πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Facebook scam steals famous faces and BBC branding ⚠

An email scam from earlier this year has resurfaced on Facebook - don't fall for it!

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Q&A: Hacking a '90s Sports Car πŸ•΄

Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Kaspersky Lab Analysis Shines Light on DarkUniverse APT Group πŸ•΄

Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.

πŸ“– Read

via "Dark Reading: ".
⚠ Facebook confesses 100 devs may have accessed leaked Groups data ⚠

It shut down that access in April 2018, or at least thought it did. At least 11 improperly accessed data in the last two months.

πŸ“– Read

via "Naked Security".
❌ Google Enlists Help to Fight Bad Android Apps ❌

After years of unsuccessfully battling malware and bad apps in the Google Play store and on more than 2.5 billion Android devices, Google is finally doing something about it. The tech giant this week unveiled an alliance with three companies with specific expertise in endpoint security to help prevent the spread of malware on its […]

πŸ“– Read

via "Threatpost".
⚠ Pilot presses the wrong button, triggers airport hostage alarm ⚠

We've all been there - faced with a button that is just begging to be pressed...

πŸ“– Read

via "Naked Security".
⚠ Linux users warned to update libarchive to beat flaw ⚠

The bug is identified as CVE-2019-18408, a high-priority β€˜use-after-free’ bug when dealing with a failed archive.

πŸ“– Read

via "Naked Security".
❌ Data Breach Fines: Are They Working to Boost Consumer Safety? ❌

Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise.

πŸ“– Read

via "Threatpost".
⚠ WordPress sites hit by malvertising ⚠

An old piece of malware is storming the WordPress community, enabling its perpetrators to take control of sites and inject code of their choosing.

πŸ“– Read

via "Naked Security".
πŸ” You've got malware: Malicious actors are waiting in your inbox πŸ”

Dangerous URL messages, the resurgence of Emotet, and banking trojans flood the cyberthreat landscape, Proofpoint found.

πŸ“– Read

via "Security on TechRepublic".
πŸ” IBM social engineer easily hacked two journalists' information πŸ”

A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Cold Truth about Cyber Insurance πŸ•΄

There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Travesty 1.0 πŸ› 

Travesty is a tool that can leverage a known directory traversal to assist in identifying interesting directories and files.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ S2 Ep16: BlueKeep, ransomware and sextortion – Naked Security Podcast ⚠

BlueKeep's back, ransomware batters Spain, and yet more sextortion - listen now!

πŸ“– Read

via "Naked Security".
❌ Gamers Hit with Nvidia GPU Driver, GeForce Flaws ❌

Vulnerabilities in several PC gaming products offered by Nvidia can lead to escalation of privilege, denial of service and other malicious attacks.

πŸ“– Read

via "Threatpost".
πŸ” How can you protect yourself from hackers? An IBM social engineer offers advice πŸ”

Stephanie "Snow" Carruthers, Chief People Hacker at IBM, gives advice about protecting yourself online. She also explains how the robocalls and spoofing process works.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How a hacker at IBM uses disguises and devices to steal private information πŸ”

An IBM X-Force Red team member explains how her background in makeup and sales helps her social engineering career. Also, she demonstrates how cybercriminals can easily clone your work ID badge.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How cybercriminals trick you into giving your information over the phone πŸ”

IBM's Chief People Hacker Stephanie "Snow" Carruthers describes how criminals use caller ID spoofing to get your private data.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Microsoft is ending support for Windows 7 and Windows Server 2008: Here's what you need to know. πŸ”

Support for Windows 7 and Server 2008 is ending in January 2020. Here's how to protect your systems.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Find New Talent, Don't Fight Over CISSPs: Insights from (ISC)2 COO πŸ•΄

The skills gap will only be closed by attracting and retaining new talent. So don't limit your talent search to CISSPs, says the COO of the organization that issues the CISSP certification.

πŸ“– Read

via "Dark Reading: ".