πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ States sue over rules that allow release of 3D-printed gun blueprints ⚠

The government has flip-flopped, most recently proposing rules that would transfer regulation out of the hands of the State Department.

πŸ“– Read

via "Naked Security".
❌ Zoom Fixes Flaw Opening Meetings to Hackers ❌

Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting.

πŸ“– Read

via "Threatpost".
❌ LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks ❌

New research from IOActive has found that β€œblindly” trusting the encryption of the widely adopted device protocol can lead to DDoS, sending of false data and other cyber attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Zoom Bug Prompts Security Fix, Platform Changes πŸ•΄

A newly discovered Zoom vulnerability would have enabled an attacker to join active meetings and access audio, video, and documents shared.

πŸ“– Read

via "Dark Reading: ".
❌ MTTD and MTTR: Two Metrics to Improve Your Cybersecurity ❌

While there are dozens of metrics available to determine success, there are two key cybersecurity performance indicators every organization should monitor.

πŸ“– Read

via "Threatpost".
πŸ” How to set up secure credential storage for Docker πŸ”

Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.

πŸ“– Read

via "Security on TechRepublic".
⚠ 5 ways to be a bit safer this Data Privacy Day ⚠

Here are 5 things you can start doing today for your own and for everyone else's online good!

πŸ“– Read

via "Naked Security".
πŸ” Security admins checklist: 10 tasks to perform every year πŸ”

Here are 10 important tasks security administrators should perform to keep devices protected and secure.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2011-3614 (vanilla)

An Access Control vulnerability exists in the Facebook, Twitter, and Embedded plugins in Vanilla Forums before 2.0.17.9.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3613 (vanilla)

An issue exists in Vanilla Forums before 2.0.17.9 due to the way cookies are handled.

πŸ“– Read

via "National Vulnerability Database".
πŸ” C-suite unprepared for NotPetya and other extinction-level cyberattacks πŸ”

Many executives either don't know what their company's cyber defense is, lack budget, or spend too much time analyzing rather than taking action.

πŸ“– Read

via "Security on TechRepublic".
❌ Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners ❌

The Amazon-owned video doorbell uses third-party trackers to serve up rich data to marketers without meaningfully notifying users.

πŸ“– Read

via "Threatpost".
πŸ•΄ CCPA: Cut From the Same Cloth as PCI DSS πŸ•΄

Finally, some good news about CCPA: If you've built your security infrastructure to PCI DSS standards, you may be already covered by California's new data protection rules

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Intel Previews Newest 'Zombieload' Patch πŸ•΄

Intel has promised a third patch to remediate the Zombieload speculative execution vulnerability.

πŸ“– Read

via "Dark Reading: ".
πŸ” Ex-Worker Stole 'Crown Jewels' Before Leaving Company πŸ”

In a criminal trial, prosecutors for the now defunct fitness tracking company Jawbone are alleging the ex-employee stole studies the company considered its β€œcrown jewels" before joining Fitbit.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Russian Brothers Sentenced to 12 Years for Fraud and Identity Theft πŸ•΄

The pair, based in Fort Lauderdale, Fla., were running a sophisticated credit card fraud factory.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How Do I Get My Team Started with Container Security and Kubernetes? πŸ•΄

Begin with one application, then give your tech team some time to learn.

πŸ“– Read

via "Dark Reading: ".
❌ Trolls-For-Hire Pave Way For Sophisticated Social Media Hacks ❌

Threat actors leveraging social media for hacks and misinformation are growing more coordinated.

πŸ“– Read

via "Threatpost".
❌ New β€˜CacheOut’ Attack Targets Intel CPUs ❌

Researchers have release a new proof-of-concept attack targeting a new Intel Speculative-type bug called CacheOut present in most Intel CPUs.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'Understand What You Believe': Fmr. FBI Agent Unpacks Information Threats πŸ•΄

In the past few years, social media has transformed from a communications gold mine to a minefield of disinformation campaigns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise πŸ•΄

The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.

πŸ“– Read

via "Dark Reading: ".