πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ WordPress takes aim at ancient versions of its software ⚠

If you’re running a very old version of WordPress on your website, the project’s staff would like a word with you.

πŸ“– Read

via "Naked Security".
⚠ Are your jilted apps stalking you? ⚠

β€œUninstall?” HA! Uninstall trackers enable app developers to game iOS and Android and continue sending push notifications to fleeing users.

πŸ“– Read

via "Naked Security".
πŸ” Access data for 70% of top US and EU websites is being sold on dark web πŸ”

Top companies across the US and Europe have poor cybersecurity measures that allow hackers to gain access to their systems, according to a High-Tech Bridge report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Colorado voting became a cybersecurity leader long before Russians tried to hack it πŸ”

Colorado offers extensive election official cybersecurity training, paper ballots, and a strong auditing system, giving it top marks in election security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why 23% of companies never test their disaster recovery plan, despite major risks πŸ”

Some 95% of companies have a disaster recovery plan, but 27% lost revenue due to an outage within the last year, according to Spiceworks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Organizations with strong DevSecOps find flaws 11x faster than those without πŸ”

The number of vulnerable applications is incredibly high, but implementing DevSecOps has proven to be effective in mitigating flaws.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Pennsylvania elections bring back paper ballots to improve security and auditability πŸ”

In order to increase transparency and accuracy in the 2020 presidential election, Pennsylvania will replace outdated voting machines with traditional paper ballots.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Benefits of DNS Service Locality πŸ•΄

Operating one's own local DNS resolution servers is one of the simplest and lowest-cost things an IT administrator can do to monitor and protect applications, services, and users from potential risks.

πŸ“– Read

via "Dark Reading: ".
πŸ” Your best bet for tracking protection in Firefox is this one-two punch πŸ”

Jack Wallen outlines what he believes is the ideal combination to prevent browser tracking in Firefox.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use Ublock Origin and Privacy Badger to prevent browser tracking in Firefox πŸ”

Jack Wallen outlines the ideal combination of Firefox extensions to prevent browser tracking.

πŸ“– Read

via "Security on TechRepublic".
❌ ThreatList: Ransomware, EKs and Trojans lead the Way in Q3 Malware Trends ❌

After a two-quarter lull in the action, malware activity resurged in the third quarter of the year, especially on the business front.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ 8 Threats That Could Sink Your Company πŸ•΄

Security researchers warn of both new and re-emerging threats that can cause serious harm.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Twitter User Discloses Second Microsoft Zero-Day πŸ•΄

The vulnerability can be used to elevate privileges and delete files on target systems.

πŸ“– Read

via "Dark Reading: ".
❌ sLoad Banking Trojan Downloader Displays Sophisticated Recon and Targeting ❌

The sLoad downloader is an example of the stealthy, smart malware trend.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Tackling Supply Chain Threats πŸ•΄

Vendor-supplied malware is a threat that has been largely overlooked. That has to change.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Abandoned Websites Haunt Corporations πŸ•΄

Websites that never go away continue to bring security threats to their owners, says a new report.

πŸ“– Read

via "Dark Reading: ".
πŸ” Gallery: Modern home security products feature ingenuity, flair, and plenty of IoT πŸ”

For those of us working from home offices, protecting sensitive data from authorized access can also mean protecting our homes from illegal entry. With IoT technology, home security technology is now a DIY project.

πŸ“– Read

via "Security on TechRepublic".
❌ Windows β€˜Deletebug’ Zero-Day Allows Privilege Escalation, Destruction ❌

The unpatched flaw allows an attacker to delete any kind of file on a victim machine, including system data.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Windows 7 End-of-Life: Are You Ready? πŸ•΄

Microsoft will terminate support for Windows 7 in January 2020, but some there's still some confusion among enterprises about when the OS officially gets retired.

πŸ“– Read

via "Dark Reading: ".
❌ Magecart Cybergang Targets 0days in Third-Party Magento Extensions ❌

Over two dozen third-party ecommerce plugins contain zero-day vulnerabilities being exploited in a recent Magecart campaign.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ ICS Networks Continue to be Soft Targets For Cyberattacks πŸ•΄

CyberX study shows that many industrial control system environments are riddled with vulnerabilities.

πŸ“– Read

via "Dark Reading: ".