πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Nation-State Phishing: A Country-Sized Catch ❌

Sophisticated nation-state groups now integrate phishing as a core component of their statecraft.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ 7 Ways an Old Tool Still Teaches New Lessons About Web AppSec πŸ•΄

Are your Web application secure? WebGoat, a tool old enough to be in high school, continues to instruct.

πŸ“– Read

via "Dark Reading: ".
❌ Girl Scouts Issues Data Breach Warning to 2,800 Members ❌

Someone gained access to an email account for the Orange County chapter, which was rife with personal data.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Protect DNS, Protect business πŸ•΄

DNS plays a critical role in every network. However, it is often overlooked by many security solutions and not integrated into cyber hygiene programs, leaving an easily-accessed back door open for criminals into many networks.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-18281

A bool variable in Video function, which gets typecasted to int before being read could result in an out of bound read access in all Android releases from CAF using the linux kernel

πŸ“– Read

via "National Vulnerability Database".
❌ IoT Flaw Allows Hijacking of Connected Construction Cranes ❌

An attacker can send spoofed commands to the crane's controller.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ New Report: IoT Now Top Internet Attack Target πŸ•΄

IoT devices are the top targets of cyberattacks -- most of which originate on IoT devices, new report finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Implications of IBM-Red Hat Merger Unclear πŸ•΄

But enterprises and open source community likely have little to be concerned about, industry experts say.

πŸ“– Read

via "Dark Reading: ".
⚠ China hijacking internet traffic using BGP, claim researchers ⚠

Researchers claim that unusual BGP routing changes are actually man-in-the-middle surveillance.

πŸ“– Read

via "Naked Security".
πŸ” How cybersecurity is developing to combat Russian hackers πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses phishing and Russia's involvement in the 2016 US presidential election with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” US rubber stamps right to repair: What it means for IT, SMBs, and tinkerers πŸ”

The previous copyright law that only allowed big manufacturers to fix tech products has finally been lifted. Here's what that means for techies.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Illinois focuses on voter registration security for 2018 midterms in response to 2016 Russian breach πŸ”

Illinois had the only state voter registration database that Russian hackers successfully broke into in the 2016 election. Since then, it has spent millions on new cybersecurity protections.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How companies are amping up cybersecurity to prevent election meddling πŸ”

Theresa Payton, CEO at Fortalice Solutions, discusses cybersecurity, election meddling, and Russia's involvement in 2016 US presidential election with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How companies are amping up cybersecurity to prevent election meddling πŸ”

Theresa Payton, CEO at Fortalice Solutions, discusses cybersecurity, election meddling, and Russia's involvement in 2016 US presidential election with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the FBI weighs cybersecurity risks against other criminal threats πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the continuous challenge of balancing incoming cyber threats with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the FBI weighs cybersecurity risks against other criminal threats πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the continuous challenge of balancing incoming cyber threats with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
⚠ Snakes in the grass! Malicious code slithers into Python PyPI repository ⚠

Not for the first time, typosquatting malware made its way into an open source code repository.

πŸ“– Read

via "Naked Security".
⚠ Gov worker visits 9k porn sites without protection, spreads infection ⚠

A now very β€œex”-government employee provides a teachable moment.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a-dev (Affected 1.1.1). Fixed in OpenSSL 1.1.0j-dev (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q-dev (Affected 1.0.2-1.0.2p).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 10 Steps for Creating Strong Customer Authentication πŸ•΄

Between usability goals and security/regulatory pressures, setting up customer-facing security is difficult. These steps and best practices can help.

πŸ“– Read

via "Dark Reading: ".
⚠ Alleged SWATter will plead guilty to dozens of serious new federal charges ⚠

The long list of charges includes bank fraud, involuntary manslaughter, cyberstalking and wire fraud.

πŸ“– Read

via "Naked Security".