🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Close the Gap Between Cyber-Risk and Business Risk 🕴

Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.

📖 Read

via "Dark Reading: ".
🕴 Creative Wi-Fi Passwords 🕴

Let's see a hacker figure out one of these.

📖 Read

via "Dark Reading: ".
S2 Ep12: Dark Web, O.MG Cable spying and securing new laptops – Naked Security Podcast

Listen to the latest episode now!

📖 Read

via "Naked Security".
🕴 Build Your Cybersecurity Toolkit at Black Hat Europe in December 🕴

Now's the time to start planning what to see and do at Black Hat Europe, which is jam-packed with relevant Briefings and Arsenal demos.

📖 Read

via "Dark Reading: ".
🔐 How to enable SSH session recording in CentOS 8 🔐

Learn how to enable SSH session recording in CentOS 8.

📖 Read

via "Security on TechRepublic".
🔐 How to enable SSH session recording in CentOS 8 🔐

Learn how to enable SSH session recording in CentOS 8.

📖 Read

via "Security on TechRepublic".
🔏 Friday Five: 10/11 Edition 🔏

News on a new military cyber alert system, Twitter mishandles user data, and what to do with data if there's a no-deal Brexit. Catch up on the week's news with the Friday Five.

📖 Read

via "Subscriber Blog RSS Feed ".
Fin7 Cybergang Retools With New Malicious Code

A new dropper and payload show that Fin7 isn't going anywhere despite a crackdown on the infamous group by law enforcement in 2018.

📖 Read

via "Threatpost".
🕴 A Murderers' Row of Poisoning Attacks 🕴

Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning and other attacks work can help you prepare the proper antidote.

📖 Read

via "Dark Reading: ".
🕴 Works of Art: Cybersecurity Inspires 6 Winning Ideas 🕴

The Center for Long Term Cybersecurity recently awarded grants to six artists in a contest to come up with ideas for works with security themes and elements. Check 'em out.

📖 Read

via "Dark Reading: ".
Imperva: Data Breach Caused by Cloud Misconfiguration

Hackers were able to steal an AWS administrative API key housed in a compute instance left exposed to the public internet.

📖 Read

via "Threatpost".
🕴 FBI: Phishing Can Defeat Two-Factor Authentication 🕴

A recent Privacy Industry Notification points to two new hacker tools that can turn a victim's browser into a credential-stealing zombie.

📖 Read

via "Dark Reading: ".
🔐 SafeBreach catches vulnerability in controversial HP Touchpoint Analytics software 🔐

After being notified on July 4, HP waited four months before releasing a security advisory.

📖 Read

via "Security on TechRepublic".
Software, Supply-Chain Dangers Top List of 5G Cyber Risks

Without naming Huawei, the EU warns on state-backed 5G suppliers.

📖 Read

via "Threatpost".
🕴 7 SMB Security Tips That Will Keep Your Company Safe 🕴

With National Cybersecurity Awareness Month as a backdrop, industry leaders weigh in on how SMBs can more effectively protect themselves from cyberattacks.

📖 Read

via "Dark Reading: ".
🕴 Click2Mail Suffers Data Breach 🕴

Mail provider discovered customer data being used in spam messages.

📖 Read

via "Dark Reading: ".
Monday review – the hot 20 stories of the week

From hackers bypassing 2FA to an Android zero day Google thought it had fixed - get yourself up to date with everything we've written in the last seven days. It's weekly roundup time.

📖 Read

via "Naked Security".
🕴 Can I Get More Mileage From My Existing Security Tools? 🕴

Some points to consider before you break open your wallet.

📖 Read

via "Dark Reading: ".
Hacker asking $300 for 250,000 records stolen from sex worker site

In spite of prostitution being legal in the Netherlands, this could lead to the same type of blackmail attempts/suicide from Ashley Madison.

📖 Read

via "Naked Security".
Computing enthusiast cracks ancient Unix code

Old passwords never die... they just become easier to decode.

📖 Read

via "Naked Security".