πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ FBI Publishes GandCrab Decryption Keys πŸ•΄

Publishing the keys should render existing versions of the ransomware far less dangerous for victims.

πŸ“– Read

via "Dark Reading: ".
❌ LenovoEMC Storage Gear Leaks Sensitive Financial Data ❌

Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-13442

SolarWinds Network Performance Monitor 12.3 allows SQL Injection via the /api/ActiveAlertsOnThisEntity/GetActiveAlerts TriggeringObjectEntityNames parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Snapshot: OS, Authentication, Browser & Cloud Trends πŸ•΄

New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Lenovo NAS Firmware Flaw Exposes Stored Data πŸ•΄

More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.

πŸ“– Read

via "Dark Reading: ".
⚠ Researchers hide data in music – and human ears can’t detect it ⚠

It's now possible to secretly transfer data inside music without turning it into unlistenable mush.

πŸ“– Read

via "Naked Security".
⚠ Facebook rolls out anti-scam reporting tool in UK ⚠

Facebook has coughed up Β£3m to help launch an anti-scam service as well as introducing a tool to report scam ads on its UK site.

πŸ“– Read

via "Naked Security".
⚠ Microsoft, Google and Apple clouds banned in Germany’s schools ⚠

Citing privacy issues, Germany just banned its schools from using Microsoft Office 365, Google Docs, and Apple's iWork cloud services.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 10 Essentials of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".
⚠ RDP exposed: the wolves already at your door ⚠

While everyone waits for BlueKeep to be exploited, another RDP threat is already at the door, according to new research from Sophos.

πŸ“– Read

via "Naked Security".
πŸ•΄ Master Next-Level Network Defense Techniques at Black Hat USA πŸ•΄

Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.

πŸ“– Read

via "Dark Reading: ".
❌ StrongPity APT Returns with Retooled Spyware ❌

The group is using malicious versions of WinRAR and other legitimate software packages to infect targets, likely via watering-hole attacks.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 things to consider for your disaster recovery plan πŸ”

You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 things to consider for your disaster recovery plan πŸ”

You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why 70% of healthcare orgs have suffered data breaches πŸ”

Digital transformation initiatives bring a slew of data privacy concerns to US health organizations, according to a Thales report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ For Real Security, Don't Let Failure Be Your Measure of Success πŸ•΄

For too long, we've focused almost exclusively on keeping out the bad guys rather than what to do when they get in (and they will).

πŸ“– Read

via "Dark Reading: ".
πŸ” Malicious libraries in package repositories reveal a fundamental security flaw πŸ”

The proliferation of malicious packages in repositories for software developers that rely on typosquatting points to a problem: A reliance on flat namespaces.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-12652 (libpng)

libpng before 1.6.32 does not properly check the length of chunks against the user limit.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Data Loss, Leakage Top Cloud Security Concerns πŸ•΄

Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 blockchain challenges businesses face πŸ”

While blockchain technology can offer great opportunities, the hype surrounding it often leads to unrealistic expectations, according to the World Economic Forum.

πŸ“– Read

via "Security on TechRepublic".