πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Analysing the economic benefits of Trend Micro Vision One πŸ“’

Trend Micro Vision One as a solution to cyber risks

πŸ“– Read

via "ITPro".
πŸ“’ A roadmap to Zero Trust with Cloudflare and CrowdStrike πŸ“’

Achieve end-to-end protection across endpoints, networks, and applications

πŸ“– Read

via "ITPro".
πŸ“’ Zscaler makes key hire as it looks to revamp its partner programme πŸ“’

Former Palo Alto Networks executive Karl Soderlund will work to modernise Zscaler's channel operations

πŸ“– Read

via "ITPro".
πŸ“’ Ring denies ALPHV ransomware attack πŸ“’

The ransomware group has claimed to be in possession of stolen Ring data, but provided no evidence

πŸ“– Read

via "ITPro".
πŸ“’ Achieving zero trust for corporate networks πŸ“’

Zero trust is a new way of thinking about information security

πŸ“– Read

via "ITPro".
πŸ“’ Orange Cyberdefense collaborates with Microsoft to release two new managed services πŸ“’

New managed workspace protection and XDR offerings aim to help businesses β€œstay ahead of threats”

πŸ“– Read

via "ITPro".
πŸ“’ ZTNA vs on-premises VPN πŸ“’

How ZTNA wins the network security game

πŸ“– Read

via "ITPro".
πŸ“’ Brand-new Emotet campaign socially engineers its way from detection πŸ“’

This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros

πŸ“– Read

via "ITPro".
πŸ“’ The WFH cyber security checklist πŸ“’

Ten ways to win the remote access game with ZTNA

πŸ“– Read

via "ITPro".
πŸ“’ SOC modernisation and and the role of XDR πŸ“’

Security operations remain challenging

πŸ“– Read

via "ITPro".
πŸ“’ Accelerating your IT transformation πŸ“’

How Cloudflare is innovating for CIOs to start 2023

πŸ“– Read

via "ITPro".
πŸ“’ Defending against malware attacks starts here πŸ“’

The ultimate guide to building your malware defence strategy

πŸ“– Read

via "ITPro".
πŸ“’ Meet the charity shaping Australia and New Zealand's data breach response πŸ“’

IDCARE is recruiting a reserve army to turbocharge the fightback against cyber crime not just in the region, but in the interests of victims all over the world

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ The essential guide to preventing ransomware attacks πŸ“’

Vital tips and guidelines to protect your business using ZTNA and SSE

πŸ“– Read

via "ITPro".
πŸ“’ Balancing network security risks πŸ“’

A CISO’s guide

πŸ“– Read

via "ITPro".
πŸ“’ Kali Linux releases first-ever defensive distro with score of new tools πŸ“’

Kali Purple marks the next step for the red-teaming platform on the project's tenth anniversary

πŸ“– Read

via "ITPro".
πŸ“’ The IT manager's guide to getting home in time for dinner πŸ“’

A cloud based networking solution that does away with configurations

πŸ“– Read

via "ITPro".
πŸ•΄ Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks πŸ•΄

Attackers are increasingly staying under the radar by using your own tools against you. Only behavioral AI can catch these stealthy attacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-21465 β€Ό

Improper access control vulnerability in BixbyTouch prior to version 3.2.02.5 in China models allows untrusted applications access local files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21457 β€Ό

Improper access control vulnerability in Bluetooth prior to SMR Mar-2023 Release 1 allows attackers to send file via Bluetooth without related permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21462 β€Ό

The sensitive information exposure vulnerability in Quick Share Agent prior to versions 3.5.14.18 in Android 12 and 3.5.16.20 in Android 13 allows to local attacker to access MAC address without related permission.

πŸ“– Read

via "National Vulnerability Database".