πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ WordPress Plugin Flaws Exploited in Ongoing Malvertising Campaign ❌

An ongoing malvertising campaign is exploiting WordPress plugin vulnerabilities to redirect website visitors to malicious pages.

πŸ“– Read

via "Threatpost".
❌ Citrix Confirms Password-Spraying Heist of Reams of Internal IP ❌

Security experts say the attack stemmed from weak cybersecurity controls.

πŸ“– Read

via "Threatpost".
πŸ•΄ Business Email Compromise: Thinking Beyond Wire Transfers πŸ•΄

As BEC continues to drive record-high losses, cybercriminals devise new tactics for swindling corporate targets out of millions.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Penetration Test Data Shows Risk to Domain Admin Credentials πŸ•΄

But gaining a foothold on the LAN via vulnerabilities on Internet-facing assets is becoming harder, Rapid7 found in its real-world pen tests.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New IPS Architecture Uses Network Flow Data for Analysis πŸ•΄

Can a stream of data intended for network performance monitoring be the basis of network security? One company says the answer is 'yes.'

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Malware-based Attacks Dropped 20% Worldwide πŸ•΄

Meanwhile, criminals waged more encrypted, ransomware, and IoT attacks.

πŸ“– Read

via "Dark Reading: ".
⚠ Facebook admits to Messenger Kids security hole ⚠

A hole in the supposed closed-loop messaging system allowed children to join group chats with people their parents hadn’t approved.

πŸ“– Read

via "Naked Security".
⚠ Apple’s July patchfest fixes bugs in multiple products ⚠

Apple released fixes for various products this week, including one for a bug that has been public with proof-of-concept code for two months.

πŸ“– Read

via "Naked Security".
πŸ•΄ VPNs' Future: Less Reliant on Users, More Transparent, And Smarter πŸ•΄

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Travel Security [from J4vv4D] πŸ•΄

Do you travel to dangerous places, like Information Security Conferences?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat USA Offers Inside Look at Boeing 787 Security Flaws πŸ•΄

The 787 Dreamliner, WhatsApp, and Windows 10 are all subjects of cutting-edge Reverse Engineering talks at this year's August event.

πŸ“– Read

via "Dark Reading: ".
πŸ” 83% have experienced a DDoS attack in the past two years, survey finds πŸ”

The ease with which DDoS attacks can be waged makes them particularly prevalent, with over half surveyed experiencing multiple attacks waged against their organization.

πŸ“– Read

via "Security on TechRepublic".
❌ Protecting Against Ransomware Attacks: A Checklist ❌

In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Commoditization of Multistage Malware Attacks πŸ•΄

Malware that used to be advanced is now available to everyone. These three actions could help you stay safer.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Stats That Show What it Takes to Run a Modern SOC πŸ•΄

An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).

πŸ“– Read

via "Dark Reading: ".
πŸ” How to prevent unsigned Docker images from being pulled πŸ”

Make sure you're only pulling down signed Docker images with Content Trust enabled.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent unsigned Docker images from being pulled πŸ”

Make sure you're only pulling down signed Docker images with Content Trust enabled.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DEF CON Invites Kids to Crack Campaign Finance Portals πŸ•΄

DEF CON's Voting Village and AI Village team up with r00tz Asylum to let kids explore simulated campaign financial disclosure portals and disinformation campaigns.

πŸ“– Read

via "Dark Reading: ".
❌ Unique Monokle Android Spyware Self-Signs Certificates ❌

Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election.

πŸ“– Read

via "Threatpost".
πŸ” Highlighting Data Protection Best Practices for IIoT Systems πŸ”

A new paper, released Monday, is designed to act as a best practices guide to IIoT (industrial IoT) systems that connect control systems with enterprise systems and business processes.

πŸ“– Read

via "Subscriber Blog RSS Feed ".