πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to safely delete a user account on Linux πŸ”

Deleting users on a Linux server should be handled with this best practice.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable Nextcloud 16 detection of suspicious logins πŸ”

Track suspicious login attempts on Nextcloud with the help of a simple app.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to safely delete a user account on Linux πŸ”

Deleting users on a Linux server should be handled with this best practice.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable Nextcloud 16 detection of suspicious logins πŸ”

Track suspicious login attempts on Nextcloud with the help of a simple app.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Credential-Theft Attack Weaponizes DNS πŸ•΄

The recently discovered campaign sends stolen data out of the network as part of a DNS query.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-10049

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ @jack Got Hacked -- Twitter CEO's Tweets Hijacked πŸ•΄

Twitter CEO Jack Dorsey's Twitter account was, apparently, hijacked for roughly 20 minutes and used for racist rant.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ @jack Got Hacked -- Twitter CEO's Tweets Hijacked πŸ•΄

Twitter CEO Jack Dorsey's Twitter account was, apparently, hijacked for roughly 20 minutes and used for racist rant.

πŸ“– Read

via "Dark Reading: ".
⚠ @jack’s twitter attacked, phone number hacked ⚠

Twitter founder and CEO Jack Dorsey's Twitter account was compromised.

πŸ“– Read

via "Naked Security".
⚠ Monday review – the hot 18 stories of the week ⚠

From a system-controlling Chrome bug to the charging of 80 romance scammers - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Capital One cryptojacking suspect indicted ⚠

The former software engineer allegedly created scanners to look for misconfigured servers rented from a cloud computing company.

πŸ“– Read

via "Naked Security".
⚠ Google throws bug bounty bucks at mega-popular third-party apps ⚠

Google’s going to throw more bug bounty money at the problem of nasty apps in its Play Store, it announced on Thursday. In a post from the Android Security & Privacy team’s Adam Bacchus, Sebastian Porst, and Patrick Mutchlerβ€Š, the company said that it’s throwing the security net over not just its own apps, but […]

πŸ“– Read

via "Naked Security".
❌ Gamification Can Transform Company Cybersecurity Culture ❌

Implementing game mechanics and competition into the mix can incentivize employees to improve their cybersecurity posture.

πŸ“– Read

via "Threatpost".
πŸ•΄ ISAC 101: Unlocking the Power of Information πŸ•΄

How information sharing and analysis centers provide contextual threat information by creating communities that helps security professionals and their organizations grow in maturity and capability.

πŸ“– Read

via "Dark Reading: ".
⚠ WordPress sites are being backdoored with rogue admin users ⚠

A malvertising campaign has evolved to give hackers control of entire sites.

πŸ“– Read

via "Naked Security".
⚠ XKCD forums breached ⚠

How did the Correct Horse Battery get Stapled?

πŸ“– Read

via "Naked Security".
⚠ FBI asks Google for help finding criminals ⚠

FBI agents issued Google with a warrant in November 2018, seeking its help with a bank robbery the month before.

πŸ“– Read

via "Naked Security".
⚠ China’s new face-swapping app Zao gets whiplash-fast privacy backlash ⚠

Fast trip: in two days, it debuted, shot to the top of China's App Store, sparked privacy outrage, and got banned by WeChat.

πŸ“– Read

via "Naked Security".
❌ β€˜USBAnywhere’ Bugs Open Supermicro Servers to Remote Attackers ❌

Trivial-to-exploit authentication flaws can give an unsophisticated remote attacker 'omnipotent' control over a server and its contents.

πŸ“– Read

via "Threatpost".
⚠ iPhone attack may have targeted Android and Windows too ⚠

A sophisticated and sustained watering hole attack affecting iPhones may have targeted Windows and Android too.

πŸ“– Read

via "Naked Security".