πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Apple and Amazon hacked by China? Here’s what to do (even if it’s not true) ⚠

Are major US companies really under attack from Chinese "zombie microchips" - and what should we do, whether it's true or not?

πŸ“– Read

via "Naked Security".
πŸ•΄ New Domains: A Wide-Open Playing Field for Cybercrime πŸ•΄

As bad actors increasingly exploit new domains for financial gain and other nefarious purposes, security teams need to employ policies and practices to neutralize the threat in real time. Here's why and how.

πŸ“– Read

via "Dark Reading: ".
πŸ” Despite risks, only 38% of CEOs are highly engaged in cybersecurity πŸ”

Business leaders believe AI and IoT will seriously impact their security plan, but they're unsure how to invest resources to defend against new threats.

πŸ“– Read

via "Security on TechRepublic".
❌ ThreatList: Microsoft IIS Sees Triple-Digit Spike in Cyberattack Volume ❌

Most of the attacks originated in China.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Google+ Privacy Snafu Leaves a Cloud Over the Tech Landscape ❌

Google was caught not disclosing a potential data breach -- leaving questions as to whether a lack of transparency is the new normal.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ How Shared Pools of Cloud Computing Power Are Changing the Way Attackers Operate ❌

Cloud computing is creating new challenges among security professionals as attackers embrace the "as-a-service model", giving unsophisticated cybercriminals a leg up in carrying out attacks.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ DoD Weapon Systems Contain Security Vulnerabilities πŸ•΄

GAO report outlines challenges for the US Department of Defense to handle security flaws in weapon systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Lessons Learned from the Facebook Breach: Why Logic Errors Are So Hard to Catch πŸ•΄

By ensuring that each layer of protection scours an application for unintended uses, you can find the flaws before the bad guys do.

πŸ“– Read

via "Dark Reading: ".
❌ Slideshow: Intel from Virus Bulletin 2018 ❌

This year's Virus Bulletin conference featured top-tier research from some of the world's best threat intelligence experts.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ New Ninth-Gen Intel CPUs Shield Against Some Spectre, Meltdown Variants ❌

New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ New Ninth-Gen Intel CPUs Shield Against Some Spectre, Meltdown Variants ❌

New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Constructing the Future of ICS Cybersecurity πŸ•΄

As industrial control systems are connected to the cloud and the IoT, experts discuss security challenges.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Patches Zero-Day Under Active Attack by APT ❌

A zero-day vulnerability tied to the Window’s Win32k component is under active attack, warns Microsoft.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Git Gets Patched for Newly Found Flaw πŸ•΄

A vulnerability in Git could allow an attacker to place malicious, auto-executing code in a sub-module.

πŸ“– Read

via "Dark Reading: ".
⚠ Airport mislays world’s most expensive USB stick ⚠

In October 2017, a member of the public found a USB stick containing a trove of data on security systems and procedures at one of the world’s busiest airports.

πŸ“– Read

via "Naked Security".
⚠ Cyber tormentor leaves a trail that lands him 17.5 years ⚠

Ryan S. Lin pleaded guilty to cyberstalking, distribution of child abuse imagery, hoax bomb threats, computer fraud and abuse, and ID theft.

πŸ“– Read

via "Naked Security".
⚠ 291 records breached per second in first half of 2018 ⚠

Over 4.5 billion data records were breached in the first half of this year, according to Gemalto's Breach Level Index released this week.

πŸ“– Read

via "Naked Security".
⚠ Google+ wakes up to what the rest of us already knew ⚠

Google's closing down the platform nobody uses and might face a class-action lawsuit over a G+ spawned breach it took 7 months to report.

πŸ“– Read

via "Naked Security".