πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ How Retailers Can Stay Protected During the Most Wonderful Time of the Year πŸ•΄

Retailers' new holiday jingle must hit cybersecurity high points to help survive the season. Forget Dasher and Dancer β€” add SAST and DAST to app testing; manage third-party risks; and use MFA along with training and proper authentication to secure credentials.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Network Perception and Check Point Software Technologies Partner to Tighten the Security of OT Firewall Environments πŸ•΄

Integrated OT solution streamlines the auditing of firewalls for misconfigurations and conflicting rules.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep108: You hid THREE BILLION dollars in a popcorn tin? ⚠

Patches, busts, leaks and why even low-likelihood exploits can be high-severity risks - listen now!

πŸ“– Read

via "Naked Security".
πŸ“’ Medibank admits ransomware attack is far worse than previously thought πŸ“’

The company now believes around 9.7 million past and present customers have been affected by the attack, and has said it is refusing to pay the ransom

πŸ“– Read

via "ITPro".
πŸ“’ VMware brings XDR capabilities to Carbon Black in a push for lateral security πŸ“’

The cloud giant aims to provide customers with the means to identify and rectify weaknesses across their environments

πŸ“– Read

via "ITPro".
πŸ“’ Six cyber security holes you need to plug now πŸ“’

We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business

πŸ“– Read

via "ITPro".
πŸ“’ How to turn on Windows Defender πŸ“’

Find out how to switch on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessary

πŸ“– Read

via "ITPro".
πŸ“’ Highest paying tech jobs of 2022 πŸ“’

A guide to the best paying technology jobs in both the US and UK, and what they entail

πŸ“– Read

via "ITPro".
πŸ“’ IT Pro News in Review: Cyber security exploits surge, Dropbox phishing alert, public cloud spending on the up πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ•΄ Managing and Mitigating Risk From Unknown Unknowns πŸ•΄

Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Lawsuit Seeks Food Benefits Stolen By Skimmers β™ŸοΈ

A nonprofit organization is suing the state of Massachusetts on behalf of thousands of low-income families who were collectively robbed of more than a $1 million in food assistance benefits by card skimming devices secretly installed at cash machines and grocery store checkout lanes across the state. Federal law bars states from replacing these benefits using federal funds, and a recent rash of skimming incidents nationwide has disproportionately affected those receiving food assistance via state-issued prepaid debit cards.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ LockBit Bigwig Arrested for Ransomware Crimes πŸ•΄

A dual Russian-Canadian citizen is being extradited to the US to face charges related to LockBit ransomware activities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Veterans Day Salute: 6 Reasons Why You Want Vets in Your Cyber Platoon πŸ•΄

We commend vets in cyber, with this look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Twitter's CISO Takes Off, Leaving Security an Open Question πŸ•΄

Lea Kissner was one of three senior executives to quit this week, leaving many to wonder if the social media giant is ripe for a breach and FTC action.

πŸ“– Read

via "Dark Reading".
πŸ‘2
πŸ•΄ Cyberwar and Cybercrime Go Hand in Hand πŸ•΄

The line between criminal and political aims has become blurred, but motivations matter less than the effects of a breach.

πŸ“– Read

via "Dark Reading".
πŸ‘3
πŸ—“οΈ CSRF in Plesk API enabled privilege escalation πŸ—“οΈ

Bugs in programming interfaces of web hosting admin tool patched

πŸ“– Read

via "The Daily Swig".
⚠ Emergency code execution patch from Apple – but not an 0-day ⚠

Not a zero-day, but important enough for a quick-fire patch to one system library...

πŸ“– Read

via "Naked Security".
πŸ‘1
⚠ S3 Ep108: You hid THREE BILLION dollars in a popcorn tin? ⚠

Patches, busts, leaks and why even low-likelihood exploits can be high-severity risks - listen now!

πŸ“– Read

via "Naked Security".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.7.11 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
😱1
πŸ•΄ Okta Launches New Workforce Identity Cloud πŸ•΄

Okta Worforce Identity Cloud has all three identity functions – identity access management, identity governance, and privilege access management – under the hood.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why CVE Management as a Primary Strategy Doesn't Work πŸ•΄

With only about 15% of vulnerabilities actually exploitable, patching every vulnerability is not an effective use of time.

πŸ“– Read

via "Dark Reading".