🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
Clickjacking Evolves to Hook Millions of Visitors to Top Sites

Researchers said that clickjacking is a threat that's evolving, with new tactics just starting to emerge.

📖 Read

via "Threatpost".
🔐 How to limit the impact of data breaches 🔐

IBM's Wendi Whitmore offers advice about how to defend against and respond to data breaches.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2015-9292 (6kbbs)

6kbbs 7.1 and 8.0 allows CSRF via portalchannel_ajax.php (id or code parameter) or admin.php (fileids parameter).

📖 Read

via "National Vulnerability Database".
🔐 How to cut the cost of a data breach 🔐

IBM's Wendi Whitmore explains why a data breach isn't a one-time cost and recommends cost-saving tips, which include having access to an incident response team.

📖 Read

via "Security on TechRepublic".
🔐 How to cut the cost of a data breach 🔐

IBM's Wendi Whitmore explains why a data breach isn't a one-time cost and recommends cost-saving tips, which include having access to an incident response team.

📖 Read

via "Security on TechRepublic".
Choice Hotels Breach Showcases Need for Shared Responsibility Model

700,000 customer records were exposed after being housed on a vendor's server that lacked appropriate security.

📖 Read

via "Threatpost".
🕴 68% of Companies Say Red Teaming Beats Blue Teaming 🕴

The majority of organizations surveyed find red team exercises more effective than blue team testing, research shows.

📖 Read

via "Dark Reading: ".
🔐 How to SSH into an AWS instance 🔐

Logging into an AWS instance with SSH doesn't have to be a challenge.

📖 Read

via "Security on TechRepublic".
🔐 How to prevent data destruction from cybersecurity attacks 🔐

IBM's Christoper Scott discusses malware, how cyberattackers get into environments, and why using multifactor authentication is crucial if you use an online service.

📖 Read

via "Security on TechRepublic".
🕴 The Flaw in Vulnerability Management: It's Time to Get Real 🕴

Companies will never be 100% immune to cyberattacks. But by having a realistic view of the basics, starting with endpoint vulnerabilities, we can build for a safer future.

📖 Read

via "Dark Reading: ".
🔐 How to limit the impact of data breaches 🔐

IBM's Wendi Whitmore offers advice about how to defend against and respond to data breaches.

📖 Read

via "Security on TechRepublic".
Apache Security Advisories Red Flag Wrong Versions in Patching Gaffe

Up to 24 Apache Struts Security Advisories listed the wrong versions that were impacted by vulnerabilities, researchers warn.

📖 Read

via "Threatpost".
🔏 SEC Looking Into First American Breach 🔏

May's massive breach at First American Financial Corp. exposed 885 million records. Now the company is drawing the attention of regulators, curious if any laws were broken.

📖 Read

via "Subscriber Blog RSS Feed ".
Energy Sector Phish Swims Past Microsoft Email Security via Google Drive

The savvy technique of avoiding malicious links in the email allowed the phishing attack to reach its targets.

📖 Read

via "Threatpost".
HTTP Bugs Open Websites to DoS Attacks

Eight vulnerabilities in the HTTP/2 server implementations were found in vendors Amazon, Apple, Microsoft and Apache.

📖 Read

via "Threatpost".
🕴 Adware, Trojans Hit Education Sector Hard 🕴

Students continue to be weak links for schools and universities, according to data from security firm Malwarebytes.

📖 Read

via "Dark Reading: ".
🔐 How to prevent data destruction from cybersecurity attacks 🔐

IBM's Christoper Scott discusses malware, how cyberattackers get into environments, and why using multifactor authentication is crucial if you use an online service.

📖 Read

via "Security on TechRepublic".
🕴 NSA Researchers Talk Development, Release of Ghidra SRE Tool 🕴

NSA researchers took the Black Hat stage to share details of how they developed and released the software reverse-engineering framework.

📖 Read

via "Dark Reading: ".
🕴 20+ Data Breaches Reported Per Day in First Half of 2019 🕴

But incidents involving SSNs, addresses, birth dates were smaller than in previous years.

📖 Read

via "Dark Reading: ".
🕴 More Than 20 Data Breaches Reported Per Day in First Half of 2019 🕴

But incidents involving SSNs, addresses, birth dates were smaller than in previous years.

📖 Read

via "Dark Reading: ".