πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ What is the dark web? Your questions answered, in plain English ⚠

Watch this new video from our YouTube channel - the dark web explained without jargon or judgment.

πŸ“– Read

via "Naked Security".
❌ 70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs ❌

A lack of awareness about where and how open-source libraries are being used is problematic, researchers say.

πŸ“– Read

via "Threatpost".
❌ ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It ❌

Even seeing data breaches in the news, more than half of consumers are still reusing passwords.

πŸ“– Read

via "Threatpost".
πŸ” How to detect bots: What you need to know πŸ”

Akamai's CTO discusses why machine learning and cloud are important when it comes to security breaches, IoT-related attacks, and credential stuffing.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to detect bots: What you need to know πŸ”

Akamai's CTO discusses why machine learning and cloud are important when it comes to security breaches, IoT-related attacks, and credential stuffing.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Akamai CTO on how bots are used online in legal and illegal ways πŸ”

Learn what a bot is, the spectrum of ways bots are used online (especially in social media), and how bots might be used in the next election cycle.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Akamai CTO on how bots are used online in legal and illegal ways πŸ”

Learn what a bot is, the spectrum of ways bots are used online (especially in social media), and how bots might be used in the next election cycle.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How bots impact retail and e-commerce πŸ”

Akamai CTO Patrick Sullivan explains how bots affect pricing and availability for various retail items. He also offers consumers advice on protecting themselves from fraud.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to run an SSH connection through Tor πŸ”

Looking for a way to gain a bit more security and privacy for your SSH connections? Jack Wallen shows you how with the help of Tor.

πŸ“– Read

via "Security on TechRepublic".
❌ New iOS Jailbreak Tool Works on iPhone Models iOS 11 to iOS 13.5 ❌

Latest version of UnC0ver uses unpatched zero-day exploit to take complete control of devices, even those running iOS 13.5.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Problem with Artificial Intelligence in Security πŸ•΄

Any notion that AI is going to solve the cyber skills crisis is very wide of the mark. Here's why.

πŸ“– Read

via "Dark Reading: ".
πŸ‘1
πŸ” How Zoom plans to better secure meetings with end-to-end encryption πŸ”

A new document from Zoom illustrates how the company hopes to beef up the security and privacy of its virtual meeting platform.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  I2P 0.9.46 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  nfstream 5.1.5 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Docker Desktop danger discovered, patch now ⚠

Docker has fixed a vulnerability that could have allowed an attacker to gain control of a Windows system using its service.

πŸ“– Read

via "Naked Security".
❌ Turla APT Revamps One of Its Go-To Spy Tools ❌

An updated version of the ComRAT malware was discovered in attacks on governmental targets.

πŸ“– Read

via "Threatpost".
⚠ Internet giants unite to stop warrantless snooping on web histories ⚠

7 internet giants, including Mozilla, Reddit and Twitter, asked the House to do what the Senate narrowly missed doing: protect browsing history.

πŸ“– Read

via "Naked Security".
⚠ New iPhone jailbreak released ⚠

Apple’s latest iOS versions have only been out for a week, but there's already a jailbreak available.

πŸ“– Read

via "Naked Security".
πŸ•΄ Content Delivery Networks Adding Checks for Magecart Attacks πŸ•΄

Modern web applications make significant use of third-party code to drive innovation, but the software supply chain has also turned into a major source of threat. CDNs aim to change that.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ World Leaders Urge Action Against Healthcare Cyberattacks πŸ•΄

The global call to end cybercrime targeting healthcare facilities has been signed by government leaders and Nobel laureates.

πŸ“– Read

via "Dark Reading: ".