πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Ad industry groups ask that the CCPA keep its mitts off their cookies ⚠

Ad-blocking technologies can block the cookies that record consumers' privacy choices, they claim.

πŸ“– Read

via "Naked Security".
⚠ FTC warns Christmas buyers that smart toys are a security risk ⚠

Thinking of giving a young person an internet-connected β€˜smart’ toy this Christmas? You may want to think again.

πŸ“– Read

via "Naked Security".
⚠ DoItForState domain name thief gets 14 years for pistol-whipping plot ⚠

He hired his cousin to break in, hold the rightful domain holder at gunpoint, and force a transfer to his own GoDaddy account.

πŸ“– Read

via "Naked Security".
⚠ Windows 10 Mobile receives its last security patches ⚠

If you’re one of the tiny hardcore still using Windows 10 Mobile, 10 December 2019 is probably a day you’ve been dreading for nearly a year.

πŸ“– Read

via "Naked Security".
❌ Lazarus APT Collaborates with Trickbot’s Anchor Project ❌

An unprecedented connection between the North Korean APT and the crimeware giant spells trouble for global banks and other cybercrime targets.

πŸ“– Read

via "Threatpost".
πŸ” 63% of organizations face security breaches due to hardware vulnerabilities πŸ”

While hardware-level attacks are high, only 59% of companies have implemented a hardware security strategy, Dell and Forrester found.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Big Changes Are Coming to Security Analytics & Operations πŸ•΄

New ESG research points to fundamental problems, a need for scalable security data pipelines, and a migration to the public cloud.

πŸ“– Read

via "Dark Reading: ".
❌ Modern Intel CPUs Plagued By Plundervolt Attack ❌

The Intel attack uses a similar technique that gamers commonly use to overclock their CPUs.

πŸ“– Read

via "Threatpost".
πŸ•΄ Only Half of Malware Caught by Signature AV πŸ•΄

Machine learning and behavioral detection are necessary to catch threats, WatchGuard says in a new report. Meanwhile, network attacks have risen, especially against older vulnerabilities, such as those in Apache Struts.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Nation-State Attackers May Have Co-opted Vega Ransomware πŸ•΄

The tactics used by the latest version of the Vega cryptolocker program indicates the code may have been stolen from its authors and is now being used for destructive attacks, a new report suggests.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Younger Generations Drive Bulk of 2FA Adoption πŸ•΄

Use of two-factor authentication has nearly doubled in the past two years , pointing to a new wave of acceptance.

πŸ“– Read

via "Dark Reading: ".
πŸ” Analysts find connection between North Korean military and crimeware organization TrickBot πŸ”

Researchers with SentinelLabs say they have found one of "the first known links between cybercrime groups and nation-state actors."

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Google Chrome Now Automatically Alerts Users on Compromised Passwords πŸ•΄

A series of security enhancements seek to protect users from phishing and warn them when credentials have been compromised.

πŸ“– Read

via "Dark Reading: ".
πŸ” SSA Has Weaknesses to Address When it Comes to Preventing, Detecting Malicious Activity πŸ”

Deficiencies in the Social Security Administration's ability to protect sensitive data could impact the confidentiality and integrity of its systems and personally identifiable information, a new report says.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” SSA Has Weaknesses to Address to Prevent, Detect Malicious Activity πŸ”

Deficiencies in the Social Security Administration's ability to protect sensitive data could impact the confidentiality and integrity of its systems and personally identifiable information, a new report says.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 5 Tips for Keeping Your Security Team on Target πŸ•΄

In nearly every security environment, competing priorities are a constant battleground. Here's how to keep the focus on what's important.

πŸ“– Read

via "Dark Reading: ".
❌ Apple Fixes β€˜AirDoS’ Bug That Cripples Nearby iPhones, iPads ❌

Apple fixes bug that allows nearby hackers to render iPads and iPhones unusable.

πŸ“– Read

via "Threatpost".
❌ Serious Security Flaws Found in Children’s Connected Toys ❌

Several toys that were tested have been found lacking authentication measures, opening them up to an array of insidious attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Next Security Silicon Valley: Coming to a City Near You? πŸ•΄

The high cost of doing business in California's San Francisco Bay Area is just one factor driving infosec companies - established and and startups, alike - to pursue their fortunes elsewhere. Here's where many are going.

πŸ“– Read

via "Dark Reading: ".