πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Huge Airbnb scam leads to promise to vet every host, every listing ⚠

Shuffling people into - surprise! - cobwebby rat traps has been a snap. Actual vetting may help, plus a new guarantee of 100% refunds.

πŸ“– Read

via "Naked Security".
⚠ US military supplier in β€˜Made in America’ fraud case ⚠

Aventura allegedly imported cheap cameras and network-enabled security gear from China, then slapped US flag stickers on them.

πŸ“– Read

via "Naked Security".
⚠ AI wordsmith too dangerous to be released… has been released ⚠

The text-generating AI has only been released in neutered forms until now, for fear it would be used to mass-produce fake news and spam.

πŸ“– Read

via "Naked Security".
πŸ•΄ New: 2019 State of the Internet / Security: Media Under Assault πŸ•΄

It can't be overstated: Web attacks and credential stuffing are real, long-term threats. This white paper, sponsored by Akamai, focuses on how they are impacting the high-tech, video media, and entertainment sectors.

πŸ“– Read

via "Dark Reading: ".
⚠ Adobe fixes SDK weakness affecting mobile apps ⚠

Researchers noticed that the main app configuration file, ADBMobileConfig.json, contained settings that could lead to security problems.

πŸ“– Read

via "Naked Security".
❌ Encrypted Emails on macOS Found Stored in Unprotected Way ❌

Apple is investigating an issue raised by a Mac specialist discovered to be storing emails that are supposed to be S/MIME-encrypted as readable files.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Security Processes You Shouldn't Overlook During M&A πŸ•΄

Security needs to be a central element of due diligence if a merger or acquisition is to succeed

πŸ“– Read

via "Dark Reading: ".
πŸ” FBI: Engineer Stole, Emailed Tech Secrets to Iran πŸ”

This engineer purportedly stole sensitive aerospace technology from his employer and emailed it his brother in the Iranian military.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Ransomware Attack Downs Hosting Service SmarterASP.NET ❌

SmarterASP.NET said that it is in the middle of recovering accounts downed by the ransomware attack.

πŸ“– Read

via "Threatpost".
πŸ” How to navigate cybersecurity in a 5G world πŸ”

With 5G comes a larger attack surface and more devices accessing the network. Companies must ramp up security strategies to stay protected, AT&T report finds.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Open source is a heavily interdependent community, which is good and bad for security πŸ”

Commentary: Open source is a tangled web of interdependencies. How can we do better to secure this web?

πŸ“– Read

via "Security on TechRepublic".
⚠ Microsoft urges us to patch after partially effective BlueKeep attack ⚠

Microsoft has urged people to patch their Windows systems following the appearance of mass BlueKeep exploits just over a week ago.

πŸ“– Read

via "Naked Security".
❌ ThreatList: Data Breaches Batter Stock Prices at Public Companies, For Months ❌

When it comes to bouncing back, long-term impact to share prices from a data breach incident is significant on average for large companies.

πŸ“– Read

via "Threatpost".
πŸ•΄ Learn the Latest Exploit Techniques at Black Hat Europe πŸ•΄

Master new exploit techniques for Microsoft RDP, Java remote protocols at Black Hat Europe in London next month.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Joker's Stash Puts $130M Price Tag on Credit Card Database πŸ•΄

A new analysis advises security teams on what they should know about the underground payment card seller.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why we must strike a balance with AI to solve the cybersecurity skills gap πŸ”

How to solve the cybersecurity skills gap by striking a balance with artificial intelligence.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why we must strike a balance with AI to solve the cybersecurity skills gap πŸ”

How to solve the cybersecurity skills gap by striking a balance with artificial intelligence.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Account Fraud Harder to Detect as Criminals Move from Bots to 'Sweat Shops' πŸ•΄

Cheap labor, frequent data breaches, and better fraud detection technology are fueling frustrating changes in attackers' methods.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ OpenText to Buy Carbonite for $800M Cash, in $1.42B Deal πŸ•΄

The acquisition was confirmed just six months after Carbonite bought Webroot.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Find New Approach to Attacking Cloud Infrastructure πŸ•΄

Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.

πŸ“– Read

via "Dark Reading: ".
❌ DDoS Attacks Target Amazon, SoftLayer and Telecom Infrastructure ❌

The specific type of TCP attack used in the recent spate of DDoS efforts were TCP SYN-ACK reflection attacks.

πŸ“– Read

via "Threatpost".