πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ WithSecure Elements Endpoint Protection review: Holistic protection at a great price πŸ“’

Smart cloud-hosted security offering affordable endpoint protection for a wide range of devices at a good price

πŸ“– Read

via "ITPro".
πŸ“’ Apple issues fix for β€˜actively exploited’ WebKit zero-day vulnerability πŸ“’

The update marks the 10th fix for zero-day vulnerabilities this year

πŸ“– Read

via "ITPro".
πŸ“’ Beyond Identity strikes up strategic partnership with World Wide Technology πŸ“’

WWT will implement Beyond Identity’s authentication platform internally while also acting as a global channel partner

πŸ“– Read

via "ITPro".
πŸ“’ Uber says compromised third-party to blame for data breach πŸ“’

Vulnerable third-party vendor Teqtivity sparks second major incident for Uber in the space of three months

πŸ“– Read

via "ITPro".
πŸ“’ How to implement strong authentication πŸ“’

Strong authentication is hugely important, but implementing any regime at scale is not without its challenges

πŸ“– Read

via "ITPro".
πŸ“’ Cyber attack on Australia’s TPG Telecom affects 15,000 customers πŸ“’

It is the third cyber attack on a major Australian telco since October

πŸ“– Read

via "ITPro".
πŸ“’ Ransomware discovered carrying legitimate Windows certificates πŸ“’

Sophos researchers pointed to the sophisticated signatures as a sign of a new, dangerous strategy by a group tied to Cuba

πŸ“– Read

via "ITPro".
πŸ“’ The pros and cons of facial recognition technology πŸ“’

There are plenty of pros and cons of facial recognition technology, but is it really worth risking user privacy in the name of efficiency and security?

πŸ“– Read

via "ITPro".
πŸ“’ Telstra blames IT blunder for leak of 130,000 customer records πŸ“’

Australia’s biggest telco said that the error was due to a mismanagement of databases and not a cyber attack

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft patches two zero-day vulnerabilities in last Patch Tuesday of 2022 πŸ“’

Zero-days affecting Windows SmartScreen and DirectX were identified in the latest security update

πŸ“– Read

via "ITPro".
πŸ“’ IT Pro 20/20: LinkedIn & the toxic world of cyber security πŸ“’

A look at the shady world of cyber security networking and online communities

πŸ“– Read

via "ITPro".
πŸ“’ What is HTTP error 503 and how do you fix it? πŸ“’

It may not always be obvious what's behind a HTTP error 503, but there are steps you can take to get back online

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-4506 β€Ό

Unrestricted Upload of File with Dangerous Type in GitHub repository openemr/openemr prior to 7.0.0.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4505 β€Ό

Improper Access Control in GitHub repository openemr/openemr prior to 7.0.0.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4504 β€Ό

Improper Input Validation in GitHub repository openemr/openemr prior to 7.0.0.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4502 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4503 β€Ό

Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.0.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Critical IP spoofing bug patched in Cacti πŸ—“οΈ

β€˜Not that hard to execute if attacker has access to a monitoring platform running Cacti’

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Data Destruction Policies in the Age of Cloud Computing πŸ•΄

It's time for on-the-record answers to questions about data destruction in cloud environments. Without access, how do you verify data has been destroyed? Do processes meet DoD standards, or do we need to adjust standards to meet reality?

πŸ“– Read

via "Dark Reading".
πŸ•΄ Blackmailing MoneyMonger Malware Hides in Flutter Mobile Apps πŸ•΄

Money-lending apps built using the Flutter software development kit hide a predatory spyware threat and highlight a growing trend of using personal data for blackmail.

πŸ“– Read

via "Dark Reading".
⚠ Apple patches everything, finally reveals mystery of iOS 16.1.2 ⚠

There's an update for everything this time, not just for iOS.

πŸ“– Read

via "Naked Security".