🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Businesses Improve Their Data Security, But Privacy - Not So Much 🕴

While the California Consumer Privacy Act will force companies to provide a modicum of meaningful privacy, World Privacy Day still mainly celebrates data security.

📖 Read

via "Dark Reading: ".
🕴 Securing Containers with Zero Trust 🕴

A software identity-based approach should become a standard security measure for protecting workloads in all enterprise networks.

📖 Read

via "Dark Reading: ".
Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats

Maya Horowitz with Check Point Research discussed recently-disclosed Zoom vulnerabilities that could have opened up web conferencing meetings to hackers.

📖 Read

via "Threatpost".
Critical Flaws in Magento e-Commerce Platform Allow Code-Execution

Admins are encouraged to update their websites to stave off attacks from Magecart card-skimmers and others.

📖 Read

via "Threatpost".
🕴 Pilfered Wawa Payment Card Data Now for Sale on Dark Web 🕴

The Joker's Stash underground marketplace is offering stolen payment card data from Wawa's recently disclosed data breach.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2012-5776

Dokeos 2.1.1 has multiple XSS issues involving "extra_" parameters in main/auth/profile.php.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-4383

contao prior to 2.11.4 has a sql injection vulnerability

📖 Read

via "National Vulnerability Database".
Apple patches critical bugs on iPhone and Mac – update now!

Get them now before the crooks figure out what to do with the holes.

📖 Read

via "Naked Security".
🕴 9 Things Application Security Champions Need to Succeed 🕴

Common elements to highly effective security champion programs that take DevSecOps to the next level

📖 Read

via "Dark Reading: ".
🕴 Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise 🕴

The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.

📖 Read

via "Dark Reading: ".
🔐 Data Privacy: Top trends to watch in 2020 🔐

Data privacy is an increasing concern for companies and individuals. Learn more about what's on the landscape for 2020.

📖 Read

via "Security on TechRepublic".
🕴 9 Things Application Security Champions Need to Succeed 🕴

Common elements to highly effective security champion programs that take DevSecOps to the next level.

📖 Read

via "Dark Reading: ".
🔏 Snack Bar Exec Mailed Trade Secrets To Himself 🔏

Hershey is suing a former exec who it claims took valuable trade secrets before leaving his job for a snack bar maker.

📖 Read

via "Subscriber Blog RSS Feed ".
Google Sets Record High in Bug-Bounty Payouts

After a year of big changes, white hats reaped more from Google's programs than ever before.

📖 Read

via "Threatpost".
🔐 Snowflake is the Linux SSH GUI you didn't know you needed 🔐

Is a Linux SSH GUI in your future? Jack Wallen believes once you try Snowflake, there's no going back.

📖 Read

via "Security on TechRepublic".
🔐 Snowflake is the Linux SSH GUI you didn't know you needed 🔐

Is a Linux SSH GUI in your future? Jack Wallen believes once you try Snowflake, there's no going back.

📖 Read

via "Security on TechRepublic".
🔐 How to enable facial recognition in the BitWarden mobile password manager 🔐

The latest version of the BitWarden Android client supports facial recognition. Find out how to enable it.

📖 Read

via "Security on TechRepublic".
🔐 How to enable facial recognition in the BitWarden mobile password manager 🔐

The latest version of the BitWarden Android client supports facial recognition. Find out how to enable it.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2012-5698 (babygekko)

BabyGekko before 1.2.4 has SQL injection.

📖 Read

via "National Vulnerability Database".
🕴 Inside the Check Point Research Team's Investigation Process 🕴

The team sheds light on how their organization works and what they're watching in the threat landscape.

📖 Read

via "Dark Reading: ".
🕴 Criminals Hide Malware Behind Grammy-Winning Cover 🕴

Songs by Ariana Grande, Taylor Swift, and Post Malone are the most popular places.

📖 Read

via "Dark Reading: ".