πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ 35 state attorney generals tell FCC to pull the plug on robocalls ⚠

The AGs want the FCC to adopt SHAKEN and STIR.

πŸ“– Read

via "Naked Security".
⚠ What Kanye West can teach us about passcodes ⚠

Pulling out an iPhone XS to show the assembled throng a picture of the hydrogen-powered aircraft that β€œour president should be flying in,” West casually unlocked it using the passcode β€˜000000’.

πŸ“– Read

via "Naked Security".
πŸ•΄ 12 Free, Ready-to-Use Security Tools πŸ•΄

There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.

πŸ“– Read

via "Dark Reading: ".
❌ Facebook Bans More Than 800 Accounts in Disinformation Purge ❌

The move comes a month before the November midterm elections – and at a time when all eyes are on Facebook to see how it protects against disinformation.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Threat Hunters & Security Analysts: A Dynamic Duo πŸ•΄

Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.

πŸ“– Read

via "Dark Reading: ".
πŸ” Almost half of cyberattacks are directed at SMBs, here's how to stay safe πŸ”

In 2017, small businesses were impacted by 113,000 incidents of macro malware, according to a SCORE study.

πŸ“– Read

via "Security on TechRepublic".
❌ Shining a Light on a New Technique for Stealth Persistence ❌

Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Microsoft Zero-Day Patch for JET Bug Incomplete, Claims Firm ❌

The official update from Microsoft only limits the vulnerability, according to 0Patch.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Why cybersecurity is the fastest-growing insurance market for SMBs πŸ”

Some 90% of SMBs are purchasing cyber insurance with limits of $1-$5 million, according to data from CyberPolicy.

πŸ“– Read

via "Security on TechRepublic".
❌ Threatpost News Wrap Podcast For Oct. 12 ❌

Threatpost's editors discuss the top news of this week.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ ICS Security Plagued with Basic, Avoidable Mistakes ❌

A survey of ICS security posture found outdated firewalls, improper segmentation password mistakes and more.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Facebook Update: 30 Million Users Actually Hit in its Recent Breach πŸ•΄

The good news: That number is less than the original estimate of 50 million. The bad news: It might not have been the only attack.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Most IT Security Pros Want to Change Jobs πŸ•΄

They cite five main reasons for wanting to move on - and what it would take to retain them.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why manufacturing companies need to up their cybersecurity game πŸ”

Cybercriminals now consider manufacturing companies a target-rich environment. Learn why and what can be done to get off that list.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How a tax credit can help small businesses in Maryland get cybersecure πŸ”

Learn why Maryland's Cybersecurity Incentive Tax Credit for small businesses is a win-win situation.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 23 stories of the week ⚠

From the Whatsapp hack to the world's most expensive USB stick, and everything in between. Catch up with everything we've written in the last 7 days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Literary-minded phishers are trying to pilfer publishers’ manuscripts ⚠

In a twist on Business Email Compromise, they're spoofing literary agents and going after manuscripts at Penguin Random House and Pan Macmillan.

πŸ“– Read

via "Naked Security".
⚠ Beware sextortionists spoofing your own email address ⚠

In the past, they've pretended to have your passwords - now they're pretending to send email from your "hacked" account, too.

πŸ“– Read

via "Naked Security".
⚠ Facebook opens up about data breach details ⚠

Two weeks after Facebook's first serious data breach, and the social network has shared what it has figured out so far.

πŸ“– Read

via "Naked Security".
πŸ” IBM takes cybersecurity on the road with rolling command center for training, response πŸ”

The IBM X-Force C-TOC is a fully-operational Security Operations Center being driven around on a semi truck to provide education and support to professionals and consumers.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 4 Ways to Fight the Email Security Threat πŸ•΄

It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.

πŸ“– Read

via "Dark Reading: ".