πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ China's Military Behind 2017 Equifax Breach: DoJ πŸ•΄

Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.

πŸ“– Read

via "Dark Reading: ".
πŸ” California AG Issues Revised CCPA Draft Rules πŸ”

On Friday, with just under five months to go until CCPA is enforced, California's Attorney General released a modified version of draft regulations for implementing the law.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Active PayPal Phishing Scam Targets SSNs, Passport Photos ❌

Phishing emails have been uncovered that request a full rundown of personal data - even asking for photos of passports.

πŸ“– Read

via "Threatpost".
❌ BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver ❌

The RobbinHood ransomware is using a deprecated Gigabyte driver as the tip of the spear for taking out antivirus products.

πŸ“– Read

via "Threatpost".
πŸ•΄ Israel's Entire Voter Registry Exposed in Massive Incident πŸ•΄

Personal details of nearly 6.5 million Israelis were out in the open after the entire registry was uploaded to an notably insecure app.

πŸ“– Read

via "Dark Reading: ".
πŸ” Kubernetes rollouts: 5 security best practices πŸ”

If you don't follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Some Democrats Lead Trump in Campaign Domain-Security Efforts πŸ•΄

Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How North Korea's Senior Leaders Harness the Internet πŸ•΄

Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-1596

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
⚠ Facebook’s Twitter and Instagram accounts hijacked ⚠

In full glare of the world, Facebook admins have found themselves in an unseemly struggle to wrestle back control of the company’s Twitter accounts.

πŸ“– Read

via "Naked Security".
πŸ” IBM X-Force Threat Index finds Google, Apple, Amazon are most often spoofed πŸ”

Attacks on industrial control systems are up and code for banking trojans and ransomware is evolving the fastest.

πŸ“– Read

via "Security on TechRepublic".
⚠ Officials raise alarm about Chinese hacking ⚠

Officials pointed to ongoing threats against US institutions, painting a dire picture of hacking efforts to support Chinese economic goals.

πŸ“– Read

via "Naked Security".
⚠ Freedom Hosting owner pleads guilty to distributing child abuse images ⚠

Eric Eoin Marques has pleaded guilty to running what was once believed to be the largest child abuse hosting provider on the dark web.

πŸ“– Read

via "Naked Security".
❌ Dell Patches SupportAssist Flaw That Allows Arbitrary Code Execution ❌

The uncontrolled search path vulnerability allows a local user to use DLLs to escalate privileges and affects Windows PCs.

πŸ“– Read

via "Threatpost".
πŸ” PayPal tops the list of most impersonated brand in phishing attacks πŸ”

Facebook impersonations came in second place among phishing campaigns, followed by Microsoft, said email security firm Vade Secure.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Security and disaster recovery are priorities when choosing data center provider πŸ”

Security and compliance are key factors to consider when outsourcing your data center, according to a report from data center provider US Signal.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 51% say automation will result in job loss for IT security pros πŸ”

Security automation will reshape hiring trends in both the US and the UK, according to a new report.

πŸ“– Read

via "Security on TechRepublic".
⚠ 5 tips for businesses on Safer Internet Day ⚠

Safer Internet Day - here's how to make your business better at cybersecurity, no matter how safe you are already!

πŸ“– Read

via "Naked Security".
⚠ 5 tips for you and your family on Safer Internet Day ⚠

Why not make Safer Internet Day the excuse you need to do all those cybersecurity tweaks you've been putting off?

πŸ“– Read

via "Naked Security".
πŸ•΄ Keeping a Strong Security Metrics Framework Strong πŸ•΄

Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage πŸ•΄

Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.

πŸ“– Read

via "Dark Reading: ".