🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🔐 How to protect your organization's website against typosquatting 🔐

Hundreds of fake domains have been set up against some of the presidential candidates through typosquatting, according to a report from digital risk company Digital Shadows.

📖 Read

via "Security on TechRepublic".
🕴 Federal CIOs Zero In on Zero Trust 🕴

Here's how federal CIOs can begin utilizing the security concept and avoid predictable obstacles.

📖 Read

via "Dark Reading: ".
🔐 How to password protect a zip file in Linux 🔐

If you need to password protect a zip file, look no farther than the zip command itself.

📖 Read

via "Security on TechRepublic".
🔐 How to password protect a zip file in Linux 🔐

If you need to password protect a zip file, look no farther than the zip command itself.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2015-9475 (pont)

The Pont theme 1.5 for WordPress has insufficient restrictions on option updates.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2015-9474 (simpolio)

The Simpolio theme 1.3.2 for WordPress has insufficient restrictions on option updates.

📖 Read

via "National Vulnerability Database".
🕴 Cryptojacking Worm Targets and Infects 2,000 Docker Hosts 🕴

Basic and 'inept' worm managed to compromise Docker hosts by exploiting misconfigurations.

📖 Read

via "Dark Reading: ".
Docker Containers Riddled with Graboid Crypto-Worm

A worm with a randomized propagation method is spreading via the popular container technology.

📖 Read

via "Threatpost".
🕴 Google Cloud Launches Security Health Analytics in Beta 🕴

The tool is designed to help identify misconfigurations and compliance violations in the Google Cloud Platform.

📖 Read

via "Dark Reading: ".
.WAVs Hide Malware in Their Depths in Innovative Campaign

Three different loaders and two payloads are hiding in audio files.

📖 Read

via "Threatpost".
Silent Librarian Retools Phishing Emails to Hook Student Credentials

Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.

📖 Read

via "Threatpost".
🕴 Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures 🕴

The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.

📖 Read

via "Dark Reading: ".
🔏 The Biggest Incidents in Cybersecurity (in the Past 10 Years) (Infographic) 🔏

Looking back at the last 10 years, what are the biggest and most notable incidents in cybersecurity history? We created an infographic that reflects on the decade and can educate users on how to prevent the next major incident.

📖 Read

via "Subscriber Blog RSS Feed ".
🔐 Blockchain is promising but it can't save the world 🔐

TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.

📖 Read

via "Security on TechRepublic".
🔐 Blockchain is promising but it can't save the world 🔐

TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.

📖 Read

via "Security on TechRepublic".
🕴 SailPoint Buys Orkus and OverWatchID to Strengthen Cloud Access Governance 🕴

The $37.5 million acquisitions will boost SailPoint's portfolio across all cloud platforms.

📖 Read

via "Dark Reading: ".
10 Steps for Ransomware Protection

Here are things you can do right now to shore up your defenses and help your recovery when you get hit.

📖 Read

via "Threatpost".
ATENTION New - CVE-2015-9470 (history_collection)

The history-collection plugin through 1.1.1 for WordPress has directory traversal via the download.php var parameter.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2015-9457 (pretty_link)

The pretty-link plugin before 1.6.8 for WordPress has PrliLinksController::list_links SQL injection via the group parameter.

📖 Read

via "National Vulnerability Database".
🕴 Cybersecurity Advice From Betty White 🕴

Among the beloved entertainer's advice: "Double bag those passwords."Thanks, Betty.

📖 Read

via "Dark Reading: ".