πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Facebook users were duped by Cambridge Analytica, FTC rules ⚠

Delete the data, and don't do any of that again, the FTC told the data analytics company, which already filed for bankruptcy in 2018.

πŸ“– Read

via "Naked Security".
⚠ EU releases its 5G conclusions ⚠

The Chinese company is at the heart of a security spat with the US that has also been causing some consternation in the UK.

πŸ“– Read

via "Naked Security".
⚠ Snatch ransomware pwns security using sneaky β€˜safe mode’ reboot ⚠

The Sophos Managed Threat Response (MTR) team has warned the industry of a dangerous new ransomware trick.

πŸ“– Read

via "Naked Security".
❌ DHS Rolls Back Facial-Recognition Expansion Plan ❌

Biometric facial scanning won’t be a requirement for all U.S. citizens traveling internationally after all, the department decided.

πŸ“– Read

via "Threatpost".
πŸ” Network attacks increased in third quarter, WatchGuard says πŸ”

One network attack targeted the same vulnerability exploited in the Equifax data breach from September 2017, according to a new report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Deliver a Deadly Counterpunch to Ransomware Attacks: 4 Steps πŸ•΄

You can't prevent all ransomware attacks. However, it's possible to ensure that if a breach happens, it doesn't spread, affect business, and become a newsworthy event.

πŸ“– Read

via "Dark Reading: ".
πŸ” Want to attain and retain customers? Adopt data privacy policies πŸ”

Customers won't buy services or products from companies if they don't trust how their data will be used, Cisco found.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2013-2095

rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-1793

openstack-utils openstack-db has insecure password creation

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-0293

oVirt Node: Lock screen accepts F2 to drop to shell causing privilege escalation

πŸ“– Read

via "National Vulnerability Database".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.2.5 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Download: The 2020 Cybersecurity Salary Survey Results ❌

Today you can access the aggregated and analyzed 2020 Cybersecurity Salary Survey Results and gain insight into the main ranges and factors of current cybersecurity salaries.

πŸ“– Read

via "Threatpost".
❌ Amazon’s Blink Smart Security Cameras Open to Hijack ❌

Amazon is rolling out patches for the vulnerabilities and users are urged to confirm their device is updated to firmware version 2.13.11 or later.

πŸ“– Read

via "Threatpost".
πŸ•΄ Only 53% of Security Pros Have Ownership of Workforce IAM πŸ•΄

Most practitioners report an increase in identities, but many don't have control over how those identities are protected from a range of attacks.

πŸ“– Read

via "Dark Reading: ".
❌ Adobe Fixes 17 Critical Acrobat, Photoshop and Brackets Flaws ❌

The patches are part of Adobe's regularly-scheduled fixes.

πŸ“– Read

via "Threatpost".
❌ Snatch Team Steals Data and Hammers Orgs with Ransomware ❌

Snatch has burst on the scene, featuring an array of executables and tools for carrying out carefully orchestrated attacks.

πŸ“– Read

via "Threatpost".
πŸ” How to protect your organization against the Snatch ransomware threat πŸ”

Discovered and analyzed by security provider Sophos, Snatch attempts to bypass traditional security software by rebooting your PC into Safe Mode.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Mac Deploy Stick 2.0: Benefits of the free MDM for macOS πŸ”

MDS 2.0 helps admins modernize their workflow and deploy Apple hardware and software. Also, this Mac deployment utility is free.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use the Firefox Lockwise password manager πŸ”

Mozilla has evolved its Lockbox password tool into a more standard password manager. Find out if Firefox Lockwise is right for you.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Intel's CPU Flaws Continue to Create Problems for the Tech Community πŸ•΄

We can't wait out this problem and hope that it goes away. We must be proactive.

πŸ“– Read

via "Dark Reading: ".
❌ Cyberattack Downs Pensacola’s City Systems ❌

The cyberattack comes days after a shooting at U.S. military base Naval Air Station Pensacola rocked the city.

πŸ“– Read

via "Threatpost".