πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Cybersecurity alert: 34% of vulnerabilities found this year remain unpatched πŸ”

The overall number of reported vulnerabilities in the first half of 2019 has dropped slightly from last year, but risks remain high, according to Risk Based Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills πŸ•΄

The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security - without busting any budgets.

πŸ“– Read

via "Dark Reading: ".
⚠ Instagram phishing uses 2FA as a lure ⚠

If the phishing page looks OK, and it has an HTTPS padlock, how are you supposed to spot phishes these days? Read our tips...

πŸ“– Read

via "Naked Security".
πŸ•΄ Spirent Nixes Over-Reliance on Compliance Checklists for Good Security πŸ•΄

Enterprises must regularly validate their security efficacy based on real-time conditions, not compliance criteria, says John Weinschenk, General manager, Enterprise Network and Application Security of Spirent. That sort of testing returns actionable data to tune devices, update policies, and fortify defenses before they are compromised, he adds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Capital One Breach: What Security Teams Can Do Now πŸ•΄

Knowing the methods of the attacker, as laid out in the federal indictment, allow us to prevent similar attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ VMware to Buy Carbon Black for $2.1B πŸ•΄

Virtual machine giant's big cloud move includes plans to shell out $2.7 billion in stock transactions for Pivotal Software.

πŸ“– Read

via "Dark Reading: ".
❌ Lenovo High-Severity Bug Found in Pre-Installed Software ❌

Security researchers at Pen Test Partners have found a privilege escalation flaw in the much-maligned Lenovo Solution Center software.

πŸ“– Read

via "Threatpost".
πŸ•΄ Virtual World of Containers, VMs Creates New Security Challenges πŸ•΄

Containers, virtual machines, and the advent of DevOps as a software creation tool all put new pressures on organizations' security strength, according to Dan Hubbard, CEO of Lacework. Cloud's ability to offer scale, capacity, and processing power may even exacerbate the vulnerabilities unless properly managed, he adds.

πŸ“– Read

via "Dark Reading: ".
❌ News Wrap: Linux Utility Backdoor, Steam Zero Day Disclosure Drama ❌

From a backdoor placed in the Webmin utility to vulnerability disclosure drama around zero-days in Valve's Steam gaming clients, Threatpost breaks down this week's top stories.

πŸ“– Read

via "Threatpost".
πŸ•΄ 80 Charged in Massive BEC Operation Bust πŸ•΄

A group of mostly Nigerian nationals attempted to steal $46 million through business email compromise and romance scams, the FBI reports.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 8/23 Edition πŸ”

News on how Texas is handling a rash of ransomware attacks, Sweden issues its first GDPR fine, and more - catch up on the news of the week in this wrap up!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ IBM Announce Quantum Safe Encryption πŸ•΄

Techniques too tough for quantum computing solutions will be part of public cloud and tape storage encryption.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Qualys Launches Free App for IT Asset Discovery and Inventory πŸ•΄

Qualys's Chairman and CEO, Philippe Courtot talks about changes in the security landscape he's witnessed during the company's 20-year lifespan, as well as what motivated the vendor to give away its Global IT Asset Discovery and Inventory app for free.

πŸ“– Read

via "Dark Reading: ".
❌ WordPress Plugins Exploited in Ongoing Attack, Researchers Warn ❌

Researchers warn users of several plugins to update as vulnerabilities are being actively exploited to redirect website visitor traffic.

πŸ“– Read

via "Threatpost".
πŸ•΄ IBM Announces Quantum Safe Encryption πŸ•΄

Techniques too tough for quantum computing solutions will be part of public cloud and tape storage encryption.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Trains Its Sights on Cloud Providers πŸ•΄

Ransomware writers are now targeting cloud service providers with network file encryption attacks as a way to hold hostage the maximum number of customers that they can, notes Chris Morales, head of security analytics for Vectra. He also discusses Vectra's new ransomware report, which offers tips for protecting against virtual hostage taking.

πŸ“– Read

via "Dark Reading: ".
πŸ” More than half of login attempts on social media accounts are fraudulent πŸ”

By 2021, cybercrime is projected to cost the global economy more than $6 million in damages, according to an Arkose Labs report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cryptography & the Hype Over Quantum Computing πŸ•΄

It's not time to move to post-quantum cryptography yet -- too many things are still up in the air. But you can start to become prepared by making sure your infrastructure is agile.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ IRS Alerts Taxpayers to New Email Scam πŸ•΄

A spoofed IRS.gov link leads victims to a fraudulent Web page where they are prompted to download malware.

πŸ“– Read

via "Dark Reading: ".
πŸ” Famous con man Frank Abagnale provides advice to hackers πŸ”

Frank Abagnale, the inspiration behind the hit movie, Catch Me If You Can, talks with TechRepublic's Karen Roby about the dangers of social media posts.

πŸ“– Read

via "Security on TechRepublic".