πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Data Breach Fines: Are They Working to Boost Consumer Safety? ❌

Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise.

πŸ“– Read

via "Threatpost".
⚠ WordPress sites hit by malvertising ⚠

An old piece of malware is storming the WordPress community, enabling its perpetrators to take control of sites and inject code of their choosing.

πŸ“– Read

via "Naked Security".
πŸ” You've got malware: Malicious actors are waiting in your inbox πŸ”

Dangerous URL messages, the resurgence of Emotet, and banking trojans flood the cyberthreat landscape, Proofpoint found.

πŸ“– Read

via "Security on TechRepublic".
πŸ” IBM social engineer easily hacked two journalists' information πŸ”

A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Cold Truth about Cyber Insurance πŸ•΄

There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Travesty 1.0 πŸ› 

Travesty is a tool that can leverage a known directory traversal to assist in identifying interesting directories and files.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ S2 Ep16: BlueKeep, ransomware and sextortion – Naked Security Podcast ⚠

BlueKeep's back, ransomware batters Spain, and yet more sextortion - listen now!

πŸ“– Read

via "Naked Security".
❌ Gamers Hit with Nvidia GPU Driver, GeForce Flaws ❌

Vulnerabilities in several PC gaming products offered by Nvidia can lead to escalation of privilege, denial of service and other malicious attacks.

πŸ“– Read

via "Threatpost".
πŸ” How can you protect yourself from hackers? An IBM social engineer offers advice πŸ”

Stephanie "Snow" Carruthers, Chief People Hacker at IBM, gives advice about protecting yourself online. She also explains how the robocalls and spoofing process works.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How a hacker at IBM uses disguises and devices to steal private information πŸ”

An IBM X-Force Red team member explains how her background in makeup and sales helps her social engineering career. Also, she demonstrates how cybercriminals can easily clone your work ID badge.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How cybercriminals trick you into giving your information over the phone πŸ”

IBM's Chief People Hacker Stephanie "Snow" Carruthers describes how criminals use caller ID spoofing to get your private data.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Microsoft is ending support for Windows 7 and Windows Server 2008: Here's what you need to know. πŸ”

Support for Windows 7 and Server 2008 is ending in January 2020. Here's how to protect your systems.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Find New Talent, Don't Fight Over CISSPs: Insights from (ISC)2 COO πŸ•΄

The skills gap will only be closed by attracting and retaining new talent. So don't limit your talent search to CISSPs, says the COO of the organization that issues the CISSP certification.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ PayPal Upsets Microsoft as Phishers' Favorite Brand πŸ•΄

Several factors edged the world's most popular payment service into the top spot.

πŸ“– Read

via "Dark Reading: ".
❌ Amazon Kindle, Embedded Devices Open to Code-Execution ❌

Flaws in Das U-Boot affect third-party hardware that uses the universal bootloader as an underlying component.

πŸ“– Read

via "Threatpost".
πŸ•΄ Kaspersky Lab Analysis Shines Light on DarkUniverse APT Group πŸ•΄

Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Capital One Shifts Its CISO to New Role πŸ•΄

The bank is searching for a new chief information security officer months after its major data breach.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Prove Cybersecurity's Worth, Create a Cyber Balance Sheet πŸ•΄

How tying and measuring security investments to business impacts can elevate executives' understanding and commitment to cyber-risk reduction.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2010-2250

Drupal 6.x before 6.16 uses a user-supplied value in output during site installation which could allow an attacker to craft a URL and perform a cross-site scripting attack.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-2243

A vulnerability exists in kernel/time/clocksource.c in the Linux kernel before 2.6.33 where on non-GENERIC_TIME systems (GENERIC_TIME=n), accessing /sys/devices/system/clocksource/clocksource0/current_clocksource results in an OOPS.

πŸ“– Read

via "National Vulnerability Database".