πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Security Snapshot: OS, Authentication, Browser & Cloud Trends πŸ•΄

New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Lenovo NAS Firmware Flaw Exposes Stored Data πŸ•΄

More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.

πŸ“– Read

via "Dark Reading: ".
⚠ Researchers hide data in music – and human ears can’t detect it ⚠

It's now possible to secretly transfer data inside music without turning it into unlistenable mush.

πŸ“– Read

via "Naked Security".
⚠ Facebook rolls out anti-scam reporting tool in UK ⚠

Facebook has coughed up Β£3m to help launch an anti-scam service as well as introducing a tool to report scam ads on its UK site.

πŸ“– Read

via "Naked Security".
⚠ Microsoft, Google and Apple clouds banned in Germany’s schools ⚠

Citing privacy issues, Germany just banned its schools from using Microsoft Office 365, Google Docs, and Apple's iWork cloud services.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 10 Essentials of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".
⚠ RDP exposed: the wolves already at your door ⚠

While everyone waits for BlueKeep to be exploited, another RDP threat is already at the door, according to new research from Sophos.

πŸ“– Read

via "Naked Security".
πŸ•΄ Master Next-Level Network Defense Techniques at Black Hat USA πŸ•΄

Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.

πŸ“– Read

via "Dark Reading: ".
❌ StrongPity APT Returns with Retooled Spyware ❌

The group is using malicious versions of WinRAR and other legitimate software packages to infect targets, likely via watering-hole attacks.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 things to consider for your disaster recovery plan πŸ”

You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 things to consider for your disaster recovery plan πŸ”

You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why 70% of healthcare orgs have suffered data breaches πŸ”

Digital transformation initiatives bring a slew of data privacy concerns to US health organizations, according to a Thales report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ For Real Security, Don't Let Failure Be Your Measure of Success πŸ•΄

For too long, we've focused almost exclusively on keeping out the bad guys rather than what to do when they get in (and they will).

πŸ“– Read

via "Dark Reading: ".
πŸ” Malicious libraries in package repositories reveal a fundamental security flaw πŸ”

The proliferation of malicious packages in repositories for software developers that rely on typosquatting points to a problem: A reliance on flat namespaces.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-12652 (libpng)

libpng before 1.6.32 does not properly check the length of chunks against the user limit.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Data Loss, Leakage Top Cloud Security Concerns πŸ•΄

Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 blockchain challenges businesses face πŸ”

While blockchain technology can offer great opportunities, the hype surrounding it often leads to unrealistic expectations, according to the World Economic Forum.

πŸ“– Read

via "Security on TechRepublic".
❌ Massive Malvertising Campaign Reaches 100M Ads, Manipulates Supply Chain ❌

A sophisticated and growing malvertising attacker is partnering with legitimate ad tech platforms to drop malware at scale.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-11734 (e107)

In e107 v2.1.7, output without filtering results in XSS.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Tech news roundup: Amazon Prime Day and the highest-rated workplaces of 2019 πŸ”

This week's TechRepublic and ZDNet stories include a breach of Sprint customers' data, notes from the Duo Security 2019 access report, and how execs are taking charge of digital transformation plans.

πŸ“– Read

via "Security on TechRepublic".