πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Git Gets Patched for Newly Found Flaw πŸ•΄

A vulnerability in Git could allow an attacker to place malicious, auto-executing code in a sub-module.

πŸ“– Read

via "Dark Reading: ".
⚠ Airport mislays world’s most expensive USB stick ⚠

In October 2017, a member of the public found a USB stick containing a trove of data on security systems and procedures at one of the world’s busiest airports.

πŸ“– Read

via "Naked Security".
⚠ Cyber tormentor leaves a trail that lands him 17.5 years ⚠

Ryan S. Lin pleaded guilty to cyberstalking, distribution of child abuse imagery, hoax bomb threats, computer fraud and abuse, and ID theft.

πŸ“– Read

via "Naked Security".
⚠ 291 records breached per second in first half of 2018 ⚠

Over 4.5 billion data records were breached in the first half of this year, according to Gemalto's Breach Level Index released this week.

πŸ“– Read

via "Naked Security".
⚠ Google+ wakes up to what the rest of us already knew ⚠

Google's closing down the platform nobody uses and might face a class-action lawsuit over a G+ spawned breach it took 7 months to report.

πŸ“– Read

via "Naked Security".
❌ Podcast: Key Takeaways For DevOps in BSIMM9 ❌

From supply chain to orchestration tools, here are the new trends that DevOps should pay attention to in this year's BSIMM report.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Four Critical Flaws Patched in Adobe Digital Edition ❌

Adobe Digital Edition has four critical bugs enabling arbitrary code execution.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Emerging threat: password stuffing explained πŸ”

Akamai's Andy Ellis speaks to CNET's Dan Patterson about threats via "password stuffing"

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Security Researchers Struggle with Bot Management Programs πŸ•΄

Bots are a known problem, but researchers will tell you that bot defenses create problems of their own when it comes to valuable data.

πŸ“– Read

via "Dark Reading: ".
⚠ How a WhatsApp call could have taken over your phone ⚠

A WhatsApp buffer overflow that crashed your phone due to audio data sent by a caller meant that just answering a call could spell trouble.

πŸ“– Read

via "Naked Security".
πŸ•΄ IIS Attacks Skyrocket, Hit 1.7M in Q2 πŸ•΄

Drupal and Oracle WebLogic also were hit with more cyberattacks during same quarter.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why 60% of IT security pros want to quit their jobs right now πŸ”

At a time when cyberattacks are at the forefront of company concerns, retaining IT security talent is a must. Here's how.

πŸ“– Read

via "Security on TechRepublic".
❌ Innovative Phishing Tactic Makes Inroads Using Azure Blob ❌

A brand-new approach to harvesting credentials hinges on users' lack of cloud savvy.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Cryptomining replaces ransomware as 2018's top cybersecurity threat πŸ”

Malware, in general, accounts for the majority of cybersecurity threats, but now cryptomining reigns supreme.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to limit access to the su command in Linux πŸ”

Jack Wallen shows you a simple trick to heighten your Linux server security, by limiting Linux users' access to the su command.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to encrypt a USB flash drive with GNOME Disks πŸ”

If you use Linux, and are looking for an easy method of encrypting data on your USB drives, Jack Wallen has you covered. With the help of GNOME Disks, this process is very easy.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Imperva to Be Acquired by Thoma Bravo for $2.1 Billion πŸ•΄

But two law firms are investigating whether the security vendor breached its fiduciary duty to shareholders by not actively seeking buyers offering a higher price.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Threat Group Conducts Malwareless Cyber Espionage πŸ•΄

Gallmaker group is relying exclusively on legitimate tools and living-off-the-land tactics to make detection very difficult.

πŸ“– Read

via "Dark Reading: ".
❌ FruityArmor APT Exploits Yet Another Windows Graphics Kernel Flaw ❌

This is the second local privilege-escalation zero-day this APT group has exploited.

πŸ“– Read

via "The first stop for security news | Threatpost ".