πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2014-10382

The feature-comments plugin before 1.2.5 for WordPress has CSRF for featuring or burying a comment.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7483

The slidedeck2 plugin before 2.3.5 for WordPress has file inclusion.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Haas Formula 1 CIO Builds Security at 230 Miles per Hour πŸ•΄

As the CIO for both Formula 1 and NASCAR racing teams, Gary Foote is tackling the same security issues as other manufacturing CIOs -- with a huge dash of motorized mayhem thrown in.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Malware Variant Targets Old Adobe, Office Vulnerabilities πŸ•΄

Criminals appear to have developed it knowing some users have not patched or updated to newer versions, Trend Micro says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Analytics and Security Prove Effective Security Hybrid πŸ•΄

Against the backdrop of consolidation in the SIEM and SOAR sectors, infosec professionals are deploying some combination of analytics and security, according to Haiyan Song, Senior Vice President & General Manager of Security Markets for Splunk. Analytics helps organizations make better decisions and detect anomalies faster, she adds.

πŸ“– Read

via "Dark Reading: ".
πŸ” 100+ IT policies at your fingertips, ready for download πŸ”

From BYOD and social media to ergonomics and encryption, TechRepublic has dozens of ready-made, downloadable IT policy templates.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Regular User Training Most Effective Security Antidote πŸ•΄

Social engineering remains the top vulnerability organizations face because humans remain the easiest way to access networks or databases, says Stu Sjouwerman, Founder and CEO of KnowBe4. Regular training sessions coupled with creation of a "human firewall" remain the most effective protections against social engineering and phishing, he adds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cloud Services Require a Shift in Security Strategy πŸ•΄

End-user organizations have their security management tools, but so do cloud service providers, and that forces some hard questions about whose tools will be used to keep everything locked down, says Jesse Rothstein, CTO and Co-Founder of ExtraHop. And he makes the case that better data hygiene can help decrease the chances of a breach.

πŸ“– Read

via "Dark Reading: ".
⚠ Bumper Cisco patches fix four new β€˜critical’ vulnerabilities ⚠

Cisco just issued some urgent patching homework in the form of 31 security fixes, 4 of them for flaws rated β€˜critical’.

πŸ“– Read

via "Naked Security".
πŸ•΄ Clogged Cache? The Edge Cartoon Content Winners πŸ•΄

Creativity flowed, but two captions rose to the top.

πŸ“– Read

via "Dark Reading: ".
⚠ β€˜Privacy policy change’ hoax infects Instagram; it confirms it’s crud ⚠

Multiple celebs fell for this one. Don't believe them - it's as much as a hoax as it's always been.

πŸ“– Read

via "Naked Security".
πŸ•΄ Clogged Cache? The Edge Cartoon Content Winners πŸ•΄

Creativity flowed, but two captions rose to the top.

πŸ“– Read

via "Dark Reading: ".
πŸ” Google moves closer to letting Chrome web apps edit your files despite warning it could be 'abused in terrible ways' πŸ”

Using the new Native File System API, web apps would be able to read and save files, as well as gather info on files stored on your device.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ App Security Still Dogs Developers, End-User Organizations πŸ•΄

Lots of re-used code, cost pressures and long lead times for application software all lead to porous security where application software is concerned, says Chris Eng, Chief Research Officer for Veracode. But an emerging role he calls a "security champion" can help circumvent those problems and make apps safer for everyone.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybersecurity alert: 34% of vulnerabilities found this year remain unpatched πŸ”

The overall number of reported vulnerabilities in the first half of 2019 has dropped slightly from last year, but risks remain high, according to Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills πŸ•΄

The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security - without busting any budgets.

πŸ“– Read

via "Dark Reading: ".
⚠ Instagram phishing uses 2FA as a lure ⚠

If the phishing page looks OK, and it has an HTTPS padlock, how are you supposed to spot phishes these days? Read our tips...

πŸ“– Read

via "Naked Security".
πŸ•΄ Spirent Nixes Over-Reliance on Compliance Checklists for Good Security πŸ•΄

Enterprises must regularly validate their security efficacy based on real-time conditions, not compliance criteria, says John Weinschenk, General manager, Enterprise Network and Application Security of Spirent. That sort of testing returns actionable data to tune devices, update policies, and fortify defenses before they are compromised, he adds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Capital One Breach: What Security Teams Can Do Now πŸ•΄

Knowing the methods of the attacker, as laid out in the federal indictment, allow us to prevent similar attacks.

πŸ“– Read

via "Dark Reading: ".