TL;DR as a service

Highlight the best Privacy professionals info and share on social media

Privacy professionals

Ambassadors
New APT Group Targets Airline Industry & Immigration
LazyScript bears similarities to some Middle Eastern groups but appears to be a distinct operation of its own, Malwarebytes says.
Report: Mobile Phishing to Steal Government Credentials Increased 67% in 2020
In 2020, malicious hackers targeting government workers' devices drastically sharpened the focus of their phishing efforts on obtaining victims' login credentials-as opposed to delivering malware-making for more invasive and persistent attacks, according to a report from mobile security firm Lookout.
Mozilla Patches Bugs in Firefox, Now Blocks Cross-Site Cookie Tracking
Mozilla said its Total Cookie Protection feature in Firefox 86 prevents invasive, cross-site cookie tracking.
How to Use Clubhouse, the Audio-Only, By-Invite App, Without Giving Up All of Your Data
The popular invite-only social media app Clubhouse has recently raised privacy and security concerns.
Consumer Reports explains what you need to do to protect yourself.
Ukraine says Russia hacked its document portal and planted malicious files
Ukraine has accused the Russian government of hacking into one of its government Web portals and planting malicious documents that would install malware on end users' computers.
5h ago 
from Medium
Common Social Engineering Attack Strategies
1
JamesJalaPayneo

Phishing

1
...
Think of it as Fishing, where you do not try to catch a specific fish, but rather try to catch any fish. 1
...
An example of a phishing attack would be an email sent to users highlighting that their PayPal accounts are being blocked due to suspicious behavior. 1
...
This form of attack requires a huge effort from the attacker and can even take several months of planning and preparation. 1
read and highlight
Universities Face Double Threat of Ransomware, Data Breaches
Institutions of higher education continue to have problematic password policies, lack multifactor authentication (MFA), and have a plethora of open ports - despite suffering dozens of ransomware attacks and targeting by attackers focused on stealing student information and university research, according to a new study published Tuesday.
What do users and IT have in common? They're both to blame for poor remote security practices
One in four remote workers reuses work credentials on consumer sites, but IT isn't doing them any favors by reportedly failing to provide essential protection while away from the office.
5 tips to protect your organization against the next cyberattack
To better combat cyberattacks, prevention is better than detection, says Check Point Software.
Is Clubhouse safe, and should CISOs stop its use?
Security professionals are considering questions over the privacy and wider security of hot new social network Clubhouse following a leak of private audio chats by a user who found a way to beat the system and stream them beyond the confines of the service.