πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Podcast: Key Takeaways For DevOps in BSIMM9 ❌

From supply chain to orchestration tools, here are the new trends that DevOps should pay attention to in this year's BSIMM report.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Four Critical Flaws Patched in Adobe Digital Edition ❌

Adobe Digital Edition has four critical bugs enabling arbitrary code execution.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Emerging threat: password stuffing explained πŸ”

Akamai's Andy Ellis speaks to CNET's Dan Patterson about threats via "password stuffing"

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Security Researchers Struggle with Bot Management Programs πŸ•΄

Bots are a known problem, but researchers will tell you that bot defenses create problems of their own when it comes to valuable data.

πŸ“– Read

via "Dark Reading: ".
⚠ How a WhatsApp call could have taken over your phone ⚠

A WhatsApp buffer overflow that crashed your phone due to audio data sent by a caller meant that just answering a call could spell trouble.

πŸ“– Read

via "Naked Security".
πŸ•΄ IIS Attacks Skyrocket, Hit 1.7M in Q2 πŸ•΄

Drupal and Oracle WebLogic also were hit with more cyberattacks during same quarter.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why 60% of IT security pros want to quit their jobs right now πŸ”

At a time when cyberattacks are at the forefront of company concerns, retaining IT security talent is a must. Here's how.

πŸ“– Read

via "Security on TechRepublic".
❌ Innovative Phishing Tactic Makes Inroads Using Azure Blob ❌

A brand-new approach to harvesting credentials hinges on users' lack of cloud savvy.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Cryptomining replaces ransomware as 2018's top cybersecurity threat πŸ”

Malware, in general, accounts for the majority of cybersecurity threats, but now cryptomining reigns supreme.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to limit access to the su command in Linux πŸ”

Jack Wallen shows you a simple trick to heighten your Linux server security, by limiting Linux users' access to the su command.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to encrypt a USB flash drive with GNOME Disks πŸ”

If you use Linux, and are looking for an easy method of encrypting data on your USB drives, Jack Wallen has you covered. With the help of GNOME Disks, this process is very easy.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Imperva to Be Acquired by Thoma Bravo for $2.1 Billion πŸ•΄

But two law firms are investigating whether the security vendor breached its fiduciary duty to shareholders by not actively seeking buyers offering a higher price.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Threat Group Conducts Malwareless Cyber Espionage πŸ•΄

Gallmaker group is relying exclusively on legitimate tools and living-off-the-land tactics to make detection very difficult.

πŸ“– Read

via "Dark Reading: ".
❌ FruityArmor APT Exploits Yet Another Windows Graphics Kernel Flaw ❌

This is the second local privilege-escalation zero-day this APT group has exploited.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Russian Hacking Groups Intersect in Recent Cyberattacks πŸ•΄

Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Meet 5 Women Shaping Microsoft's Security Strategy πŸ•΄

Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.

πŸ“– Read

via "Dark Reading: ".
❔ How to differentiate between spam and phishing emails? ❔

Estimated reading time: 3 minutesEmails today have become an integral part of our day-to-day life and this has made it a child’s play for spammers to lure people into opening fraudulent emails and attachments. Thus, while you are using emails for your everyday personal or official use, it is important to realize that the tech-savvy spammers can easily hack their way to your personal information, simply by means of emails. Thus, it is extremely important that you understand the difference between a spam email and a phishing email before you can access one. What is a spam email? A spam email is basically those hundreds and thousands of unsolicited emails that are sent out, solely with the purpose to sell a service or product. Spammers usually send such emails to a long list of recipients, in the hope that at least a few of them will respond back. The intention behind sending these spam emails is to simply lure recipients into buying dubious products or participate in fraudulent and quasi-legal schemes. Some of the most commonly circulated spam emails cover topics including – Lottery, Travel, Credit/Debit Card, Fake Antivirus, Bank Loan, etc. What is a phishing email?                      A phishing email on the other hand is a kind of spam email that is sent out specifically, to trick you into sharing your personal details like, debit/credit card details, bank account details, passwords, etc. Sharing your details through such phishing emails can lead to cases of financial fraud through identity theft. At times, these emails are specifically targeted to dig out personal information about your colleague or company. Such emails are referred to as spear-phishing targeted emails.   The Difference!! The most significant differentiating factor between a spam and a phishing email is that spams are not meant to acquire sensitive user information.   How to identify phishing emails? There is no rocket science behind identifying phishing emails. You just need to have an eye for few important details: Malicious Website Links – One of the most common types of phishing emails, is one containing link to a malicious website, disguised to look like a legitimate one. These can be in the form of login screens of banking websites. No sooner that you enter your username and password, your login details will get stolen providing the spammers easy access to your bank account. Infected Attachments – Phishing emails usually either of these two types of attachments: HTML Attachments – These are basically the infected .html files that exist in your inbox. Macros – These usually contain attached documents that can be opened only after you enable macros. As soon as you open any of these attached files or documents, you are bound to provide easy access to your system to the already waiting cyber criminals. Eye-Catching Subject-lines – One of the most common types of phishing emails are the ones containing subject-lines that seem too good to be true. Eg: Claim your winning amount of Rs. 10,000 or you have just received a $100 gift card from Amazon. The best way to prevent yourself from becoming a victim of such phishing email attacks, is to keep a check on the following things: Check the authenticity of the website before you decide to share any personal information online. Check website URL for spelling errors, changed domain name or language. Most often these are a clear give-away that the website may be malicious. Confirm the email ID requesting you for details, by directly calling the company. Such small initiatives on your part can play a critical role in protecting you and your system from malicious phishing attacks. This can also make it easy for you to differentiate between spam and phishing emails. The post How to differentiate between spam and phishing emails? appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

πŸ“– Read

via "Quick Heal Blog | Latest computer security news, tips, and advice".
⚠ Update now! Microsoft fixes 49 bugs, 12 are critical ⚠

Microsoft’s October Patch Tuesday update made its scheduled appearance on Tuesday with fixes for 49 security flaws across its family of products, 12 of which are listed as β€˜critical’.

πŸ“– Read

via "Naked Security".
πŸ” The spectrum of threat actors πŸ”

Akamai's Andy Ellis walks CNET's Dan Patterson down the winding path of where your passwords go after they are stolen

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Deep Dives: New Security Flaws in Apple and Microsoft products at Black Hat Europe πŸ•΄

With Black Hat Europe coming to London in a few months, organizers share three of the most promising Briefings slated for the December event.

πŸ“– Read

via "Dark Reading: ".
⚠ Jailbroken PS4 seller sued by Sony ⚠

The consoles allegedly sold on eBay by the California man were packed with over 60 pirated games.

πŸ“– Read

via "Naked Security".