πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  netABuse Insufficient Windows Authentication Logic Scanner πŸ› 

netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Fleeceware on your iPhone? Don’t get caught out while penned up at home ⚠

The app's free. But the subscription most certainly isn't!

πŸ“– Read

via "Naked Security".
πŸ” Who has banned Zoom? Google, NASA, and more πŸ”

Zoom's security woes have led to a number of organizations, companies, and schools banning or restricting its use, with some recommending alternatives such as Microsoft Teams.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Malicious coronavirus-themed apps target Android devices πŸ”

Purporting to offer help and info on COVID-19, the apps can let hackers take control of devices to access files, contacts, the calendar, and more, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.11 πŸ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Zero Trust security: Go slowly in order to go big, says expert πŸ”

Zero Trust can seem scary to those accustomed to traditional security approaches. Here is how to get started with Zero Trust.

πŸ“– Read

via "Security on TechRepublic".
πŸ” E-commerce and home-based workers see increase of targeted fraud πŸ”

With more people working from home and e-commerce experiencing a boom-time, fraudsters have taken notice.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Schneier on Hacking Society πŸ•΄

How the hacker mindset and skill set could play a role in improving and securing societal systems, according to renowned security technologist Bruce Schneier.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ No STEM, No Problem: How to Close the Security Workforce Gap πŸ•΄

Those who work well with others, learn quickly, and possess a proactive mindset toward the work can make great employees, even if their backgrounds aren't rooted in cybersecurity.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Wireshark Analyzer 3.2.3 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Copycat Site Serves Up Raccoon Stealer ❌

Visitors to the fake site expecting antivirus offerings will instead encounter the Fallout exploit kit and a possible malware infection.

πŸ“– Read

via "Threatpost".
πŸ•΄ Zoom, Microsoft & NTT Data Leaders Share Work-from-Home Security Tips πŸ•΄

Tech leaders encourage organizations to maintain security awareness training and offer advice on how to protect their information.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Emails Impersonating Trump, White House Seek to Exploit Pandemic Fears πŸ•΄

The phishing campaign is only the latest among many related to COVID-19, INKY says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Deloitte highlights top 9 challenges for enterprises during COVID-19 crisis πŸ”

Now's the time for organizations large and small to return to the basics with cyber hygiene protocols, the firm's cyber risk services leader says.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Govt Outlines Federal Agency Telework Policies πŸ”

The federal government on Wednesday released guidance designed to inform agencies how to best support secure teleworking.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to secure a Kubernetes cluster by preventing unwanted modules from loading πŸ”

The road to secure containers is long and winding. One stop you should take on that journey is unloading unnecessary kernel modules in your Linux containers.

πŸ“– Read

via "Security on TechRepublic".
❌ Cloudflare Axes Google reCAPTCHA Due to Privacy, Price ❌

Cloudflare's CEO said it is replacing Google's reCAPTCHA tool with hCaptcha due to pricing, privacy and availability concerns.

πŸ“– Read

via "Threatpost".
πŸ•΄ Zscaler to Buy Cloudneeti πŸ•΄

The security service provider adds cloud security "posture" management with the deal.

πŸ“– Read

via "Dark Reading: ".
❌ Compromised Zoom Credentials Swapped in Underground Forums ❌

Thousands of compromised Zoom credentials were discovered in underground forums as cybercriminals look to tap into the burgeoning remote workforce.

πŸ“– Read

via "Threatpost".
πŸ•΄ 8 Phishing Lures Preying on Pandemic Panic πŸ•΄

Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.

πŸ“– Read

via "Dark Reading: ".