πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” New phishing email campaign impersonates US postal service to deliver malware πŸ”

The same threat actor has been observed targeting companies in the US, Italy, and Germany, according to a new report from security provider Proofpoint.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ US-CERT Warns of Remotely Exploitable Bugs in Medical Devices πŸ•΄

Vulnerabilities in key surgical equipment could be remotely exploited by a low-skill attacker.

πŸ“– Read

via "Dark Reading: ".
❌ Just-Released Checkra1n iPhone Jailbreak Stirs Security Concerns ❌

Now that the checkm8 BootROM vulnerability has a working exploit, security pros are warning of potential attacks.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2008-5083 (jboss_operations_network)

In JON 2.1.x before 2.1.2 SP1, users can obtain unauthorized security information about private resources managed by JBoss ON.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 5 Cybersecurity CISO Priorities for the Future πŸ•΄

Seven chief information security officers share their pain points and two-year spending plans.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attacks on Healthcare Jump 60% in 2019 - So Far πŸ•΄

Well-known Trojans Emotet and Trickbot are cybercriminals' favorite weapons in their campaigns.

πŸ“– Read

via "Dark Reading: ".
πŸ” Mastering DFIR: Tools and Processes to Analyze Forensic Data πŸ”

In this post, the first of two blogs, Tim Bandos helps break down the DFIR tools and processes he uses to carry out investigations.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Capture the Flag Planned to Find Missing Persons Information πŸ•΄

The competition, launched by SANS and Trace Labs, will put to use open source information in search of new clues.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ BSIMM10 Shows Industry Vertical Maturity πŸ•΄

The Building Security In Maturity Model is the only detailed measuring stick for software security initiatives, and it continues to evolve.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to manage site settings in Vivaldi for Android πŸ”

Find out how to enable or disable permissions on a site-by-site basis in the Vivaldi browser.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use per-host SSH configuration πŸ”

Learn how to make your SSH use more efficient and convenient with per-host configurations.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ I'm Setting Up My Company's First Bug-Bounty Program. What Should I Be Thinking About? πŸ•΄

Here are some important points to factor into your vulnerability disclosure policy.

πŸ“– Read

via "Dark Reading: ".
❌ Double Vision: Stealthy Malware Dropper Delivers Dual RATs ❌

A lengthy, multi-stage infection process leads to a duo of payloads, bent on stealing data.

πŸ“– Read

via "Threatpost".
πŸ•΄ I'm Setting Up a Bug-Bounty Program. What Should I be Thinking About? πŸ•΄

Here are some important points to factor into your vulnerability disclosure policy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Symantec, McAfee Patch Privilege Escalation Bugs πŸ•΄

All versions of endpoint protection software from both vendors were susceptible to near identical issue, SafeBreach says.

πŸ“– Read

via "Dark Reading: ".
⚠ Apple fires employee after he texts customer’s pic to his own phone ⚠

An β€œEXTREMELY PERSONAL”, year-old pic, the woman said, that he had to scroll through 5,000 photos to get to. Police are investigating.

πŸ“– Read

via "Naked Security".
⚠ Brave 1.0 launches, extends ad-watching payouts to iOS ⚠

It's showtime: Finally out of beta comes the browser that promises privacy, anonymity and cryptocurrency in exchange for your eyeballs.

πŸ“– Read

via "Naked Security".
⚠ Data thieves blew cover after maxing out victim’s hard drive ⚠

The FTC has reached a settlement with InfoTrax after thieves stole a million sensitive customer records from its servers in 2016.

πŸ“– Read

via "Naked Security".
⚠ How the Linux kernel balances the risks of public bug disclosure ⚠

A serious Wi-Fi flaw shows how Linux handles security in plain sight.

πŸ“– Read

via "Naked Security".
⚠ How ransomware attacks ⚠

A new report reveals what defenders should know about the most prevalent and persistent malware families.

πŸ“– Read

via "Naked Security".
❌ Stealthy Malware Flies Under AV Radar with Advanced Obfuscation ❌

A threat campaign active since January customizes long-used droppers to infect victim machines and lift credentials and other data from browsers, according to Cisco Talos.

πŸ“– Read

via "Threatpost".