πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Container security meets Kubernetes: What IT pros need to know πŸ”

Docker brought containers into the enterprise; static scanning makes sure they are secure when the images are created. Who watches them when they run?

πŸ“– Read

via "Security on TechRepublic".
πŸ›  URLCrazy Domain Name Typo Tool 0.7.1 πŸ› 

URLCrazy is a tool that can generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. It generates 15 types of domain variants, knows over 8000 common misspellings, supports multiple keyboard layouts, can check if a typo is a valid domain, tests if domain typos are in use, and estimates the popularity of a typo.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Bing.com Hostname / IP Enumerator 1.0.2 πŸ› 

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” How to secure sensitive data and technology when a remote employee leaves πŸ”

If an employee decides to pursue another job during the coronavirus pandemic, organizations must be prepared to keep proprietary data and company technology safe.

πŸ“– Read

via "Security on TechRepublic".
⚠ 5 common mistakes that lead to ransomware ⚠

Here are five simple tips that will help you keep ransomware out and your precious data in

πŸ“– Read

via "Naked Security".
❌ U.S. Universities Hit With β€˜Adult Dating’ Spear-Phishing Attack ❌

More than 150,000 emails spreading the Hupigon RAT that use adult dating as a lure have been uncovered, with almost half being sent to U.S. university and college email addresses.

πŸ“– Read

via "Threatpost".
❌ Hackers Mount Zero-Day Attacks on Sophos Firewalls ❌

A pre-auth SQL injection bug leading to remote code execution is at the heart of a data-stealing campaign against XG firewalls, using the Asnarok trojan.

πŸ“– Read

via "Threatpost".
πŸ” How to use the new Vivaldi tracking feature πŸ”

The latest release of the Vivaldi web browser includes one of the easiest to use tracker blockers on the market.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cloud Services Are the New Critical Infrastructure. Can We Rely on Them? πŸ•΄

If cloud services vendors successfully asked themselves these three questions, we'd all be better off.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to prevent unattended SSH connections from remaining connected πŸ”

Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Advisory Warns of Vulnerabilities Affecting Office πŸ•΄

The flaws exist in Autodesk's FBX Software Development Kit, which is supported in Microsoft Office 2019 and Office 365 ProPlus.

πŸ“– Read

via "Dark Reading: ".
πŸ” Resources, Budget Remain An Issue for DPOs πŸ”

In a recent survey, data protection officers cited a lack of budget and cohesion across all business units when it comes to developing an organization-wide data protection and privacy strategy as some of the role's top challenges.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Microsoft Patches Dangerous Teams Vulnerability πŸ•΄

CyberArk says issue would have allowed attackers to take over Teams accounts using a malicious GIF.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your data against the Mail.app vulnerability in Apple devices πŸ”

A recent bug discovered can allow your device to be compromised through Apple's default Mail application, but until a patch is released, follow these steps to protect yourself.

πŸ“– Read

via "Security on TechRepublic".
❌ GDPR Compliance Site Leaks Git Data, Passwords ❌

Researchers discovered a .git folder exposing passwords and more for a website that gives advice to organizations about complying with the General Data Protection Regulation (GDPR) rules.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Target Sophos Firewalls with Zero-Day πŸ•΄

Remote exploit compromises specific configurations of XG firewalls with the intent of stealing data from the devices.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to securely configure screen sharing remotely on macOS Catalina πŸ”

Apple added more security to screen sharing, so the default behavior restricts all but local users from enabling this feature. With an MDM, admins can automate this process.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Top 10 Cyber Incident Response Mistakes and How to Avoid Them πŸ•΄

From lack of planning to rushing the closure of incidents, these mistakes seriously harm IR effectiveness.

πŸ“– Read

via "Dark Reading: ".
πŸ” One billion certificates later, Let's Encrypt's crazy dream to secure the web is coming true πŸ”

Commentary: Let's Encrypt cofounder Josh Aas is quick to deflect praise, but each of us has a great deal to thank him for, as 85% of page loads are now secured.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Biopharmaceutical Firm Suffers Ransomware Attack, Data Dump πŸ•΄

ExecuPharm said its internal servers were hit with ransomware after attackers launched a phishing attack.

πŸ“– Read

via "Dark Reading: ".
⚠ Warning! Fake Zoom β€œHR meeting” emails phish for your password ⚠

Scammers have turned to employment worries as their latest lure for Zoom phishing scams.

πŸ“– Read

via "Naked Security".