πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How information security and cyber tactics has evolved πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the development of cyber tactics with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Colorado voting became a cybersecurity leader long before Russians tried to hack it πŸ”

Colorado offers extensive election official cybersecurity training, paper ballots, and a strong auditing system, giving it top marks in election security.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-18124

During secure boot, addition is performed on uint8 ptrs which led to overflow issue in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version FSM9055, IPQ4019, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDX20

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 3 Keys to Reducing the Threat of Ransomware πŸ•΄

Following these steps could mean the difference between an inconvenience and a multimillion-dollar IT system rebuild -- for the public and private sectors alike.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FTC Offers Small Businesses Free Cybersecurity Resources πŸ•΄

Cybersecurity for Small Businesses campaign kicks off.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why 5G (and even 6G) could put your business at risk for a cyberattack πŸ”

The next generation of wireless networking standards could leave critical security gaps open, according to University of Dundee research.

πŸ“– Read

via "Security on TechRepublic".
❌ DemonBot Fans DDoS Flames with Hadoop Enslavement ❌

An unsophisticated but effective botnet is targeting exposed cloud servers and racking up millions of infections.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ British Airways Data Breach Takes Off Again with 185K More Victims ❌

The news comes on the heels of a breach at Cathay Pacific exposing 9.4 million people.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ DeepPhish: Simulating Malicious AI to Act Like an Adversary πŸ•΄

How researchers developed an algorithm to simulate cybercriminals' use of artificial intelligence and explore the future of phishing.

πŸ“– Read

via "Dark Reading: ".
❌ PoC Attack Leverages Microsoft Office and YouTube to Deliver Malware ❌

Microsoft has been notified, but no patch is yet available.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ British Airways: 185K Affected in Second Data Breach πŸ•΄

The carrier discovered another breach while investigating its largest-ever data breach, disclosed in September.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: 1 Out of 5 Would Ditch a Business After a Data Breach ❌

A full 21 percent of survey respondents would walk away from a business permanently after a major hack.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Dark Web: A cheat sheet for business professionals πŸ”

Nefarious profiteers use the encrypted internet to sell stolen data, drugs, and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

πŸ“– Read

via "Security on TechRepublic".
⚠ Researchers exploit Microsoft Word through embedded video ⚠

A group of researchers has found a way to infect computers via Word documents without triggering a security warning.

πŸ“– Read

via "Naked Security".
πŸ” Cybersecurity no. 1 challenge for CXOs, but only 39% have a defense strategy πŸ”

More than 85% of companies have experienced a cyber breach in the past three years, according to an A.T. Kearny report.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 22 stories of the week ⚠

From a popular WordPress plugin harbouring a zero-day to punishments for phone-slowing Apple and Samsung, and all the stories in between. Catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Call of Duty players caught up in cryptocurrency theft racket ⚠

The FBI recently busted a group of criminals who seem to be using Call of Duty to coordinate cryptocurrency thefts.

πŸ“– Read

via "Naked Security".
⚠ β€œRight to repair” gets a boost from new DCMA software rules ⚠

It just got easier for owners of a wide range of home devices to hack and repair their software.

πŸ“– Read

via "Naked Security".
πŸ” Election hacking: The myths vs. realities πŸ”

Cris Thomas, space rogue, global strategy lead at IBM X-Force Red, discusses the myths and realities of hacking election machines with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
⚠ Self driving cars learn (from us) about who to sacrifice in a cash ⚠

It's bad news for overweight, elderly, male jaywalkers.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

πŸ“– Read

via "National Vulnerability Database".