πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Talking to the Board about Cybersecurity πŸ•΄

A chief financial officer shares five winning strategies for an effective board-level conversation about right-sizing risk.

πŸ“– Read

via "Dark Reading: ".
❌ Epilepsy Foundation Bombarded with Seizure-Triggering Twitter Posts ❌

The Epilepsy Foundation has filed a criminal complaint against undisclosed Twitter users who users its Twitter feed to post seizure-inducing content.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2013-0202

Cross-site scripting (XSS) vulnerability in ownCloud 4.5.5, 4.0.10, and earlier allows remote attackers to inject arbitrary web script or HTML via the action parameter to core/ajax/sharing.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2237

Multiple cross-site scripting (XSS) vulnerabilities in Mahara 1.4.x before 1.4.3 and 1.5.x before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) javascript innerHTML as used when generating login forms, (2) links or (3) resources URLs, and (4) the Display name in a user profile.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Ten Steps to Stop Intellectual Property Theft πŸ”

For every manufacturing firm, sensitive data is the most valuable asset. If this critical information – in particular, intellectual property (IP) – is ever lost or stolen, manufacturers not only face significant fines and penalties but also suffer a hit to their reputations and public trust. Perhaps most importantly, they risk losing their competitive advantage, which can ultimately lead to business failure and bankruptcy.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Rooster Teeth Attack Showcases New Magecart Approach ❌

The streaming video and podcast content company was hit by a payment-card attack.

πŸ“– Read

via "Threatpost".
πŸ” Survey: Customers want integration and strategic support from security vendors πŸ”

Vendors get low marks for customer support and committing to benchmarks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Higher Degree, Higher Salary? Not for Some Security Pros πŸ•΄

Turns out, skill beats experience and an academic degree doesn't guarantee higher compensation for five security positions.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Facebook Fixes WhatsApp Group Chat Security Issue πŸ•΄

Flaw allowed attackers to repeatedly crash group chat and force users to uninstall and reinstall app, Check Point says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 15 Million Patient Records Exposed Attack on Canadian Lab πŸ•΄

A cyberattack against LifeLabs exposed personal information on patients in Ontario and British Columbia.

πŸ“– Read

via "Dark Reading: ".
⚠ Don’t fall for this porn scam – even if your password’s in the subject! ⚠

This "I am well aware" email is just another sextortion scam where crooks try to blackmail you with a video they don't actually have.

πŸ“– Read

via "Naked Security".
πŸ‘1
πŸ•΄ How to Manage API Security πŸ•΄

Protecting the places where application services meet is critical for protecting enterprise IT. Here's what security pros need to know about "the invisible glue" that keeps apps talking to each other.

πŸ“– Read

via "Dark Reading: ".
⚠ Google to choke off β€˜less secure applications’ ⚠

If you're entering a username and password to give an app access to a G Suite account, beware: you won't be able to do it for much longer.

πŸ“– Read

via "Naked Security".
⚠ Alleged bank vault robber posed with cash on Instagram, Facebook ⚠

He allegedly stole over $88,000 from Wells Fargo's vault, then posed with cash and "his" Mercedes-Benz in posts and an Instagram rap.

πŸ“– Read

via "Naked Security".
⚠ Mozilla adds NextDNS to list of DNS-over-HTTPS providers ⚠

Firefox users interested in turning on the browser’s DNS-over-HTTPS (DoH) privacy feature now have two providers to choose from.

πŸ“– Read

via "Naked Security".
⚠ Doxed credit card data has two hours max before it’s nabbed ⚠

That's pretty slow for thieves' bots & scripts to grab it and test it, said a researcher who posted his card online.

πŸ“– Read

via "Naked Security".
πŸ” The state of security in 2020 πŸ”

Jack Wallen shares cybersecurity predictions that might make your IT skin crawl. Find out what he thinks could be the silver lining to this security nightmare.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The Best Tools & Practices for Better Data Visibility and Monitoring πŸ”

As the adage goes, you can't secure what you can't see. So, we asked 21 security experts what they think the best tools and practices for data visibility and monitoring are.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 'Password' Falls in the Ranks of Favorite Bad Passwords πŸ•΄

When it comes to choosing unsecure passwords, people instead show a preference for '123456' and '123456789.'

πŸ“– Read

via "Dark Reading: ".