πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Build Your Cybersecurity Toolkit at Black Hat Europe in December πŸ•΄

Now's the time to start planning what to see and do at Black Hat Europe, which is jam-packed with relevant Briefings and Arsenal demos.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable SSH session recording in CentOS 8 πŸ”

Learn how to enable SSH session recording in CentOS 8.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable SSH session recording in CentOS 8 πŸ”

Learn how to enable SSH session recording in CentOS 8.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Friday Five: 10/11 Edition πŸ”

News on a new military cyber alert system, Twitter mishandles user data, and what to do with data if there's a no-deal Brexit. Catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Fin7 Cybergang Retools With New Malicious Code ❌

A new dropper and payload show that Fin7 isn't going anywhere despite a crackdown on the infamous group by law enforcement in 2018.

πŸ“– Read

via "Threatpost".
πŸ•΄ A Murderers' Row of Poisoning Attacks πŸ•΄

Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning and other attacks work can help you prepare the proper antidote.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Works of Art: Cybersecurity Inspires 6 Winning Ideas πŸ•΄

The Center for Long Term Cybersecurity recently awarded grants to six artists in a contest to come up with ideas for works with security themes and elements. Check 'em out.

πŸ“– Read

via "Dark Reading: ".
❌ Imperva: Data Breach Caused by Cloud Misconfiguration ❌

Hackers were able to steal an AWS administrative API key housed in a compute instance left exposed to the public internet.

πŸ“– Read

via "Threatpost".
πŸ•΄ FBI: Phishing Can Defeat Two-Factor Authentication πŸ•΄

A recent Privacy Industry Notification points to two new hacker tools that can turn a victim's browser into a credential-stealing zombie.

πŸ“– Read

via "Dark Reading: ".
πŸ” SafeBreach catches vulnerability in controversial HP Touchpoint Analytics software πŸ”

After being notified on July 4, HP waited four months before releasing a security advisory.

πŸ“– Read

via "Security on TechRepublic".
❌ Software, Supply-Chain Dangers Top List of 5G Cyber Risks ❌

Without naming Huawei, the EU warns on state-backed 5G suppliers.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 SMB Security Tips That Will Keep Your Company Safe πŸ•΄

With National Cybersecurity Awareness Month as a backdrop, industry leaders weigh in on how SMBs can more effectively protect themselves from cyberattacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Click2Mail Suffers Data Breach πŸ•΄

Mail provider discovered customer data being used in spam messages.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – the hot 20 stories of the week ⚠

From hackers bypassing 2FA to an Android zero day Google thought it had fixed - get yourself up to date with everything we've written in the last seven days. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
πŸ•΄ Can I Get More Mileage From My Existing Security Tools? πŸ•΄

Some points to consider before you break open your wallet.

πŸ“– Read

via "Dark Reading: ".
⚠ Hacker asking $300 for 250,000 records stolen from sex worker site ⚠

In spite of prostitution being legal in the Netherlands, this could lead to the same type of blackmail attempts/suicide from Ashley Madison.

πŸ“– Read

via "Naked Security".
⚠ Computing enthusiast cracks ancient Unix code ⚠

Old passwords never die... they just become easier to decode.

πŸ“– Read

via "Naked Security".
⚠ Soldering spy chips inside firewalls is now a cheap hack, shows researcher ⚠

The tiny ATtiny85 chip doesn’t look like the next big cyberthreat facing the world, but sneaking one on to a firewall motherboard would be bad news for security were it to happen.

πŸ“– Read

via "Naked Security".
❌ Apple Shares Some Browsing History with Chinese Company ❌

The company acknowledged it’s using β€˜safe browsing’ technology from Tencent, which has ties to the Chinese government.

πŸ“– Read

via "Threatpost".
⚠ Stalker found pop star by searching eyes’ reflections on Google Maps ⚠

A man confessed to stalking and attacking a young pop star by zooming in on the reflections in her eyes from selfies.

πŸ“– Read

via "Naked Security".