πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Cryptolocking WordPress Plugin Locks Up Blog Posts ❌

A new type of malicious plugin has been spotted in the wild with the capability of targeting individual blog posts.

πŸ“– Read

via "Threatpost".
❌ Democrats and Doctors Behind Latest Wave of Leaked Data ❌

Patient medical history and over 6 million email addresses tied to Democrats were detailed in a misconfigured storage buckets over the past few weeks.

πŸ“– Read

via "Threatpost".
πŸ•΄ Ongoing Campaign Spoofs Walmart, Dating, Movie Sites πŸ•΄

A new investigation detects more than 540 domain names linked to the Walmart brand and camouflaged as career, dating, and entertainment websites.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Russian Attack Group Uses Phones & Printers to Breach Corporate Networks πŸ•΄

Microsoft spotted Strontium, also known as APT28 or Fancy Bear, using IoT devices to breach businesses and seek high-value data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Air Force Bug Bounty Program Nets 54 Flaws for $123,000 πŸ•΄

The Air Force brought together 50 vetted hackers to find the vulnerabilities in the latest bug-bounty program hosted by a branch of the US military.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Speculative Execution Vulnerability Gives CISOs a New Reason to Lose Sleep πŸ•΄

The vulnerability, dubbed SWAPGS, is an undetectable threat to data security, similar in some respects to Spectre and Meltdown.

πŸ“– Read

via "Dark Reading: ".
πŸ” 6 pillars of DevSecOps your business needs to know πŸ”

Cloud security issues are growing more prevalent in the enterprise, according to the Cloud Security Alliance. Here's how to stay protected.

πŸ“– Read

via "Security on TechRepublic".
⚠ Latest Android patches fix critical β€˜QualPwn’ Wi-Fi flaws ⚠

The August 2019 security bulletin is out - and two of the critical flaws could allow an attacker to compromise the Android system kernel.

πŸ“– Read

via "Naked Security".
⚠ Banking PINs exposed in Monzo secure storage slip-up ⚠

When is a secure PIN not a secure PIN? When you accidentally store it in your log files.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Key to Enterprisewide Encryption πŸ•΄

Security teams have been slow to embrace enterprisewide encryption, and for good reasons. But the truth is, it doesn't have to be an all-or-nothing endeavor.

πŸ“– Read

via "Dark Reading: ".
❌ Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids ❌

Several serious privacy flaws in a kid's tablet were disclosed this year at Black Hat, which could allow a bad actor to track or send messages to children.

πŸ“– Read

via "Threatpost".
⚠ Don’t fall for fake Equifax settlement sites, warns FTC ⚠

Equifictitious sites popped up within days of Equifax agreeing to pay up to $700m to settle claims over the 2017 data breach.

πŸ“– Read

via "Naked Security".
❌ Security Vulnerabilities Are Increasingly Putting Kids at Risk ❌

A kid's tablet with security vulnerabilities is only the latest privacy faux pas in a children's connected device.

πŸ“– Read

via "Threatpost".
⚠ Scammers recruiting money mules on dating sites is on the rise, says FBI ⚠

It's not longer enough to be wary of flash-in-the-pan "lovers" who ask you to send money; now they're asking you to open accounts for them.

πŸ“– Read

via "Naked Security".
πŸ” Why do so many wireless routers lack basic security protections? πŸ”

Many popular routers include security flaws, but here are some tips on how to secure your wireless router, according to Consumer Reports.

πŸ“– Read

via "Security on TechRepublic".
❌ New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses ❌

Researchers demonstrate a new side-channel attack that bypass mitigations against Spectre and Meltdown.

πŸ“– Read

via "Threatpost".
πŸ•΄ Rethinking Website Spoofing Mitigation πŸ•΄

Deception technology is evolving rapidly, making it easier for organizations to turn the tables on their attackers. Here's how.

πŸ“– Read

via "Dark Reading: ".
⚠ Don’t let the crooks β€˜borrow’ your home router as a hacking server ⚠

Crooks don't have to break *into* your network to benefit - they can bounce *off* it so you take the blame and look like a hacker yourself.

πŸ“– Read

via "Naked Security".
πŸ” How the Air Force used a bug bounty program to hack its own cloud server πŸ”

The Air Force paid out $123,000 to researchers who found vulnerabilities in the organization's move to the cloud. Here's why.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Businesses need to patch for BlueKeep to avoid another WannaCry πŸ”

BitSight is sounding an alarm over the potential for patching to taper off, leaving legacy systems at risk for the potentially potent vulnerability.

πŸ“– Read

via "Security on TechRepublic".
❌ Smominru Cryptominer Scrapes Credentials for Half-Million Machines ❌

The adversaries have retooled with EternalBlue and credential theft to add a new "access mining" revenue stream.

πŸ“– Read

via "Threatpost".