πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Top 5 tips for safely shopping online πŸ”

Online shopping offers plenty of convenience, but it might come at an unexpected price: Your sensitive information. Tom Merritt offers five tips for staying safe while shopping online.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 tips for safely shopping online πŸ”

Online shopping offers plenty of convenience, but it might come at an unexpected price: Your sensitive information. Tom Merritt offers five tips for staying safe while shopping online.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Few Firms Use Segmentation, Despite Security Benefits πŸ•΄

Network segmentation is considered a key security control to prevent attackers from easily accessing critical assets from compromised, but unprivileged, computers. So why aren't more companies doing it?

πŸ“– Read

via "Dark Reading: ".
❌ LifeLabs Pays Hackers Who Accessed 15M Customers’ Lab Test Results ❌

The data breach disclosure was met with ire from customers whose lab test results, health card numbers and more were accessed.

πŸ“– Read

via "Threatpost".
πŸ•΄ Trading Online? Steps to Take to Avoid Getting Phished πŸ•΄

From an IT manager's perspective, any employee using such a mobile app on a phone they also use for business opens up risks to the corporate network.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Worried About Magecart? Here's How to Check for It πŸ•΄

Researchers share how everyday users can check for malicious code on e-commerce websites.

πŸ“– Read

via "Dark Reading: ".
❌ TP-Link Routers Give Cyberattackers an Open Door to Business Networks ❌

Remote attackers can easily compromise the device and pivot to move laterally through the LAN or WAN.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff πŸ•΄

Are you an army of one tasked with compliance and data privacy? Try these tips to get you and your organization in alignment with regulators.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Issues Out-of-Cycle SharePoint Update πŸ•΄

The update repairs vulnerabilities that could lead to very effective phishing messages.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Issues Out-of-Band Update for SharePoint Bug ❌

An attacker could exploit CVE-2019-1491 to obtain sensitive information that could be used to mount further attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Security Resolutions to Prevent a Ransomware Attack in 2020 πŸ•΄

Proactively consider tools to detect anomalous behavior, automatically remediate, and segment threats from moving across the network.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-2312

An Elevated Privileges issue exists in JBoss AS 7 Community Release due to the improper implementation in the security context propagation, A threat gets reused from the thread pool that still retains the security context from the process last used, which lets a local user obtain elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
❌ Ring Plagued by Security Issues, Flood of Hacks ❌

A Motherboard report found Ring lacking basic security measures for preventing hackers from hijacking the devices.

πŸ“– Read

via "Threatpost".
❌ Why Cloud, Collaboration Breed Insider Threats ❌

Many employees don't follow company security policies when they use handy productivity tools.

πŸ“– Read

via "Threatpost".
πŸ” FBI tech tips for safe holiday travel πŸ”

Whether you're traveling by plane, planning a road trip, or hosting guests for the holidays, it's important to practice good cybersecurity.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2012-2656

An XML eXternal Entity (XXE) issue exists in Restlet 1.1.10 in an endpoint using XML transport, which lets a remote attacker obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Wireshark Analyzer 3.2.0 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  GRR 3.4.0.1 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Getting ready for the end of Basic Authentication in Exchange Web Services πŸ”

Prepare your applications and users for big changes on 13 October 2020.

πŸ“– Read

via "Security on TechRepublic".
⚠ Instagram hides β€˜false’ content, unless it’s from a politician ⚠

Instagram's expanding its fact-checking program but, like Facebook, says it won't keep political speech away from "public debate and scrutiny."

πŸ“– Read

via "Naked Security".
⚠ Proposed standard would make warrant canaries machine-readable ⚠

For years, organisations have been using a common tactic called the warrant canary to warn people that the government has secretly demanded access to their private information. Now, a proposed standard could make this tool easier to use.

πŸ“– Read

via "Naked Security".