πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Data breaches increased 54% in 2019 so far πŸ”

More than 3,800 data breaches have hit organizations in 2019, according to Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
⚠ Firefox fixes β€œmaster password” security bypass bug ⚠

The bug's in Firefox, but our advice is worth reading whether you use Firefox or not.

πŸ“– Read

via "Naked Security".
❌ Clickjacking Evolves to Hook Millions of Visitors to Top Sites ❌

Researchers said that clickjacking is a threat that's evolving, with new tactics just starting to emerge.

πŸ“– Read

via "Threatpost".
πŸ” How to limit the impact of data breaches πŸ”

IBM's Wendi Whitmore offers advice about how to defend against and respond to data breaches.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2015-9292 (6kbbs)

6kbbs 7.1 and 8.0 allows CSRF via portalchannel_ajax.php (id or code parameter) or admin.php (fileids parameter).

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to cut the cost of a data breach πŸ”

IBM's Wendi Whitmore explains why a data breach isn't a one-time cost and recommends cost-saving tips, which include having access to an incident response team.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to cut the cost of a data breach πŸ”

IBM's Wendi Whitmore explains why a data breach isn't a one-time cost and recommends cost-saving tips, which include having access to an incident response team.

πŸ“– Read

via "Security on TechRepublic".
❌ Choice Hotels Breach Showcases Need for Shared Responsibility Model ❌

700,000 customer records were exposed after being housed on a vendor's server that lacked appropriate security.

πŸ“– Read

via "Threatpost".
πŸ•΄ 68% of Companies Say Red Teaming Beats Blue Teaming πŸ•΄

The majority of organizations surveyed find red team exercises more effective than blue team testing, research shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to SSH into an AWS instance πŸ”

Logging into an AWS instance with SSH doesn't have to be a challenge.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent data destruction from cybersecurity attacks πŸ”

IBM's Christoper Scott discusses malware, how cyberattackers get into environments, and why using multifactor authentication is crucial if you use an online service.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Flaw in Vulnerability Management: It's Time to Get Real πŸ•΄

Companies will never be 100% immune to cyberattacks. But by having a realistic view of the basics, starting with endpoint vulnerabilities, we can build for a safer future.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to limit the impact of data breaches πŸ”

IBM's Wendi Whitmore offers advice about how to defend against and respond to data breaches.

πŸ“– Read

via "Security on TechRepublic".
❌ Apache Security Advisories Red Flag Wrong Versions in Patching Gaffe ❌

Up to 24 Apache Struts Security Advisories listed the wrong versions that were impacted by vulnerabilities, researchers warn.

πŸ“– Read

via "Threatpost".
πŸ” SEC Looking Into First American Breach πŸ”

May's massive breach at First American Financial Corp. exposed 885 million records. Now the company is drawing the attention of regulators, curious if any laws were broken.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Energy Sector Phish Swims Past Microsoft Email Security via Google Drive ❌

The savvy technique of avoiding malicious links in the email allowed the phishing attack to reach its targets.

πŸ“– Read

via "Threatpost".
❌ HTTP Bugs Open Websites to DoS Attacks ❌

Eight vulnerabilities in the HTTP/2 server implementations were found in vendors Amazon, Apple, Microsoft and Apache.

πŸ“– Read

via "Threatpost".
πŸ•΄ Adware, Trojans Hit Education Sector Hard πŸ•΄

Students continue to be weak links for schools and universities, according to data from security firm Malwarebytes.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to prevent data destruction from cybersecurity attacks πŸ”

IBM's Christoper Scott discusses malware, how cyberattackers get into environments, and why using multifactor authentication is crucial if you use an online service.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ NSA Researchers Talk Development, Release of Ghidra SRE Tool πŸ•΄

NSA researchers took the Black Hat stage to share details of how they developed and released the software reverse-engineering framework.

πŸ“– Read

via "Dark Reading: ".