πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Keep Your Eye on Digital Certificates πŸ•΄

X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expiration and must be managed.

πŸ“– Read

via "Dark Reading: ".
⚠ ETERNALBLUE sextortion scam puts your password where your name should be ⚠

Here's a sextortion scam that puts your password right where your name would usually be, to rattle your cage even more than usual.

πŸ“– Read

via "Naked Security".
πŸ•΄ Building the Future Through Security Internships πŸ•΄

Akamai University, a 12-week internship program, was built from the ground up with the goal of promoting the student not the company.

πŸ“– Read

via "Dark Reading: ".
⚠ RDP BlueKeep exploit shows why you really, really need to patch ⚠

A video of the exploit shows CVE-2019-0708 being exploited remotely, without authentication.

πŸ“– Read

via "Naked Security".
πŸ•΄ How to Create Smarter Risk Assessments πŸ•΄

Quantitative measurements - likelihood of loss, hard-dollar financial impact -- are what executives and directors need to make more informed decisions about security risks

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Truth About Your Software Supply Chain πŸ•΄

Open source components help developers innovate faster, but they sometimes come at a high price.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Planning a Bug Bounty Program? Follow In Shopify's Footsteps πŸ•΄

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Considerations in a BYOD Culture πŸ•΄

The 'bring your own device' movement has put security pros on high alert for a new breed of predator on the hunt to find ways to exploit the ever-expanding attack surface.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The 10 Essential Basics of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ VPNs' Future: Less Reliant on Users, More Transparent, And Smarter πŸ•΄

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the Internet of Things need protection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What Every Security Team Should Know About Internet Threats πŸ•΄

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

πŸ“– Read

via "Dark Reading: ".
❌ Dating App Jack’d Fined After Leaking Users’ Nude Pics ❌

LGBQT dating app Jack'd has been slapped with a $240,000 fine on the heels of a data breach that leaked personal data and nude photos of its users.

πŸ“– Read

via "Threatpost".
πŸ•΄ Malware Coming to a Mac Near You? Yes, Say Security Firms πŸ•΄

While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA πŸ•΄

Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Hits Georgia Court System πŸ•΄

The court's IT department is meeting with external agencies to determine the scope and severity of the cyberattack.

πŸ“– Read

via "Dark Reading: ".
πŸ‘1
πŸ” 10 tips for dealing with an online impersonator πŸ”

When someone impersonates you online it can be a frightening and stressful experience. Learn how to safeguard your identity and accounts.

πŸ“– Read

via "Security on TechRepublic".
πŸ” With CCPA 6 Months Away, Advertising Industry Pushes for US Privacy Law πŸ”

An advertising trade group told the FTC last week that it supports a nation-wide data privacy standard that will provide enhanced privacy protections to consumers.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” You're going to pay more for .org and .info domains following ICANN's lifting of price caps πŸ”

Despite near-universal condemnation of the proposed lifting of price caps during a public comment period, ICANN will allow the operators of .org and .info to raise prices.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2016-5236

Cross-Site-Scripting (XSS) vulnerabilities in F5 WebSafe Dashboard 3.9.5 and earlier, aka F5 WebSafe Alert Server, allow privileged authenticated users to inject arbitrary web script or HTML when creating a new user, account or signature.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-5235

A Cross Site Scripting (XSS) vulnerability in versions of F5 WebSafe Dashboard 3.9.x and earlier, aka F5 WebSafe Alert Server, allows an unauthenticated user to inject HTML via a crafted alert.

πŸ“– Read

via "National Vulnerability Database".