πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to SSH into an AWS instance πŸ”

Logging into an AWS instance with SSH doesn't have to be a challenge.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent data destruction from cybersecurity attacks πŸ”

IBM's Christoper Scott discusses malware, how cyberattackers get into environments, and why using multifactor authentication is crucial if you use an online service.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Flaw in Vulnerability Management: It's Time to Get Real πŸ•΄

Companies will never be 100% immune to cyberattacks. But by having a realistic view of the basics, starting with endpoint vulnerabilities, we can build for a safer future.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to limit the impact of data breaches πŸ”

IBM's Wendi Whitmore offers advice about how to defend against and respond to data breaches.

πŸ“– Read

via "Security on TechRepublic".
❌ Apache Security Advisories Red Flag Wrong Versions in Patching Gaffe ❌

Up to 24 Apache Struts Security Advisories listed the wrong versions that were impacted by vulnerabilities, researchers warn.

πŸ“– Read

via "Threatpost".
πŸ” SEC Looking Into First American Breach πŸ”

May's massive breach at First American Financial Corp. exposed 885 million records. Now the company is drawing the attention of regulators, curious if any laws were broken.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Energy Sector Phish Swims Past Microsoft Email Security via Google Drive ❌

The savvy technique of avoiding malicious links in the email allowed the phishing attack to reach its targets.

πŸ“– Read

via "Threatpost".
❌ HTTP Bugs Open Websites to DoS Attacks ❌

Eight vulnerabilities in the HTTP/2 server implementations were found in vendors Amazon, Apple, Microsoft and Apache.

πŸ“– Read

via "Threatpost".
πŸ•΄ Adware, Trojans Hit Education Sector Hard πŸ•΄

Students continue to be weak links for schools and universities, according to data from security firm Malwarebytes.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to prevent data destruction from cybersecurity attacks πŸ”

IBM's Christoper Scott discusses malware, how cyberattackers get into environments, and why using multifactor authentication is crucial if you use an online service.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ NSA Researchers Talk Development, Release of Ghidra SRE Tool πŸ•΄

NSA researchers took the Black Hat stage to share details of how they developed and released the software reverse-engineering framework.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 20+ Data Breaches Reported Per Day in First Half of 2019 πŸ•΄

But incidents involving SSNs, addresses, birth dates were smaller than in previous years.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ More Than 20 Data Breaches Reported Per Day in First Half of 2019 πŸ•΄

But incidents involving SSNs, addresses, birth dates were smaller than in previous years.

πŸ“– Read

via "Dark Reading: ".
⚠ Microsoft won’t shift on AI recordings policy ⚠

Microsoft may have been caught red-handed letting contractors listen to sensitive conversations with its AI, but that doesn't mean it's going to stop.

πŸ“– Read

via "Naked Security".
⚠ Police site DDoSer/bomb hoaxer caught after jeering on social media ⚠

He called in bomb hoaxes days after the Manchester Arena murders, DDoSed police sites when they investigated him, then taunted via Twitter.

πŸ“– Read

via "Naked Security".
⚠ Google removes option to disable Nest cams’ status light ⚠

It's more of a β€œpost-purchase middle finger” to customers than a privacy plus, say some outraged users who use the cams to catch crooks.

πŸ“– Read

via "Naked Security".
πŸ•΄ Beat the Heat: Dark Reading Caption Contest Winners πŸ•΄

Phishing, token codes, training, MFA, polluted data entry, and whales. And the winners are ...

πŸ“– Read

via "Dark Reading: ".
⚠ iPhone holes and Android malware – how to keep your phone safe ⚠

Watch the latest Naked Security Live video for our non-technical tips to improve your online safety, whichever type of phone you prefer.

πŸ“– Read

via "Naked Security".
πŸ•΄ Behind the Scenes at ICS Village πŸ•΄

ICS Village co-founder Bryson Bort reveals plans for research-dedicated events that team independent researchers, critical infrastructure owners, and government specialists.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ European Central Bank Website Hit by Malware Attack πŸ•΄

The website was infected with malware that stole information on subscribers to a bank newsletter.

πŸ“– Read

via "Dark Reading: ".