πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ β€˜NULL’ license plate gets security researcher $12K in tickets ⚠

The vanity plate sounded good in theory: maybe it would make his plate invisible to ALPR systems?!

πŸ“– Read

via "Naked Security".
⚠ Serious flaws in six printer brands discovered, fixed ⚠

There are many ways to compromise company data, but IT teams often overlook one of the most serious: the humble printer.

πŸ“– Read

via "Naked Security".
πŸ” How to prevent email account takeover attacks: 3 tips πŸ”

Email takeover and lateral phishing attacks are a growing threat to enterprises, according to a Barracuda report.

πŸ“– Read

via "Security on TechRepublic".
⚠ S2 Ep4: iPhone holes, Android malware and romance scams – Naked Security Podcast ⚠

Episode 4 of the Naked Security Podcast is now live! This week host Anna Brading is joined by Paul Ducklin and Matt Boddy. They discuss how iPhone vulnerabilities have changed Apple’s attitude towards cybersecurity researchers [3’50”], the latest twist in romance scams where crooks are recruiting money mules via dating sites [12’43”], and malware in […]

πŸ“– Read

via "Naked Security".
πŸ•΄ 5 Things to Know About Cyber Insurance πŸ•΄

More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Biggest Cloud Security Blind Spots πŸ•΄

Cloud computing boon is for innovation, yet security organizations find themselves running into obstacles.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace? πŸ•΄

The old-school technology is experiencing new popularity, but too many people assume mainframes are inherently secure.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why 2-factor authentication isn't foolproof πŸ”

Breaches happen--even with 2-factor authentication. Learn how to protect your organization from security breaches.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Data breaches increased 54% in 2019 so far πŸ”

More than 3,800 data breaches have hit organizations in 2019, according to Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
⚠ Firefox fixes β€œmaster password” security bypass bug ⚠

The bug's in Firefox, but our advice is worth reading whether you use Firefox or not.

πŸ“– Read

via "Naked Security".
❌ Clickjacking Evolves to Hook Millions of Visitors to Top Sites ❌

Researchers said that clickjacking is a threat that's evolving, with new tactics just starting to emerge.

πŸ“– Read

via "Threatpost".
πŸ” How to limit the impact of data breaches πŸ”

IBM's Wendi Whitmore offers advice about how to defend against and respond to data breaches.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2015-9292 (6kbbs)

6kbbs 7.1 and 8.0 allows CSRF via portalchannel_ajax.php (id or code parameter) or admin.php (fileids parameter).

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to cut the cost of a data breach πŸ”

IBM's Wendi Whitmore explains why a data breach isn't a one-time cost and recommends cost-saving tips, which include having access to an incident response team.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to cut the cost of a data breach πŸ”

IBM's Wendi Whitmore explains why a data breach isn't a one-time cost and recommends cost-saving tips, which include having access to an incident response team.

πŸ“– Read

via "Security on TechRepublic".
❌ Choice Hotels Breach Showcases Need for Shared Responsibility Model ❌

700,000 customer records were exposed after being housed on a vendor's server that lacked appropriate security.

πŸ“– Read

via "Threatpost".
πŸ•΄ 68% of Companies Say Red Teaming Beats Blue Teaming πŸ•΄

The majority of organizations surveyed find red team exercises more effective than blue team testing, research shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to SSH into an AWS instance πŸ”

Logging into an AWS instance with SSH doesn't have to be a challenge.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent data destruction from cybersecurity attacks πŸ”

IBM's Christoper Scott discusses malware, how cyberattackers get into environments, and why using multifactor authentication is crucial if you use an online service.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Flaw in Vulnerability Management: It's Time to Get Real πŸ•΄

Companies will never be 100% immune to cyberattacks. But by having a realistic view of the basics, starting with endpoint vulnerabilities, we can build for a safer future.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to limit the impact of data breaches πŸ”

IBM's Wendi Whitmore offers advice about how to defend against and respond to data breaches.

πŸ“– Read

via "Security on TechRepublic".