πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ News Wrap: GandCrab Operators Resurface, Utilities Firms Hit By LookBack Malware ❌

The malware landscape continues to evolve with the re-emergence of the GandCrab operators and a continued spearphishing attack spreading the LookBack RAT.

πŸ“– Read

via "Threatpost".
⚠ Google made thousands of deepfakes to aid detection efforts ⚠

It's an arms race: as detection methods improve, deepfake-generating algorithms are quickly updated to correct the flaws.

πŸ“– Read

via "Naked Security".
⚠ Chrome cripples movie studio Mac Pros ⚠

A few days ago, movie editors started reporting that Mac Pros running Avid software were crashing throughout Hollywood.

πŸ“– Read

via "Naked Security".
πŸ” Hybrid cloud setup offers relief to some companies while others are still fearful πŸ”

TechRepublic's Karen Roby discusses the findings of a recent FileCloud study concerning enterprise cloud and data issues.

πŸ“– Read

via "Security on TechRepublic".
⚠ Apple users, patch now! The β€˜bug that got away’ has been fixed ⚠

Apple has now patched the patch that Google said didn't patch the hole it was supposed to.

πŸ“– Read

via "Naked Security".
⚠ β€˜Fleeceware’ Play store apps quietly charging up to $250 ⚠

SophosLabs researchers discovered at least 15 apps with millions of downloads charging extraordinary prices right under the Google's nose.

πŸ“– Read

via "Naked Security".
πŸ•΄ Is Your Organization Suffering from Security Tool Sprawl? πŸ•΄

Most companies have too many tools, causing increased costs and security issues.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-10396 (epic)

The epic theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to includes/download.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ DoorDash Breach Affects 4.9M Merchants, Customers, Workers πŸ•΄

The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Blacklists Dozens of New File Extensions in Outlook ❌

In total, Microsoft has now blocked 142 file extensions that it deems as at risk or that are typically sent as malicious attachments in emails.

πŸ“– Read

via "Threatpost".
❌ Arcane Stealer V Takes Aim at the Low End of the Dark Web ❌

This data-harvesting tool is perfect for the deep well of low-skilled adversaries looking to make their cybercrime mark.

πŸ“– Read

via "Threatpost".
❌ Dunkin’ Donuts Gets Hit with Lawsuit Over 2015 Attack ❌

Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 9/27 Edition πŸ”

Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Cybersecurity Certification in the Spotlight Again πŸ•΄

Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.

πŸ“– Read

via "Dark Reading: ".
❌ Masad Spyware Uses Telegram Bots for Command-and-Control ❌

The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.

πŸ“– Read

via "Threatpost".
πŸ•΄ Apple Patches Multiple Vulnerabilities Across Platforms πŸ•΄

Updates address two separate issues in Apple's desktop and mobile operating systems.

πŸ“– Read

via "Dark Reading: ".
❌ iOS Exploit β€˜Checkm8’ Could Allow Permanent iPhone Jailbreaks ❌

A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cloud Vulnerability Could Let One Server Compromise Thousands πŸ•΄

A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install and use the Cryptomator encryption tool πŸ”

Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to install and use the Cryptomator encryption tool πŸ”

Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.

πŸ“– Read

via "Security on TechRepublic".