion scam that puts your password right where your name would usually be, to rattle your cage even more than usual.

πŸ“– Read

via "Naked Security".
πŸ•΄ Building the Future Through Security Internships πŸ•΄

Akamai University, a 12-week internship program, was built from the ground up with the goal of promoting the student not the company.

πŸ“– Read

via "Dark Reading: ".
⚠ RDP BlueKeep exploit shows why you really, really need to patch ⚠

A video of the exploit shows CVE-2019-0708 being exploited remotely, without authentication.

πŸ“– Read

via "Naked Security".
πŸ•΄ How to Create Smarter Risk Assessments πŸ•΄

Quantitative measurements - likelihood of loss, hard-dollar financial impact -- are what executives and directors need to make more informed decisions about security risks

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Truth About Your Software Supply Chain πŸ•΄

Open source components help developers innovate faster, but they sometimes come at a high price.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Planning a Bug Bounty Program? Follow In Shopify's Footsteps πŸ•΄

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Considerations in a BYOD Culture πŸ•΄

The 'bring your own device' movement has put security pros on high alert for a new breed of predator on the hunt to find ways to exploit the ever-expanding attack surface.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The 10 Essential Basics of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ VPNs' Future: Less Reliant on Users, More Transparent, And Smarter πŸ•΄

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the Internet of Things need protection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What Every Security Team Should Know About Internet Threats πŸ•΄

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

πŸ“– Read

via "Dark Reading: ".
❌ Dating App Jack’d Fined After Leaking Users’ Nude Pics ❌

LGBQT dating app Jack'd has been slapped with a $240,000 fine on the heels of a data breach that leaked personal data and nude photos of its users.

πŸ“– Read

via "Threatpost".
πŸ•΄ Malware Coming to a Mac Near You? Yes, Say Security Firms πŸ•΄

While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA πŸ•΄

Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Hits Georgia Court System πŸ•΄

The court's IT department is meeting with external agencies to determine the scope and severity of the cyberattack.

πŸ“– Read

via "Dark Reading: ".
πŸ‘1
πŸ” 10 tips for dealing with an online impersonator πŸ”

When someone impersonates you online it can be a frightening and stressful experience. Learn how to safeguard your identity and accounts.

πŸ“– Read

via "Security on TechRepublic".