πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ GandCrab ransomware revisited – is it back under a (R)evil new guise? ⚠

Did the GandCrab ransomware gang really 'retire' when they said, or did they never go away?

πŸ“– Read

via "Naked Security".
❌ JetBlue Bomb Scare Set Off with Apple AirDrop ❌

Someone AirDropped a picture of a suicide vest to multiple people on a JetBlue flight, prompting an evacuation.

πŸ“– Read

via "Threatpost".
πŸ•΄ US Mayors Commit to Just Saying No to Ransomware πŸ•΄

The group of more than 1,400 top elected municipal officials takes the admirable, recommended stance against paying ransoms. However, can towns and cities secure their information technology infrastructure to withstand attacks?

πŸ“– Read

via "Dark Reading: ".
πŸ” What is USB Control & Encryption? πŸ”

Learn about USB control & encryption in Data Protection 101, our series that covers the fundamentals of data security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Symantec Builds Out Cloud Portfolio to Enforce 'Zero Trust' πŸ•΄

New additions to its Integrated Cyber Defense Platform aim to give businesses greater control over access to cloud resources and applications.

πŸ“– Read

via "Dark Reading: ".
❌ WhatsApp, Telegram Coding Blunders Can Expose Personal Media Files ❌

The issue, present on Android versions, is similar to the known man-in-the-disk attack vector.

πŸ“– Read

via "Threatpost".
❌ The Future is Female: A Key to the Cybersecurity Workforce Challenge ❌

With cybersecurity worldwide facing a major applicant shortage, businesses should be courting women and supporting girls.

πŸ“– Read

via "Threatpost".
πŸ•΄ How Attackers Infiltrate the Supply Chain & What to Do About It πŸ•΄

With some security best practices, enterprises can significantly reduce the chances that a potential supply chain attack will affect business operations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI Publishes GandCrab Decryption Keys πŸ•΄

Publishing the keys should render existing versions of the ransomware far less dangerous for victims.

πŸ“– Read

via "Dark Reading: ".
❌ LenovoEMC Storage Gear Leaks Sensitive Financial Data ❌

Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-13442

SolarWinds Network Performance Monitor 12.3 allows SQL Injection via the /api/ActiveAlertsOnThisEntity/GetActiveAlerts TriggeringObjectEntityNames parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Snapshot: OS, Authentication, Browser & Cloud Trends πŸ•΄

New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Lenovo NAS Firmware Flaw Exposes Stored Data πŸ•΄

More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.

πŸ“– Read

via "Dark Reading: ".
⚠ Researchers hide data in music – and human ears can’t detect it ⚠

It's now possible to secretly transfer data inside music without turning it into unlistenable mush.

πŸ“– Read

via "Naked Security".
⚠ Facebook rolls out anti-scam reporting tool in UK ⚠

Facebook has coughed up Β£3m to help launch an anti-scam service as well as introducing a tool to report scam ads on its UK site.

πŸ“– Read

via "Naked Security".
⚠ Microsoft, Google and Apple clouds banned in Germany’s schools ⚠

Citing privacy issues, Germany just banned its schools from using Microsoft Office 365, Google Docs, and Apple's iWork cloud services.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 10 Essentials of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".
⚠ RDP exposed: the wolves already at your door ⚠

While everyone waits for BlueKeep to be exploited, another RDP threat is already at the door, according to new research from Sophos.

πŸ“– Read

via "Naked Security".
πŸ•΄ Master Next-Level Network Defense Techniques at Black Hat USA πŸ•΄

Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.

πŸ“– Read

via "Dark Reading: ".
❌ StrongPity APT Returns with Retooled Spyware ❌

The group is using malicious versions of WinRAR and other legitimate software packages to infect targets, likely via watering-hole attacks.

πŸ“– Read

via "Threatpost".