πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Cybersecurity: Malware lingers in SMBs for an average of 800 days before discovery πŸ”

Small and medium-sized businesses lack the IT staff needed to run comprehensive security detection and response, according to Infocyte.

πŸ“– Read

via "Security on TechRepublic".
❌ Implementing Bug Bounty Programs: The Right and Wrong Approaches ❌

Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs.

πŸ“– Read

via "Threatpost".
⚠ Facial recognition surveillance must be banned, says Fight for the Future ⚠

β€œWe don’t need to regulate it, we need to ban it entirely.”

πŸ“– Read

via "Naked Security".
❌ Apple Disables Walkie-Talkie App Due to Eavesdropping Flaw ❌

Apple has disabled the Walkie Talkie app from its Apple Watch products after a vulnerability was discovered enabling bad actors to eavesdrop on iPhone conversations.

πŸ“– Read

via "Threatpost".
❌ Apple Issues Silent Update Removing Zoom’s Hidden Server ❌

The tech giant addressed a widely publicized Zoom bug with an automatic update mechanism usually reserved for removing malware.

πŸ“– Read

via "Threatpost".
πŸ” Gone phishing: Why summer brings increased security threats to the enterprise πŸ”

Employees working away from the office, including over vacation, could increase the chance of network compromise.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Security of Cloud Applications πŸ•΄

Despite the great success of the cloud over the last decade, misconceptions continue to persist. Here's why the naysayers are wrong.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Summer: A Time for Vacations & Cyberattacks? πŸ•΄

About a third of cybersecurity professionals believe that their companies see more cyberattacks during the summer, but the survey data does not convince on the reasons for the perception of a summer bump.

πŸ“– Read

via "Dark Reading: ".
πŸ” Wannacry ransomware attack: Industry experts offer their tips for prevention πŸ”

Wannacry remains a significant threat for companies. Learn how your organization can guard against it.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Will mobile devices replace passwords? πŸ”

Mobile devices could provide a more secure, user-friendly mode of account authentication, according to an IDG and MobileIron report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Monroe College Hit with Ransomware Attack πŸ•΄

All campuses are affected, with attackers demanding $2 million in Bitcoin in exchange for decryption keys.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Most Organizations Lack Cyber Resilience πŸ•΄

Despite increasing threats, many organizations continue to run with only token cybersecurity and resilience.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to run a command that requires sudo via SSH πŸ”

With SSH you can run commands on remote machines, even if the command requires sudo privileges.

πŸ“– Read

via "Security on TechRepublic".
πŸ” New Alliance Aims to Boost Industrial Cybersecurity Awareness πŸ”

The group hopes to increase cybersecurity awareness, education, and knowledge sharing around industrial cybersecurity concerns.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Software Engineer Charged for Taking Stolen Trade Secrets to China πŸ•΄

Xudong Yao reportedly stole proprietary information from his employer and brought it to China, where he is believed to currently reside.

πŸ“– Read

via "Dark Reading: ".
❌ Google Home Silently Captures Recordings of Domestic Violence and More ❌

Google is under fire after a report found that Google Home and Google Assistant records user audio, even when no wake-up word is used.

πŸ“– Read

via "Threatpost".
πŸ•΄ How to Catch a Phish: Where Employee Awareness Falls Short πŸ•΄

Advanced phishing techniques and poor user behaviors that exacerbate the threat of successful attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ APT Groups Make Quadruple What They Spend on Attack Tools πŸ•΄

Some advanced persistent threat actors can spend north of $1 million on attacks, but the return on that investment can be huge.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-3798

The Windows Guest Tools in Citrix XenServer 6.2 SP1 and earlier allows remote attackers to cause a denial of service (guest OS crash) via a crafted Ethernet frame.

πŸ“– Read

via "National Vulnerability Database".