πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ How to Manage API Security πŸ•΄

Protecting the places where application services meet is critical for protecting enterprise IT. Here's what security pros need to know about "the invisible glue" that keeps apps talking to each other.

πŸ“– Read

via "Dark Reading: ".
⚠ Google to choke off β€˜less secure applications’ ⚠

If you're entering a username and password to give an app access to a G Suite account, beware: you won't be able to do it for much longer.

πŸ“– Read

via "Naked Security".
⚠ Alleged bank vault robber posed with cash on Instagram, Facebook ⚠

He allegedly stole over $88,000 from Wells Fargo's vault, then posed with cash and "his" Mercedes-Benz in posts and an Instagram rap.

πŸ“– Read

via "Naked Security".
⚠ Mozilla adds NextDNS to list of DNS-over-HTTPS providers ⚠

Firefox users interested in turning on the browser’s DNS-over-HTTPS (DoH) privacy feature now have two providers to choose from.

πŸ“– Read

via "Naked Security".
⚠ Doxed credit card data has two hours max before it’s nabbed ⚠

That's pretty slow for thieves' bots & scripts to grab it and test it, said a researcher who posted his card online.

πŸ“– Read

via "Naked Security".
πŸ” The state of security in 2020 πŸ”

Jack Wallen shares cybersecurity predictions that might make your IT skin crawl. Find out what he thinks could be the silver lining to this security nightmare.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The Best Tools & Practices for Better Data Visibility and Monitoring πŸ”

As the adage goes, you can't secure what you can't see. So, we asked 21 security experts what they think the best tools and practices for data visibility and monitoring are.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 'Password' Falls in the Ranks of Favorite Bad Passwords πŸ•΄

When it comes to choosing unsecure passwords, people instead show a preference for '123456' and '123456789.'

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Your First Month as a CISO: Forming an Information Security Program πŸ•΄

It's easy to get overwhelmed in your new position, but these tips and resources will help you get started.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 tips for safely shopping online πŸ”

Online shopping offers plenty of convenience, but it might come at an unexpected price: Your sensitive information. Tom Merritt offers five tips for staying safe while shopping online.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 tips for safely shopping online πŸ”

Online shopping offers plenty of convenience, but it might come at an unexpected price: Your sensitive information. Tom Merritt offers five tips for staying safe while shopping online.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Few Firms Use Segmentation, Despite Security Benefits πŸ•΄

Network segmentation is considered a key security control to prevent attackers from easily accessing critical assets from compromised, but unprivileged, computers. So why aren't more companies doing it?

πŸ“– Read

via "Dark Reading: ".
❌ LifeLabs Pays Hackers Who Accessed 15M Customers’ Lab Test Results ❌

The data breach disclosure was met with ire from customers whose lab test results, health card numbers and more were accessed.

πŸ“– Read

via "Threatpost".
πŸ•΄ Trading Online? Steps to Take to Avoid Getting Phished πŸ•΄

From an IT manager's perspective, any employee using such a mobile app on a phone they also use for business opens up risks to the corporate network.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Worried About Magecart? Here's How to Check for It πŸ•΄

Researchers share how everyday users can check for malicious code on e-commerce websites.

πŸ“– Read

via "Dark Reading: ".
❌ TP-Link Routers Give Cyberattackers an Open Door to Business Networks ❌

Remote attackers can easily compromise the device and pivot to move laterally through the LAN or WAN.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff πŸ•΄

Are you an army of one tasked with compliance and data privacy? Try these tips to get you and your organization in alignment with regulators.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Issues Out-of-Cycle SharePoint Update πŸ•΄

The update repairs vulnerabilities that could lead to very effective phishing messages.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Issues Out-of-Band Update for SharePoint Bug ❌

An attacker could exploit CVE-2019-1491 to obtain sensitive information that could be used to mount further attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Security Resolutions to Prevent a Ransomware Attack in 2020 πŸ•΄

Proactively consider tools to detect anomalous behavior, automatically remediate, and segment threats from moving across the network.

πŸ“– Read

via "Dark Reading: ".