πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Analytics and Security Prove Effective Security Hybrid πŸ•΄

Against the backdrop of consolidation in the SIEM and SOAR sectors, infosec professionals are deploying some combination of analytics and security, according to Haiyan Song, Senior Vice President & General Manager of Security Markets for Splunk. Analytics helps organizations make better decisions and detect anomalies faster, she adds.

πŸ“– Read

via "Dark Reading: ".
πŸ” 100+ IT policies at your fingertips, ready for download πŸ”

From BYOD and social media to ergonomics and encryption, TechRepublic has dozens of ready-made, downloadable IT policy templates.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Regular User Training Most Effective Security Antidote πŸ•΄

Social engineering remains the top vulnerability organizations face because humans remain the easiest way to access networks or databases, says Stu Sjouwerman, Founder and CEO of KnowBe4. Regular training sessions coupled with creation of a "human firewall" remain the most effective protections against social engineering and phishing, he adds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cloud Services Require a Shift in Security Strategy πŸ•΄

End-user organizations have their security management tools, but so do cloud service providers, and that forces some hard questions about whose tools will be used to keep everything locked down, says Jesse Rothstein, CTO and Co-Founder of ExtraHop. And he makes the case that better data hygiene can help decrease the chances of a breach.

πŸ“– Read

via "Dark Reading: ".
⚠ Bumper Cisco patches fix four new β€˜critical’ vulnerabilities ⚠

Cisco just issued some urgent patching homework in the form of 31 security fixes, 4 of them for flaws rated β€˜critical’.

πŸ“– Read

via "Naked Security".
πŸ•΄ Clogged Cache? The Edge Cartoon Content Winners πŸ•΄

Creativity flowed, but two captions rose to the top.

πŸ“– Read

via "Dark Reading: ".
⚠ β€˜Privacy policy change’ hoax infects Instagram; it confirms it’s crud ⚠

Multiple celebs fell for this one. Don't believe them - it's as much as a hoax as it's always been.

πŸ“– Read

via "Naked Security".
πŸ•΄ Clogged Cache? The Edge Cartoon Content Winners πŸ•΄

Creativity flowed, but two captions rose to the top.

πŸ“– Read

via "Dark Reading: ".
πŸ” Google moves closer to letting Chrome web apps edit your files despite warning it could be 'abused in terrible ways' πŸ”

Using the new Native File System API, web apps would be able to read and save files, as well as gather info on files stored on your device.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ App Security Still Dogs Developers, End-User Organizations πŸ•΄

Lots of re-used code, cost pressures and long lead times for application software all lead to porous security where application software is concerned, says Chris Eng, Chief Research Officer for Veracode. But an emerging role he calls a "security champion" can help circumvent those problems and make apps safer for everyone.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybersecurity alert: 34% of vulnerabilities found this year remain unpatched πŸ”

The overall number of reported vulnerabilities in the first half of 2019 has dropped slightly from last year, but risks remain high, according to Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills πŸ•΄

The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security - without busting any budgets.

πŸ“– Read

via "Dark Reading: ".
⚠ Instagram phishing uses 2FA as a lure ⚠

If the phishing page looks OK, and it has an HTTPS padlock, how are you supposed to spot phishes these days? Read our tips...

πŸ“– Read

via "Naked Security".
πŸ•΄ Spirent Nixes Over-Reliance on Compliance Checklists for Good Security πŸ•΄

Enterprises must regularly validate their security efficacy based on real-time conditions, not compliance criteria, says John Weinschenk, General manager, Enterprise Network and Application Security of Spirent. That sort of testing returns actionable data to tune devices, update policies, and fortify defenses before they are compromised, he adds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Capital One Breach: What Security Teams Can Do Now πŸ•΄

Knowing the methods of the attacker, as laid out in the federal indictment, allow us to prevent similar attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ VMware to Buy Carbon Black for $2.1B πŸ•΄

Virtual machine giant's big cloud move includes plans to shell out $2.7 billion in stock transactions for Pivotal Software.

πŸ“– Read

via "Dark Reading: ".
❌ Lenovo High-Severity Bug Found in Pre-Installed Software ❌

Security researchers at Pen Test Partners have found a privilege escalation flaw in the much-maligned Lenovo Solution Center software.

πŸ“– Read

via "Threatpost".
πŸ•΄ Virtual World of Containers, VMs Creates New Security Challenges πŸ•΄

Containers, virtual machines, and the advent of DevOps as a software creation tool all put new pressures on organizations' security strength, according to Dan Hubbard, CEO of Lacework. Cloud's ability to offer scale, capacity, and processing power may even exacerbate the vulnerabilities unless properly managed, he adds.

πŸ“– Read

via "Dark Reading: ".
❌ News Wrap: Linux Utility Backdoor, Steam Zero Day Disclosure Drama ❌

From a backdoor placed in the Webmin utility to vulnerability disclosure drama around zero-days in Valve's Steam gaming clients, Threatpost breaks down this week's top stories.

πŸ“– Read

via "Threatpost".
πŸ•΄ 80 Charged in Massive BEC Operation Bust πŸ•΄

A group of mostly Nigerian nationals attempted to steal $46 million through business email compromise and romance scams, the FBI reports.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 8/23 Edition πŸ”

News on how Texas is handling a rash of ransomware attacks, Sweden issues its first GDPR fine, and more - catch up on the news of the week in this wrap up!

πŸ“– Read

via "Subscriber Blog RSS Feed ".