πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  GNU Privacy Guard 2.2.20 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Monday review – the hot 23 stories of the week ⚠

From the EARN IT Act to the Martinelli hoax - and everything in between. It’s your weekly security roundup.

πŸ“– Read

via "Naked Security".
⚠ Firefox is dropping FTP support ⚠

Heads up, Firefox users who rely on FTP: the browser is eliminating support for this venerable protocol.

πŸ“– Read

via "Naked Security".
⚠ Stolen data of company that refused REvil ransom payment now on sale ⚠

A comment from one buyer of data purportedly from Brooks International: "It even has credit card number & a password. lol !!"

πŸ“– Read

via "Naked Security".
⚠ Tour guide/Chinese spy gets four years for SD card dead drops ⚠

The dead drops were very James Bond: once, the data mule taped the SD card to the underside of a desk in a hotel.

πŸ“– Read

via "Naked Security".
⚠ Cisco issues urgent fixes for SD-WAN router flaws ⚠

Cisco has patched a clutch of high-priority vulnerabilities in its SD-WAN routes and their management software.

πŸ“– Read

via "Naked Security".
πŸ•΄ From Zero to Hero: CISO Edition πŸ•΄

It's time for organizations to realize that an empowered CISO can effectively manage enterprise risk and even grow the business along the way.

πŸ“– Read

via "Dark Reading: ".
πŸ” 3 ways to revamp the hiring process for cybersecurity jobs πŸ”

Deloitte expert recommends using tactics to compete for the pool of security pros, including offering new incentives like student loan repayment.

πŸ“– Read

via "Security on TechRepublic".
❌ Fake Coronavirus β€˜Vaccine’ Website Busted in DoJ Takedown ❌

Authorities have cracked down on a website that claimed to give out coronavirus vaccine kits - but that was actually stealing victims' payment card data and personal information.

πŸ“– Read

via "Threatpost".
πŸ•΄ 8 Infosec Page-Turners for Days Spent Indoors πŸ•΄

Stuck inside and looking for a new read? Check out these titles written by security practitioners and reporters across the industry.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-11022

NETGEAR Prosafe WC9500 5.1.0.17, WC7600 5.1.0.17, and WC7520 2.5.0.35 devices allow a remote attacker to execute code with root privileges via shell metacharacters in the reqMethod parameter to login_handler.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Cybercriminals now recycling standard phishing emails with coronavirus themes πŸ”

The latest malicious COVID-19 campaigns are repurposing conventional phishing emails with a coronavirus angle, says security trainer KnowBe4.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ FBI Warns of Fake CDC Emails in COVID-19 Phishing Alert πŸ•΄

Fraudsters exploit concerns by claiming to offer virus-related information or promising stimulus checks.

πŸ“– Read

via "Dark Reading: ".
⚠ WhatsApp β€œMartinelli” hoax is back, warning about β€œDance of the Pope” ⚠

Two old WhatsApp hoaxes are back, with a grain-of-truth story in the middle to add a veneer of believability. Don't spread this stuff!

πŸ“– Read

via "Naked Security".
πŸ›  Hyperion Runtime Encrypter 2.3 πŸ› 

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.10 πŸ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” How to protect your organization and remote workers against ransomware πŸ”

Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Warns of Critical Windows Zero-Day Flaws ❌

The unpatched Windows zero day flaws are being exploited in "limited, targeted" attacks, according to Microsoft.

πŸ“– Read

via "Threatpost".
πŸ” Ex-Google Engineer Pleads Guilty to Trade Secret Theft πŸ”

Ex-Google engineer Anthony Levandowski plead guilty to trade secret theft last week, acknowleding he took a sensitive Google file before joining Uber.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Hackers Actively Exploit 0-Day in CCTV Camera Hardware ❌

Criminals behind botnets Chalubo, FBot and Moobot attack unpatched vulnerabilities in the commercial DVRs made by LILIN.

πŸ“– Read

via "Threatpost".