πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Open Cybersecurity Alliance looks for new members and new projects at RSA 2020 πŸ”

New standards project aims to make it easy to integrate multiple security tools.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Tense Talk About Supply Chain Risk Yields Few Answers πŸ•΄

RSA panelists locked horns over whether the ban preventing US government agencies from doing business with Huawei is unfairly singling out the Chinese telecom giant.

πŸ“– Read

via "Dark Reading: ".
❌ RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity ❌

CEO Mary T. Barra addressed the high stakes in rolling out self-driving cars and biometric-enhanced vehicles, where one cyber-event could derail plans for emerging automotive technologies.

πŸ“– Read

via "Threatpost".
πŸ•΄ Government Employees Unprepared for Ransomware πŸ•΄

Data shows 73% are concerned about municipal ransomware threats but only 38% are trained on preventing these attacks.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-8878

Information disclosure in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to acquire information on internal network devices' hostnames and MAC addresses by reading the custom_id variable on the blocking.asp page.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-8877

Information disclosure in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to acquire information on internal network IP address ranges by reading the new_lan_ip variable on the error_page.htm page.

πŸ“– Read

via "National Vulnerability Database".
❌ Google’s War on Android App Permissions, 60 Percent Successful ❌

An automated Google warning to Android app developers regarding mobile app permissions has cut the number of requests in half.

πŸ“– Read

via "Threatpost".
πŸ•΄ Clearview AI Customers Exposed in Data Breach πŸ•΄

Customers for the controversial facial recognition company were detailed in a log file leaked to news organizations.

πŸ“– Read

via "Dark Reading: ".
πŸ›  I2P 0.9.45 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Samhain File Integrity Checker 4.4.1 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Zeek 3.1.0 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Wireshark Analyzer 3.2.2 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Google has right to censor conservative nonprofit on YouTube ⚠

It's not a "state actor", so isn't subject to 1st Amendment scrutiny and can censor PragerU's videos on abortion, gun rights and terrorism.

πŸ“– Read

via "Naked Security".
⚠ Firefox rolling out DNS-over-HTTPS privacy by default in the US ⚠

Mozilla has said it plans to make a privacy technology called DNS-over-HTTPS (DoH) the default setting for US users of Firefox within weeks.

πŸ“– Read

via "Naked Security".
⚠ Ransomware wipes evidence, lets suspected drug dealers walk free ⚠

Six alleged drug criminals will go free thanks to a ransomware attack on a small Florida city, it was revealed this month.

πŸ“– Read

via "Naked Security".
⚠ Clearview AI loses entire database of faceprint-buying clients to hackers ⚠

Time to worry about how well the facial recognition startup protects its 3b+ database of faceprints scraped from our social media accounts?

πŸ“– Read

via "Naked Security".
πŸ•΄ Educating Educators: Microsoft's Tips for Security Awareness Training πŸ•΄

Microsoft's director of security education and awareness shares his approach to helping train employees in defensive practices.

πŸ“– Read

via "Dark Reading: ".
❌ Patrick Wardle: Apple Devices Hit With Recycled macOS Malware ❌

Patrick Wardle talks about the biggest threats he's seeing impacting Apple devices.

πŸ“– Read

via "Threatpost".
❌ RSAC 2020: Ransomware a β€˜National Crisis,’ CISA Says, Ramps ICS Focus ❌

The federal agency plans a slew of initiatives to address industrial control security this year.

πŸ“– Read

via "Threatpost".
πŸ•΄ Reducing Risk with Data Minimization πŸ•΄

Putting your company on a data diet that reduces the amount of the sensitive data you store or use is a smart way to achieve compliance with GDPR and CCPA.

πŸ“– Read

via "Dark Reading: ".