πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” The top cybersecurity mistakes companies are making (and how to avoid them) πŸ”

There's not a one-size-fits-all approach to cybersecurity. Learn some of the common mistakes and how you can get on the right path.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DDoS: An Underestimated Threat πŸ•΄

Distributed denial-of-service (DDoS) attacks have become more common, more powerful, and more useful to attackers. Here's how to fight back.

πŸ“– Read

via "Dark Reading: ".
❌ Magecart Group Switches Up Tactics with MiTM, Phishing ❌

This new skimming/phishing hybrid threat tactic means that even stores that send customers to external payment processors are vulnerable.

πŸ“– Read

via "Threatpost".
πŸ•΄ On the Border Warns of Data Breach πŸ•΄

Malware on a payment system could have stolen credit card info from customers in 28 states, according to the company.

πŸ“– Read

via "Dark Reading: ".
❌ Austin Man Indicted for Stealing Unreleased Music from Artists ❌

He and co-conspirators stole 50 gigs of music and leaked some of it onto the internet.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'Dexphot': A Sophisticated, Everyday Threat πŸ•΄

Though the cryptominer has received little attention, it exemplifies the complexity of modern malware, Microsoft says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ An Alarming - and Growing - Number of Software Teams Are Missing Cybersecurity Expertise πŸ•΄

The overwhelming majority of developers worry about security and consider it important, yet many lack a dedicated cybersecurity leader.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Implications of Last Week's Exposure of 1.2B Records πŸ•΄

Large sums of organized data, whether public or private, are worth their weight in gold to cybercriminals.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Gamification is Adding a Spoonful of Sugar to Security Training πŸ•΄

Gamification is becoming popular as companies look for new ways to keep employees from being their largest vulnerability.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-1939

SQL injection vulnerability in Zend Framework 1.10.x before 1.10.9 and 1.11.x before 1.11.6 when using non-ASCII-compatible encodings in conjunction PDO_MySql in PHP before 5.3.6.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-1934

lilo-uuid-diskid causes lilo.conf to be world-readable in lilo 23.1.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-1933

SQL injection vulnerability in Jifty::DBI before 0.68.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How Microsoft is using hardware to secure firmware πŸ”

Even full disk encryption can't keep you secure if your PC firmware is compromised, so Secured-core PCs will use the CPU to check if UEFI is telling the truth about secure boot.

πŸ“– Read

via "Security on TechRepublic".
⚠ Firefox gets tough on tracking tricks that sneakily sap your privacy ⚠

Firefox is getting ready to turn on its automatic anti-snooping tools to stop web 'fingerprinting" tricks.

πŸ“– Read

via "Naked Security".
⚠ Police arrest alleged Chuckling Squad member who hijacked @Jack Dorsey ⚠

Debug, another Chuckling Squadder, told Motherboard that the kid was weird, "Swatting celebrities for a follow back."

πŸ“– Read

via "Naked Security".
⚠ EU raises eyebrows at possible US encryption ban ⚠

EU officials have warned that they may not take kindly to a US encryption ban or insertion of crypto backdoor technology.

πŸ“– Read

via "Naked Security".
⚠ Splunk customers should update now to dodge Y2K-style bug ⚠

Splunk has issued a critical warning regarding a showstopping Y2K-style date bug in one of the platform’s configuration files.

πŸ“– Read

via "Naked Security".
⚠ Facebook, Twitter profiles slurped by mobile apps using malicious SDKs ⚠

Hundreds of users gave permission to these third-party apps to access their social media accounts, but the apps got more handsy than that.

πŸ“– Read

via "Naked Security".
πŸ” What is HIPAA Compliance? 2019 HIPAA Requirements πŸ”

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Dexphot Malware Hijacked 80K+ Devices to Mine Cryptocurrency ❌

A cryptomining malware has infected at least 80k devices and uses various tactics to evade detection.

πŸ“– Read

via "Threatpost".