πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ The Patching Paradox: A Path to Intelligent Vulnerability Management πŸ•΄

Imagine: You're out at sea, sailing through treacherous and uncharted waters. The tips of sharp rocks jutting from the waves give some forewarning of danger, but beneath the surface, twisting reefs and shallow sandbanks threaten to run you aground.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What Keeps the CISO Awake at Night πŸ•΄

How to keep your CISO sleeping soundly

πŸ“– Read

via "Dark Reading: ".
⚠ Pirates! Don’t blame your illegal file sharing on family members ⚠

Stop blaming your piracy on your mum. You can no longer avoid liability by saying that a family member had access to your connection.

πŸ“– Read

via "Naked Security".
⚠ Why is Elon Musk promoting this Bitcoin scam? (He’s not) ⚠

While scrolling through my Twitter feed I saw a Bitcoin scam so unabashed that it got me thinking.... do such scams really work?

πŸ“– Read

via "Naked Security".
⚠ Adult websites shuttered after 1.2 million user details exposed ⚠

It's not even close to the number of users affected by the massive Ashley Madison breach, but the results could be just as devastating to those who are affected.

πŸ“– Read

via "Naked Security".
❌ Thousands of Applications Vulnerable to RCE via jQuery File Upload ❌

The flaw has existed for eight years thanks to a security change in Apache.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” How sophisticated phishing grants attackers total control of your computer πŸ”

Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity predictions: More cyberattacks, social engineering, and scary IoT πŸ”

Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How sophisticated phishing grants attackers total control of your computer πŸ”

Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guysβ€”he used to be one.

πŸ“– Read

via "Security on TechRepublic".
⚠ Phishing is still the most commonly used attack on organizations, survey says ⚠

The survey found that the majority of cyberattacks - 75% - came from outsiders, while 25% were due to insiders.

πŸ“– Read

via "Naked Security".
⚠ Patch now! Multiple serious flaws found in Drupal ⚠

Drupal website owners have some important patching homework to do.

πŸ“– Read

via "Naked Security".
πŸ” How RATs infect computers with malicious software πŸ”

Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity predictions: More cyberattacks, social engineering, and scary IoT πŸ”

Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Good Times in Security Come When You Least Expect Them πŸ•΄

Not every cybersecurity endeavor can have a huge impact. But a small percentage of your efforts can still produce results that blow you away.

πŸ“– Read

via "Dark Reading: ".
❌ Adult Website Hack Exposes 1.2M β€˜Wife Lover’ Fans ❌

A 40-year-old, easily cracked encryption method was used to protect the 98MB database of user information.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ IoT Bot Landscape Expands, Attacks Vary by Country πŸ•΄

New report finds 1,005 new user names and passwords beyond Mirai's original default list two years ago.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: 3 Out of 4 Employees Pose a Security Risk to Businesses ❌

Finance-sector employees fared the worst in an awareness survey, with 85 percent showing some lack of cybersecurity and data privacy knowledge.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Former HS Teacher Admits to 'Celebgate' Hack πŸ•΄

Christopher Brannan accessed full iCloud backups, photos, and other personal data belonging to more than 200 victims.

πŸ“– Read

via "Dark Reading: ".
πŸ” How RATs infect computers with malicious software πŸ”

Kevin Mitnick, founder, Mitnick Security Consulting, discusses how remote access Trojans grab data from computers.

πŸ“– Read

via "Security on TechRepublic".
❌ StrongPity APT Changes Tactics to Stay Stealthy ❌

After being exposed, the APT made minor adjustments in their tactics to stay off the security radar.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Why the blockchain is not secure πŸ”

At the 2018 Gartner Symposium, Gartner's David Mahdi discussed blockchain's biggest security challenges.

πŸ“– Read

via "Security on TechRepublic".