πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Pressure mounts for federal privacy law with second bill ⚠

Pressure is gathering for a federal privacy law in the US with the introduction of a second bill that would protect consumer data.

πŸ“– Read

via "Naked Security".
⚠ Adobe’s Magento Marketplace suffers data breach ⚠

Adobe’s Magento Marketplace has suffered a data breach, the company has said in an email sent to customers.

πŸ“– Read

via "Naked Security".
⚠ US tightens rules on drone use in policy update ⚠

When it comes to managing drones (Unmanned Aircraft Systems, or UAS) the US Department of Justice wants Americans to know it’s on the case.

πŸ“– Read

via "Naked Security".
❌ Amazon Plans Ring Facial Recognition-Based β€˜Watch List:’ Report ❌

Amazon's facial recognition would alert Ring users if "suspicious" individuals are near their house.

πŸ“– Read

via "Threatpost".
⚠ Netflix account freeze – don’t click, it’s a scam! ⚠

The telltale signs are all there... but if you're in a hurry, this Netflix scam passes the "visual appeal" test.

πŸ“– Read

via "Naked Security".
πŸ” How credential stuffing attacks work, and how to prevent them πŸ”

Credential stuffing attacks pose a significant risk to consumers and businesses. Learn how they work and what you can do about them.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 25 stories of the week ⚠

From a warning from Hewlett Packard Enterprise to Russia's foreign tech anxieties. Get up to date with the top infosec stories of last week.

πŸ“– Read

via "Naked Security".
⚠ TikTok owner to separate company over US national security worries ⚠

Chinese-owned video-sharing app TikTok might be under fire from US politicians but it’s not going to go down without a fight.

πŸ“– Read

via "Naked Security".
⚠ Convicted murderer wins β€˜right to be forgotten’ case ⚠

Google must remove details of a convicted murderer from its search results in Europe following a German court ruling, it emerged last week.

πŸ“– Read

via "Naked Security".
⚠ Uncle Sam opens arms to friendly hackers ⚠

All you bug hunters out there are about to get a nice Christmas gift - the US federal government finally wants to hear from you.

πŸ“– Read

via "Naked Security".
⚠ Fake Android apps uploaded to Play store by notorious Sandworm hackers ⚠

The Russian β€˜Sandworm’ hacking group has been caught repeatedly uploading fake and modified Android apps to Google’s Play Store.

πŸ“– Read

via "Naked Security".
❌ Insecure Database Exposes Millions of Private SMS Messages ❌

Researchers discovered an unprotected TrueDialog database hosted by Microsoft Azure with diverse and business-related data from tens of millions of users.

πŸ“– Read

via "Threatpost".
πŸ•΄ 3 Modern Myths of Threat Intelligence πŸ•΄

More intelligence does not lead to more security. Here's why.

πŸ“– Read

via "Dark Reading: ".
❌ Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds Warn ❌

TV takeover, privacy threats, botnet concerns and Wi-Fi network compromise are all big concerns when it comes to connected TVs.

πŸ“– Read

via "Threatpost".
πŸ•΄ New: State of the Internet: Web Attacks and Gaming Abuse πŸ•΄

Attackers see credential abuse as a low-risk venture with potential for a high payout, at least for now.

πŸ“– Read

via "Dark Reading: ".
❌ CISA Pushing U.S. Agencies to Adopt Vulnerability Disclosure Policies ❌

A newly proposed CISA directive would require all U.S. agencies to develop and implement vulnerability disclosure processes for their internet connected systems.

πŸ“– Read

via "Threatpost".
πŸ” SafeBreach catches 3 major vulnerabilities with Trend Micro, Autodesk and Kaspersky πŸ”

The issues have been patched or solved but researchers say they represent a worrying step in how attackers can manipulate trusted security systems.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Synack's Trust Report uses Attacker Resistance Score to rate cybersecurity defenses πŸ”

Manufacturers and utilities rank highest while e-commerce companies come in last.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Report: APT gang increased cyberattacks on businesses in Q3 πŸ”

Hackers used email addresses, malicious Word docs, and compromised SharePoint sites to deliver malware.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Data from 21M Mixcloud Users Compromised in Breach πŸ•΄

The music streaming service received reports indicating attackers gained unauthorized access to its systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Sharing Is Caring πŸ•΄

Do you do any cybersecurity-related volunteer work?

πŸ“– Read

via "Dark Reading: ".