πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Mastercard Announces Plan to Purchase RiskRecon πŸ•΄

The acquisition is expected to close in the first quarter of 2020.

πŸ“– Read

via "Dark Reading: ".
⚠ Serious Security: The decade-ending β€œY2K bug” that wasn’t ⚠

We explain why you really need to RTFM. Even if TFM is very long and complicated and you are very experienced.

πŸ“– Read

via "Naked Security".
❌ Twitter Fixes Bug that Enabled Takeover of Android App Accounts ❌

Twitter for Android users are urged to update their app to fend off a security bug that allows hackers to access private account data and control accounts to send tweets and direct messages.

πŸ“– Read

via "Threatpost".
πŸ•΄ Citrix Urges Firms to Harden Configurations After Flaw Report πŸ•΄

A vulnerability in two of the company's appliances opens 80,000 networks up for exploitation.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Santa and the Zero-Trust Model: A Christmas Story πŸ•΄

How would the world's most generous elf operate in a world of zero-trust security? A group of cybersecurity experts lets us know.

πŸ“– Read

via "Dark Reading: ".
πŸ” 4 tips to help keep your APIs safe πŸ”

Security analysts say multifactor authentication is an absolute must for any company running multiple interfaces.

πŸ“– Read

via "Security on TechRepublic".
⚠ What a decade! Our baddest stories and biggest lessons, year by year… ⚠

From the bizarre, through the crazy, all the way to the outright impossible - there's still plenty to learn from all of these stories.

πŸ“– Read

via "Naked Security".
πŸ•΄ IoT Security: How Far We've Come, How Far We Have to Go πŸ•΄

As organizations fear the proliferations of connected devices on enterprise networks, the private and public sector come together to address IoT vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
❌ The Case for Cyber-Risk Prospectuses ❌

Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-16778

An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel allows physical attackers to inject a Dual-Tone-Multi-Frequency (DTMF) tone to invoke an access grant that would allow physical access to a restricted floor/level. By design, only a residential unit owner may allow such an access grant. However, due to incorrect access control, an attacker could inject it via the speaker unit to perform an access grant to gain unauthorized access, as demonstrated by a loud DTMF tone representing '1' and a long '#' (697 Hz and 1209 Hz, followed by 941 Hz and 1477 Hz).

πŸ“– Read

via "National Vulnerability Database".
⚠ Sextortionists return for Christmas – price goes down, threats go up ⚠

This follow-up sextortion demand, timed to align with Christmas, has a much more aggressive and menacing tone that last week's version.

πŸ“– Read

via "Naked Security".
❌ Biggest Malware Threats of 2019 ❌

2019 was another banner year for bots, trojans, RATS and ransomware. Let’s take a look back.

πŸ“– Read

via "Threatpost".
πŸ” How to install and use Firejail on Linux πŸ”

Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to install and use Firejail on Linux πŸ”

Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable 2FA for Docker Hub πŸ”

If you're concerned about the security of your code within Docker Hub, you might want to enable two-factor authentication.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable 2FA for Docker Hub πŸ”

If you're concerned about the security of your code within Docker Hub, you might want to enable two-factor authentication.

πŸ“– Read

via "Security on TechRepublic".
⚠ Happy Holidays – and big thanks to everyone who’s working today! ⚠

Yes. there's a message in the Christmas tree.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2018-18288

CrushFTP through 8.3.0 is vulnerable to credentials theft via URL redirection.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ransomware Situation Goes From Bad to Worse πŸ•΄

New malware distribution techniques and functionality updates are sure to put more pressure on enterprise organizations in 2020.

πŸ“– Read

via "Dark Reading: ".