πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Security admins checklist: 10 tasks to perform every year πŸ”

Here are 10 important tasks security administrators should perform to keep devices protected and secure.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2011-3614 (vanilla)

An Access Control vulnerability exists in the Facebook, Twitter, and Embedded plugins in Vanilla Forums before 2.0.17.9.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3613 (vanilla)

An issue exists in Vanilla Forums before 2.0.17.9 due to the way cookies are handled.

πŸ“– Read

via "National Vulnerability Database".
πŸ” C-suite unprepared for NotPetya and other extinction-level cyberattacks πŸ”

Many executives either don't know what their company's cyber defense is, lack budget, or spend too much time analyzing rather than taking action.

πŸ“– Read

via "Security on TechRepublic".
❌ Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners ❌

The Amazon-owned video doorbell uses third-party trackers to serve up rich data to marketers without meaningfully notifying users.

πŸ“– Read

via "Threatpost".
πŸ•΄ CCPA: Cut From the Same Cloth as PCI DSS πŸ•΄

Finally, some good news about CCPA: If you've built your security infrastructure to PCI DSS standards, you may be already covered by California's new data protection rules

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Intel Previews Newest 'Zombieload' Patch πŸ•΄

Intel has promised a third patch to remediate the Zombieload speculative execution vulnerability.

πŸ“– Read

via "Dark Reading: ".
πŸ” Ex-Worker Stole 'Crown Jewels' Before Leaving Company πŸ”

In a criminal trial, prosecutors for the now defunct fitness tracking company Jawbone are alleging the ex-employee stole studies the company considered its β€œcrown jewels" before joining Fitbit.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Russian Brothers Sentenced to 12 Years for Fraud and Identity Theft πŸ•΄

The pair, based in Fort Lauderdale, Fla., were running a sophisticated credit card fraud factory.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How Do I Get My Team Started with Container Security and Kubernetes? πŸ•΄

Begin with one application, then give your tech team some time to learn.

πŸ“– Read

via "Dark Reading: ".
❌ Trolls-For-Hire Pave Way For Sophisticated Social Media Hacks ❌

Threat actors leveraging social media for hacks and misinformation are growing more coordinated.

πŸ“– Read

via "Threatpost".
❌ New β€˜CacheOut’ Attack Targets Intel CPUs ❌

Researchers have release a new proof-of-concept attack targeting a new Intel Speculative-type bug called CacheOut present in most Intel CPUs.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'Understand What You Believe': Fmr. FBI Agent Unpacks Information Threats πŸ•΄

In the past few years, social media has transformed from a communications gold mine to a minefield of disinformation campaigns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise πŸ•΄

The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ NFL, Multiple NFL Teams' Twitter Accounts Hacked and Hijacked πŸ•΄

Hackers claiming to be from the hacktivist group OurMine temporarily took over Twitter accounts of the NFL and several teams in the league.

πŸ“– Read

via "Dark Reading: ".
⚠ 15 NFL teams’ Twitter hijacked in lead-up to the Super Bowl ⚠

"We are here to show people that everything is hackable," says hacking group OurMine, back to spread its unwelcome spiel on hacked accounts.

πŸ“– Read

via "Naked Security".
❌ Wawa Breach May Have Affected More Than 30 Million Customers ❌

Hefty collection of U.S. and international payment cards from the incident revealed in December found up for sale on dark-web marketplace Joker’s Stash.

πŸ“– Read

via "Threatpost".
⚠ Fraud spike prompts Chrome developer lock-out ⚠

Google Chrome extension developers have been left high and dry for weeks as the company struggles to cope with a spike in fraud on the Chrome Web Store.

πŸ“– Read

via "Naked Security".
⚠ Let’s make ransomware MORE illegal, says Maryland ⚠

… with a clumsily worded proposed bill that wouldn't protect researchers.

πŸ“– Read

via "Naked Security".
πŸ•΄ Why Companies Should Care about Data Privacy Day πŸ•΄

Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Why Threat Hunting Is Not for Everyone πŸ•΄

Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.

πŸ“– Read

via "Dark Reading: ".