πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to create an encrypted vault with KDE Vaults πŸ”

Jack Wallen shows you how to create encrypted folders the easy way, with

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Online Malware and Threats: A Profile of Today's Security Posture πŸ•΄

This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DevSecOps An Effective Fix for Software Flaws πŸ•΄

Organizations seeking to fix flaws faster should look to automation and related methodologies for success, says a new report.

πŸ“– Read

via "Dark Reading: ".
πŸ” What attackers want whey they hack email accounts πŸ”

Mark Risher, Google's director of product management for identity and account security, explains what hackers are looking and how Google is ramping up account security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why data security is a priority for political campaigns πŸ”

Chris Wilson of WPA Intelligence explains how state campaigns combat cyber attacks before the midterm elections.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Microsoft's Defending Democracy program amplifies account security πŸ”

Diana Kelley, Microsoft's Cybersecurity Field CTO, explains how the company is combating disinformation, phishing attacks, and cloud security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How tech leaders at enterprise companies can be more inclusive πŸ”

Cisco's Michele Guel, Distinguished Engineer and Chief Security Architect, explains how to recruit women into STEM and cybersecurity.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why organizations aren't succeeding in threat hunting strategies πŸ”

Many organizations want to take additional cybersecurity measures, but are strapped by time, skills, and visibility, according to a Fidelis Cybersecurity report

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Securing Severless: Defend or Attack? πŸ•΄

The best way to protect your cloud infrastructure is to pay attention to the fundamentals of application security, identity access management roles, and follow configuration best-practices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Securing Serverless: Attacking an AWS Account via a Lambda Function πŸ•΄

It's not every day that someone lets you freely wreak havoc on their account just to find out what happens when you do.

πŸ“– Read

via "Dark Reading: ".
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
❌ Debunking AI’s Impact on the Cybersecurity Skills Gap ❌

There is no argument artificial intelligence will have an impact on the cybersecurity skills gap. The question is how.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Pentagon Expands Bug-Bounty Program to Include Physical Systems ❌

The news comes shortly after the DoD was called out for having rampant bugs in its weapons systems.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” The top 15 DBaaS tools cloud developers use the most πŸ”

Scalability is a huge deciding factor for professionals looking at DBaaS brands. Here are the 15 most popular among cloud developers.

πŸ“– Read

via "Security on TechRepublic".
❌ UK Slaps Facebook with $645K Fine Over Cambridge Analytica Scandal ❌

The amount is the max allowed under pre-GDPR regulation, but is barely a financial slap on the risk for the social-media giant.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” How hacktivist groups pose a global cybersecurity threat πŸ”

Andrea Little Limbago, chief social scientist at Endgame, discusses hacktivist groups, cybersecurity trends, and how we can prepare for cyberattacks with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How hacktivist groups pose a global cybersecurity threat πŸ”

Andrea Little Limbago, chief social scientist at Endgame, discusses hacktivist groups, cybersecurity trends, and how we can prepare for cyberattacks with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cathay Pacific Suffers Largest Airline Breach πŸ•΄

Breach of Hong Kong-based airline compromises personal information of 9.4 million passengers.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install and run the Maltrail detection system on Ubuntu Server 18.04 πŸ”

The Maltrail malicious behavior detection system eases the burden of constant vigilance on your Linux server.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Side-Channel Attack Exposes User Accounts on Facebook, XBox, Other Social Sites πŸ•΄

Researcher will demonstrate at Black Hat Europe his team's recent discovery: a way to exploit popular user-blocking feature on social media and other sites.

πŸ“– Read

via "Dark Reading: ".