πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-13651

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Planning Ahead for a Secure SAP S/4HANA Migration πŸ•΄

Experts say that the pressure to move to SAP's next-gen platform can be a big opportunity to move the needle on ERP cybersecurity.

πŸ“– Read

via "Dark Reading: ".
πŸ” New survey shows US adults split on COVID-19 cell phone tracking and data collection πŸ”

Governments and organizations are unleashing new technologies to fight the spread of the coronavirus, adding to privacy and data collection concerns.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-5484

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-13654

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-13653

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ” 5 things developers should know about data privacy and security πŸ”

In a post-Cambridge Analytica world, developers are more important than ever to the data privacy and security of the software they build.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Alarming number of pharma executive login credentials available on the Dark Web πŸ”

A new report details major vulnerabilities among the executive suite at some of the largest pharmaceutical companies.

πŸ“– Read

via "Security on TechRepublic".
❌ Black Hat USA, DEF CON 28 Go Virtual ❌

Due to the coronavirus pandemic, there will be no in-person Black Hat USA or DEF CON conferences this year.

πŸ“– Read

via "Threatpost".
πŸ” Phishing emails caught exploiting DocuSign and COVID-19 πŸ”

A new attack discovered by Abnormal Security aims to steal account credentials from people who use the online document signing platform.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Capstone 4.0.2 πŸ› 

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Zeek 3.1.3 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  TestSSL 3.0.2 πŸ› 

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  nfstream 5.1.0 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Packet Fence 10.0.1 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2018-20225

An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Companies Struggle for Effective Cybersecurity πŸ•΄

The money companies are spending on cybersecurity tools doesn't necessarily result in better security, a new survey shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” 5 things developers should know about data privacy and security πŸ”

In a post-Cambridge Analytica world, developers are more important than ever to the data privacy and security of the software they build.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 16 stories of the week ⚠

It's weekly roundup time!

πŸ“– Read

via "Naked Security".
⚠ Microsoft opens IoT bug bounty program ⚠

Microsoft really wants to secure the Internet of Things (IoT), and it's enlisting citizen hackers' help to do it.

πŸ“– Read

via "Naked Security".
⚠ Clearview AI won’t sell vast faceprint collection to private companies ⚠

… nor to anybody, even law enforcement, in the place where privacy-oblivious biometrics companies are forced to their knees: Illinois.

πŸ“– Read

via "Naked Security".