πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Retadup Worm Squashed After Infecting 850K Machines πŸ•΄

An operation involving French law enforcement, the FBI, and Avast forces Retadup to delete itself from victim machines.

πŸ“– Read

via "Dark Reading: ".
❌ FIN6 Switches Up PoS Tactics to Target E-Commerce ❌

The group is using the More_eggs JScript backdoor to anchor its attack.

πŸ“– Read

via "Threatpost".
❌ TGI Fridays Delivers Customer Indigestion Over Data Exposure ❌

TGI Fridays Australia restaurant chain warns loyalty reward program member of exposed data incident.

πŸ“– Read

via "Threatpost".
πŸ” Help! Our VMware Server is infected with ransomware πŸ”

TechRepublic member sagilbert47201 has discovered their VMware backup server is infected with ransomware. Can you help this TechRepublic member recover their data?

πŸ“– Read

via "Security on TechRepublic".
⚠ Google warns of system-controlling Chrome bug ⚠

Google is patching a serious bug in the desktop version of its Chrome browser that could let an attacker take over a computer simply by luring them to a website.

πŸ“– Read

via "Naked Security".
⚠ Apple apologizes for humans listening to Siri clips, changes policy ⚠

Apple is turning off automatic review of Siri audio and locking it down so that only Apple employees get to listen to it.

πŸ“– Read

via "Naked Security".
⚠ Facebook: β€˜Technical error’ let strangers into Messenger Kids chats ⚠

It won't happen again, Facebook told senators who wondered how well it's handling kids' privacy in the chat app abhorred by kids advocates.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five: 8/30 Edition πŸ”

Apple recommits to privacy with Siri, news on a bug bounty program for the DHS, plus the IRS warns of a new phishing attack - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ Botnet targets set-top boxes using Android OS ⚠

Production systems aren't supposed to have the ADB turned on, but some set-top boxes do.

πŸ“– Read

via "Naked Security".
πŸ•΄ 7 Breaches & Hacks That Throw Shade on Biometric Security πŸ•΄

Stolen fingerprints, fake hands, voice synthetization, and other nefarious techniques show biometrics has plenty of challenges.

πŸ“– Read

via "Dark Reading: ".
❌ News Wrap: Dentist Offices Hit By Ransomware, Venmo Faces Privacy Firestorm ❌

From new ransomware attacks to privacy issues around Venmo and Ring, Threatpost editors break down the top news of this week.

πŸ“– Read

via "Threatpost".
πŸ•΄ To Navigate a Sea of Cybersecurity Solutions, Learn How to Fish πŸ•΄

Three steps for relieving the pressure of picking the right tools.

πŸ“– Read

via "Dark Reading: ".
⚠ Sophisticated iPhone hacking went unnoticed for over two years ⚠

Compromised iPhones were turned into surveillance tools capable of recording the owner’s entire digital life.

πŸ“– Read

via "Naked Security".
πŸ•΄ 'It Saved Our Community': 16 Realistic Ransomware Defenses for Cities πŸ•΄

Practical steps municipal governments can take to better prevent and respond to ransomware infections.

πŸ“– Read

via "Dark Reading: ".
πŸ” How the Cloud Security Alliance helps businesses identify and mitigate cybersecurity risks πŸ”

John Yeoh explains how CSA works with organizations on various aspects of cloud security to identify top risks, assess cloud service providers, establish baseline controls, and build best practices.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Overburdened SOC Analysts Shift Priorities πŸ•΄

Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows.

πŸ“– Read

via "Dark Reading: ".
❌ Six Hackers Have Now Pocketed $1M From Bug Bounty Programs ❌

Up to 25 percent of valid vulnerabilities found in bug bounty programs are classified as being of high or critical severity.

πŸ“– Read

via "Threatpost".
❌ iPhone Zero-Days Anchored Watering-Hole Attacks ❌

A new, highly capable spyware payload can monitor everything in a person's digital life.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2014-9982

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10061

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10060

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none.

πŸ“– Read

via "National Vulnerability Database".