πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Packet Fence 10.0.1 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2018-20225

An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Companies Struggle for Effective Cybersecurity πŸ•΄

The money companies are spending on cybersecurity tools doesn't necessarily result in better security, a new survey shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” 5 things developers should know about data privacy and security πŸ”

In a post-Cambridge Analytica world, developers are more important than ever to the data privacy and security of the software they build.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 16 stories of the week ⚠

It's weekly roundup time!

πŸ“– Read

via "Naked Security".
⚠ Microsoft opens IoT bug bounty program ⚠

Microsoft really wants to secure the Internet of Things (IoT), and it's enlisting citizen hackers' help to do it.

πŸ“– Read

via "Naked Security".
⚠ Clearview AI won’t sell vast faceprint collection to private companies ⚠

… nor to anybody, even law enforcement, in the place where privacy-oblivious biometrics companies are forced to their knees: Illinois.

πŸ“– Read

via "Naked Security".
πŸ” Cybercriminals exploiting the coronavirus to deploy infostealers πŸ”

These threats are designed to capture usernames, passwords, bank details, network information, and other sensitive data, says security provider Lastline.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use the new Vivaldi tracking feature πŸ”

The latest release of the Vivaldi web browser includes one of the easiest to use tracker blockers on the market.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Rule of Thumb: USB Killers Pose Real Threat πŸ•΄

They look just like a USB thumb drive, but instead of storing data, they can be used to destroy it and the device the data is saved on.

πŸ“– Read

via "Dark Reading: ".
⚠ Celebrity personal data taken in ransomware attack ⚠

Ransomware crooks are apparently threatening to dump personal data for a long of celebs including Lady Gaga, Madonna, Nicki Minaj and more.

πŸ“– Read

via "Naked Security".
❌ Sphinx Malware Returns to Riddle U.S. Targets ❌

The banking trojan has upgraded and is seeing a resurgence on the back of coronavirus stimulus payment themes.

πŸ“– Read

via "Threatpost".
❌ Millions of Thunderbolt-Equipped Devices Open to β€˜ThunderSpy’ Attack ❌

If an attacker can get his hands on a Thunderbolt-equipped device for five minutes, he can launch a new data-stealing attack called "Thunderspy."

πŸ“– Read

via "Threatpost".
πŸ” CISOs forced to adapt to pandemic and other geopolitical risks πŸ”

A new report finds cyber resilience, security culture, and cloud security are hot topics for chief information security officers.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Phishing campaign caught spoofing Zoom πŸ”

The campaign impersonates Zoom emails, but steals the Microsoft account credentials of its victims, says security firm Abnormal Security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Survey: Teams supported by mature DevOps practices more likely to integrate automated security πŸ”

Adding security into DevOps hasn't been as easy as automating all the things. Sonatype's survey shows the state of the industryβ€”and what you might want to work on next.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Time for a new job? Check out 16 cybersecurity courses on the basics, SOC skills, and new privacy rules πŸ”

Online training classes for newbies, managers, and privacy officers are on sale this week.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Kaspersky: 73% of workers have received no cybersecurity guidance πŸ”

Millions of employees working remotely have gotten no information about how to keep their devices and home networks safe.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-1285

Apache log4net before 2.0.8 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users.

πŸ“– Read

via "National Vulnerability Database".
πŸ” FTC To Review Healthcare Data Breach Notification Rule πŸ”

The FTC is seeking comment on whether or not it should make changes to its Health Breach Notification Rule, a rule that compels orgs to disclose when health records are breached.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Researchers Analyze Oracle WebLogic Flaw Under Attack πŸ•΄

Trend Micro researchers explain how attackers bypassed the patch for a deserialization vulnerability in the Oracle WebLogic Server.

πŸ“– Read

via "Dark Reading: ".