πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ S2 Ep10: Emotet’s back, mutant WannaCry and Insta scam – Naked Security Podcast ⚠

Here's the latest Naked Security podcast - listen now!

πŸ“– Read

via "Naked Security".
❌ CISOs: Support Vendor Security Ops for Best Cloud Results ❌

Despite CISOs' apprehension about increasing dependence on SaaS applications and the security risks the cloud represents, adoption isn’t slowing down.

πŸ“– Read

via "Threatpost".
πŸ” 75% of execs cite phishing as the most significant security threat to businesses πŸ”

Training is the key to helping the enterprise avoid cyber threats from phishing or other means.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Why You Need to Think About API Security πŸ•΄

Businesses of all sorts are increasingly relying on APIs to interact with customers in smartphone apps, but they have their own unique set of vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
❌ Vimeo Slapped With Lawsuit Over Biometrics Privacy Policy ❌

Vimeo is under fire for allegedly collecting and storing users' facial biometrics in videos and photos without their consent or knowledge.

πŸ“– Read

via "Threatpost".
❌ Phish Uses Google’s URL Decoding to Swim Past Defenses ❌

Percentage-based URL encoding plus Google domain trickery is helping malicious emails to evade filters.

πŸ“– Read

via "Threatpost".
❌ Cisco Patches 13 High-Severity Router and Switch Bugs ❌

One Cisco bug impacting its 800 and 1000 series routers had a CVSS severity score of 9.9.

πŸ“– Read

via "Threatpost".
❌ 5G and IoT: How to Approach the Security Implications ❌

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).

πŸ“– Read

via "Threatpost".
πŸ›  Falco 0.17.1 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” EU Court Limits 'Right to Be Forgotten' πŸ”

Google won what many viewed as a milestone case this week as Europe's top court ruled it doesn't have to extend the "right to be forgotten" privacy rule beyond the EU’s 28 states.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Rash of Exploits Targets Critical vBulletin RCE Bug ❌

After someone dropped a zero-day exploit on Securelist this week, the platform rushed out a fix -- time to apply it.

πŸ“– Read

via "Threatpost".
πŸ•΄ Airbus Cyberattack Landed on Suppliers' Networks πŸ•΄

Four separate incidents over the past year have targeted Airbus suppliers for the manufacturer's sensitive commercial data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Clouds Keep Leaking Data πŸ•΄

Most devastating cloud data leaks are caused by the same kinds of common cloud security challenges and configuration errors. Here's what you need to know.

πŸ“– Read

via "Dark Reading: ".
πŸ” Responding to email-based attacks takes over three hours, on average πŸ”

Manually addressing breaches that result from email-based attacks is a time sink for IT professionals, according to a Barracuda report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Ransomware Hits Multiple, Older Vulnerabilities πŸ•΄

Ransomware attacks are taking advantage of vulnerabilities that are older and less severe, a new report finds.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to deploy the Kubernetes WebUI with MicroK8s πŸ”

Looking for a web-based tool to manage Microk8s? Look no further than the Kubernetes dashboard.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Voting Machine Systems New & Old Contain 'Design' Flaws πŸ•΄

DEF CON Voting Village organizers presented a final report on their findings at the Capitol.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to deploy the Kubernetes WebUI with MicroK8s πŸ”

Looking for a web-based tool to manage Microk8s? Look no further than the Kubernetes dashboard.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cloud-Native Applications: Shift to Serverless is Underway πŸ•΄

A new report explores changes in cloud-native applications and complexities involved with securing them.

πŸ“– Read

via "Dark Reading: ".
❌ DoorDash Data Breach Impacts Personal Data of Almost 5M Users ❌

Accessed information includes delivery addresses, license numbers, names, phone numbers and more.

πŸ“– Read

via "Threatpost".
πŸ•΄ Mass Exploitation of vBulletin Flaw Raises Alarm πŸ•΄

The remote code execution bug was a 0-day when it was publicly disclosed Monday, but has now been patched.

πŸ“– Read

via "Dark Reading: ".