ðŸ›Ą Cybersecurity & Privacy ðŸ›Ą - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

ðŸ’ŧ Is your online life secure?

ðŸ“Đ lalilolalo.dev@gmail.com
Download Telegram
ðŸ•ī Firms Improve Threat Detection but Face Increasingly Disruptive Attacks ðŸ•ī

In addition, more third parties are discovering the attacks rather than the companies themselves.

📖 Read

via "Dark Reading: ".
ðŸ•ī 10 Tough Questions CEOs Are Asking CISOs ðŸ•ī

CEOs today are prepared with better questions than 'Are we secure,' and chief information security officers had better be ready to answer.

📖 Read

via "Dark Reading: ".
⚠ Ransomware attack forces 2-day shutdown of natural gas pipeline ⚠

The attacker(s) infected both IT and operational networks with an unspecified ransomware strain, though the facility never lost control.

📖 Read

via "Naked Security".
ðŸ•ī 5 Strategies to Secure Cloud Operations Against Today's Cyber Threats ðŸ•ī

With these fundamentals in mind, organizations can reduce their security and compliance risks as they reap the cloud's many benefits:

📖 Read

via "Dark Reading: ".
🔐 How Shadow IT could put your organization at risk 🔐

Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.

📖 Read

via "Security on TechRepublic".
🔐 How some presidential campaigns use DMARC to protect their domains from being spoofed 🔐

DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.

📖 Read

via "Security on TechRepublic".
❌ Cybergang Favors G Suite and Physical Checks For BEC Attacks ❌

Exaggerated Lion, a newly discovered cybercrime group, uses new and unique tactics to target U.S. companies in BEC attacks.

📖 Read

via "Threatpost".
ðŸĪŠðŸ’ļ SPECIAL OFFER! ðŸ’ļðŸĪŠ

 CYBERSECURITY 2020 by WILEY 😈

☑ïļ Secure yourself a new bundle of cybersecurity ebooks! Get ebooks like Cryptography Engineering: Design Principles and Practical Applications, Reversing: Secrets of Reverse Engineering, Social Engineering: The Science of Human Hacking, and more.

▩ïļ $959 Worth of awesome ebooks & videos ▩ïļ
â–Ŧïļ Pay $1 or more â–Ŧïļ
▩ïļ DRM-Free ▩ïļ
â–Ŧïļ Multi-format â–Ŧïļ
🔐 How to use Restricted Shell to limit user access to a Linux system 🔐

Learn how to prevent Linux users from executing certain commands and confining them to their home directory by employing rbash.

📖 Read

via "Security on TechRepublic".
🔐 5 free security apps to keep your Mac safe 🔐

Mac users, check out these five antivirus software options, which includes one antimalware app that is ideal for SMBs.

📖 Read

via "Security on TechRepublic".
🔐 How to use Restricted Shell to limit user access to a Linux system 🔐

Learn how to prevent Linux users from executing certain commands and confining them to their home directory by employing rbash.

📖 Read

via "Security on TechRepublic".
🔐 Security platform tracks rogue wireless devices via real-time map 🔐

New security tool from Bastille Networks can help security teams enforce no cell-phone zones.

📖 Read

via "Security on TechRepublic".
ðŸ•ī Personal Info of 10.6M MGM Resort Guests Leaked Online ðŸ•ī

Data published on a hacking forum includes phone numbers and email addresses of travelers ranging from everyday tourists to celebrities and tech CEOs.

📖 Read

via "Dark Reading: ".
❌ Critical Cisco Bug Opens Software Licencing Manager to Remote Attack ❌

A default password would let anyone access the Cisco Smart Software Manager On-Prem Base platform, even if it's not directly connected to the internet.

📖 Read

via "Threatpost".
ATENTION‾ New - CVE-2012-5366

The IPv6 implementation in Apple Mac OS X (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.

📖 Read

via "National Vulnerability Database".
ATENTION‾ New - CVE-2012-5365

The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.

📖 Read

via "National Vulnerability Database".
ATENTION‾ New - CVE-2012-5364

The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.

📖 Read

via "National Vulnerability Database".
ATENTION‾ New - CVE-2012-5363

The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2011-2393.

📖 Read

via "National Vulnerability Database".
ATENTION‾ New - CVE-2012-5362

The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2010-4669.

📖 Read

via "National Vulnerability Database".
ðŸ•ī It's Time to Break the 'Rule of Steve' ðŸ•ī

Today, in a room full of cybersecurity professionals, there are still more people called Steve than there are women.

📖 Read

via "Dark Reading: ".
🔏 Join Digital Guardian at RSA Conference 2020! 🔏

RSA 2020 is around the corner! Learn what Digital Guardian has planned at booth S935 and elsewhere for the week.

📖 Read

via "Subscriber Blog RSS Feed ".