πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors πŸ•΄

A report by the Wall Street Journal points finger at group that is know to Facebook Security.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google Patch to Block Spectre Slowdown in Windows 10 πŸ•΄

Microsoft will incorporate Google's Retpoline patch to prevent Spectre Variant 2 from slowing down its operating system.

πŸ“– Read

via "Dark Reading: ".
❌ Two Critical RCE Bugs Patched in Drupal 7 and 8 ❌

Drupal's advisory also included three patches for "moderately critical" bugs.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Monday review – the hot 20 stories of the week ⚠

From a serious libssh bug to the sextortionists that spoof your email address, and all the stories in between. Catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Maker of LuminosityLink RAT gets 30 months in the clink ⚠

Prosecutors said that the 21-year-old LuminosityLink author had no respect for the law and showed contempt for moral rules and social norms.

πŸ“– Read

via "Naked Security".
⚠ Up to 9.5 million net neutrality comments were fake ⚠

New York has expanded its probe to subpoena 14 industry groups and lobbyists, saying that fake comments "distort[ed] public opinion."

πŸ“– Read

via "Naked Security".
⚠ Alleged robber busted after Facebook-friending victim to apologize ⚠

He told her to put down the pizza delivery and all her money on top of it. 26 days later, he found her on Facebook and reached out.

πŸ“– Read

via "Naked Security".
⚠ Popular website plugin harboured a serious 0-day for years ⚠

The flaw in the popular file uploader allows an attacker to upload files and run their own command line shell on any affected server.

πŸ“– Read

via "Naked Security".
πŸ•΄ Understanding SOCs' 4 Top Deficiencies πŸ•΄

In most cases, the areas that rankle SANS survey respondents the most about security operations centers can be addressed with the right mix of planning, policies, and procedures.

πŸ“– Read

via "Dark Reading: ".
❌ Critical Bug Impacts Live555 Media Streaming Libraries ❌

A critical streaming bug impacts Live Networks LIVE555 RTSPServer, but not the popular VLC and MPLayer client-side software.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Obamacare Sign-Up Channel Breach Affects 75K Consumers ❌

A hack targeted the Direct Enrollment pathway, which allows insurance agents and brokers to help consumers sign up for Affordable Care Act coverage.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ The Danger and Opportunity in 5G Connectivity and IoT ❌

The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Why cybersecurity dominates concerns surrounding AI adoption πŸ”

Even though artificial intelligence adoption is high, concerns regarding legal and ethical risks persist.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Gartner Experts Highlight Tech Trends - And Their Security Risks πŸ•΄

Security must be built into systems and applications from the beginning of the design process, they agreed.

πŸ“– Read

via "Dark Reading: ".
πŸ” Quantum computing: A cheat sheet πŸ”

This resource covers the future of computing in the post-transistor age, and the technical hurdles inherent in the pursuit of quantum computing.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Ransomware: A cheat sheet for professionals πŸ”

This guide covers Locky, WannaCry, Petya, and other ransomware attacks, the systems hackers target, and how to avoid becoming a victim and paying cybercriminals a ransom in the event of an infection.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Healthcare.gov FFE Breach Compromises 75K Users' Data πŸ•΄

Attackers broke into a sign-up system used by healthcare insurance agents and brokers to help consumers apply for coverage.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to detect hardware-based server bugs πŸ”

Following controversy from a recent Bloomberg report, here's how you should approach auditing physical hardware security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 2018 State of Cyber Workforce πŸ•΄

Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ UK, US to Sign Accord on AI, Cybersecurity Cooperation πŸ•΄

Royal Navy, US Navy, and tech industry leaders ready to commit to 'a framework for dialogue and cooperation' at inaugural meeting of the Atlantic Future Forum.

πŸ“– Read

via "Dark Reading: ".