πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 6 Factors That Raise The Stakes For IoT Security πŸ•΄

Developments that exacerbate the risk and complicate making Internet of Things devices more secure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Unlocked S3 Bucket Lets 36,077 Prison Files Escape πŸ•΄

The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states' correctional facilities.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-5828

BlackBerry PlayBook before 2.1 has an Information Disclosure Vulnerability via a Web browser component error

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2204

InfoSphere Guardium aix_ktap module: DoS

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-1994

HP Systems Insight Manager before 7.0 allows a remote user on adjacent network to access information

πŸ“– Read

via "National Vulnerability Database".
❌ Equifax Breach: Four Members of Chinese Military Charged with Hacking ❌

Feds have charged four members of the Chinese People’s Liberation Army (PLA) in connection with the infamous 2017 Equifax breach.

πŸ“– Read

via "Threatpost".
πŸ” Global shipping industry attacked by coronavirus-themed malware πŸ”

Hackers are using malicious emails about the coronavirus to trick people with a malware called AZORult.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Unlocked S3 Bucket Lets 36,077 Jail Files Escape πŸ•΄

The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states' correctional facilities.

πŸ“– Read

via "Dark Reading: ".
πŸ” 13 tips to avoid Valentine's Day online romance scams πŸ”

Scammers use dating sites to try to build relationships with people to get money or personal information. Here are 13 tips to protect yourself.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How some presidential campaigns use DMARC to protect their domains from being spoofed πŸ”

DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ China's Military Behind 2017 Equifax Breach: DoJ πŸ•΄

Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.

πŸ“– Read

via "Dark Reading: ".
πŸ” California AG Issues Revised CCPA Draft Rules πŸ”

On Friday, with just under five months to go until CCPA is enforced, California's Attorney General released a modified version of draft regulations for implementing the law.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Active PayPal Phishing Scam Targets SSNs, Passport Photos ❌

Phishing emails have been uncovered that request a full rundown of personal data - even asking for photos of passports.

πŸ“– Read

via "Threatpost".
❌ BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver ❌

The RobbinHood ransomware is using a deprecated Gigabyte driver as the tip of the spear for taking out antivirus products.

πŸ“– Read

via "Threatpost".
πŸ•΄ Israel's Entire Voter Registry Exposed in Massive Incident πŸ•΄

Personal details of nearly 6.5 million Israelis were out in the open after the entire registry was uploaded to an notably insecure app.

πŸ“– Read

via "Dark Reading: ".
πŸ” Kubernetes rollouts: 5 security best practices πŸ”

If you don't follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Some Democrats Lead Trump in Campaign Domain-Security Efforts πŸ•΄

Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How North Korea's Senior Leaders Harness the Internet πŸ•΄

Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-1596

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
⚠ Facebook’s Twitter and Instagram accounts hijacked ⚠

In full glare of the world, Facebook admins have found themselves in an unseemly struggle to wrestle back control of the company’s Twitter accounts.

πŸ“– Read

via "Naked Security".
πŸ” IBM X-Force Threat Index finds Google, Apple, Amazon are most often spoofed πŸ”

Attacks on industrial control systems are up and code for banking trojans and ransomware is evolving the fastest.

πŸ“– Read

via "Security on TechRepublic".