โ WhatsApp Phone Numbers Pop Up in Google Search Results โ But is it a Bug? โ
๐ Read
via "Threatpost".
A researcher found that phone numbers tied to WhatsApp accounts are indexed publicly on Google Search creating what he claims is a โprivacy issueโ for users.๐ Read
via "Threatpost".
Threat Post
WhatsApp Phone Numbers Pop Up in Google Search Results โ But is it a Bug?
A researcher found that phone numbers tied to WhatsApp accounts are indexed publicly on Google Search creating what he claims is a โprivacy issueโ for users.
๐ด Local, State Governments Face Cybersecurity Crisis ๐ด
๐ Read
via "Dark Reading: ".
Ransomware hit small government organizations hard in 2019. Now they have to deal with budget cuts, pandemic precautions, social unrest, and the coming election cycle.๐ Read
via "Dark Reading: ".
Dark Reading
Local, State Governments Face Cybersecurity Crisis
Ransomware hit small government organizations hard in 2019. Now they have to deal with budget cuts, pandemic precautions, social unrest, and the coming election cycle.
๐ด Name That Toon: Sign of the Tides ๐ด
๐ Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.๐ Read
via "Dark Reading: ".
Dark Reading
Name That Toon: Sign of the Tides
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
โ News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate โ
๐ Read
via "Threatpost".
Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.๐ Read
via "Threatpost".
Threat Post
News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate
Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.
โ Electrolux, Others Conned Out of Big Money by BEC Scammer โ
๐ Read
via "Threatpost".
Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.๐ Read
via "Threatpost".
Threat Post
Electrolux, Others Conned Out of Big Money by BEC Scammer
Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.
๐ Friday Five: 6/5 Edition ๐
๐ Read
via "Subscriber Blog RSS Feed ".
The city of Minneapolis hit with a DDoS attack, Zoom's new security policy causes social media uproar, and a wave of cyber-attacks target anti-racism sites - catch up on the week's news with the Friday Five.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 6/5 Edition
The city of Minneapolis hit with a DDoS attack, Zoom's new security policy causes social media uproar, and a wave of cyber-attacks target anti-racism sites - catch up on the week's news with the Friday Five.
๐ Faraday 3.11.1 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Faraday 3.11.1 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
โ FTC Slams Childrenโs App Developer for COPPA Violations โ
๐ Read
via "Threatpost".
Children's app developer HyperBeard must pay $150,000 after the FTC claimed it violated privacy laws.๐ Read
via "Threatpost".
Threat Post
FTC Slams Childrenโs App Developer for COPPA Violations
Children's app developer HyperBeard must pay $150,000 after the FTC claimed it violated privacy laws.
๐ด Spear-Phishing Campaign Hits Developer Collaboration System Users ๐ด
๐ Read
via "Dark Reading: ".
Users of Zeplin, a popular developer and designer collaboration system, have been hit with new waves of spear-phishing attacks in the last month.๐ Read
via "Dark Reading: ".
Dark Reading
Spear Phishing Campaign Hits Developer Collaboration System Users
Users of Zeplin, a popular developer and designer collaboration system, have been hit with new waves of spearphishing attacks in the last month.
๐ด Q&A: Eugene Spafford on the Risks of Internet Voting ๐ด
๐ Read
via "Dark Reading: ".
Allowing people to cast their ballots online to circumvent coronavirus-related health concerns introduces problems that we simply don't know how to manage, says the Purdue University professor and security leader.๐ Read
via "Dark Reading: ".
Dark Reading
Q&A: Eugene Spafford on the Risks of Internet Voting
Allowing people to cast their ballots online to circumvent coronavirus-related health concerns introduces problems that we simply don't know how to manage, says the Purdue University professor and security leader.
โ Monday review โ the hot 15 stories of the week โ
๐ Read
via "Naked Security".
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.๐ Read
via "Naked Security".
Naked Security
Monday review โ the hot 15 stories of the week
Get yourself up to date with everything we've written in the last seven days โ it's weekly roundup time.
โ Can Governments Defeat Nation-State Attacks on Critical Infrastructures? โ
๐ Read
via "Threatpost".
The one cyber risk that governments are much better at controlling than we are is insider threats. Governments have been dealing with people threats for centuries and have powerful tools at their disposal for such investigations.๐ Read
via "Threatpost".
Threat Post
Can Governments Defeat Nation-State Attacks on Critical Infrastructures?
The one cyber risk that governments are much better at controlling than we are is insider threats.
๐ Ransomware: Consumers would hold CEOs personally responsible for attacks ๐
๐ Read
via "Security on TechRepublic".
Some people believe the CEO of a company hit by ransomware should pay a fine, resign, or even be sent to prison, says Veritas.๐ Read
via "Security on TechRepublic".
TechRepublic
Ransomware: Consumers would hold CEOs personally responsible for attacks
Some people believe the CEO of a company hit by ransomware should pay a fine, resign, or even be sent to prison, says Veritas.
๐ด Safeguard Your Remote Workforce ๐ด
๐ Read
via "Dark Reading: ".
DDoS attacks on VPN servers can not only bring remote work to a standstill but also cut off admins from accessing their systems. Here are three ways to stay safer.๐ Read
via "Dark Reading: ".
Dark Reading
Safeguard Your Remote Workforce
DDoS attacks on VPN servers can not only bring remote work to a standstill but also cut off admins from accessing their systems. Here are three ways to stay safer.
๐ How open source software vulnerabilities create risk for organizations ๐
๐ Read
via "Security on TechRepublic".
Security flaws in open source software have increased and can take a long time to be added to the National Vulnerability Database, says RiskSense.๐ Read
via "Security on TechRepublic".
TechRepublic
How open source software vulnerabilities create risk for organizations
Security flaws in open source software have increased and can take a long time to be added to the National Vulnerability Database, says RiskSense.
๐ Bing.com Hostname / IP Enumerator 1.0.3 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Bing.com Hostname / IP Enumerator 1.0.3 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
๐ UFONet 1.5 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
UFONet 1.5 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
๐ OpenStego Free Steganography Solution 0.7.4 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
OpenStego Free Steganography Solution 0.7.4 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
๐ Ransomware attack: Why a small business paid the $150,000 ransom ๐
๐ Read
via "Security on TechRepublic".
The CFO of a small company that was the victim of a ransomware attack and reveals why they paid the ransom (in Bitcoin) to gain back control of their systems.๐ Read
via "Security on TechRepublic".
TechRepublic
Ransomware attack: Why a small business paid the $150,000 ransom
The CFO of a small company that was the victim of a ransomware attack reveals why they paid the ransom (in Bitcoin) to gain back control of their systems.
โ Phishing Attack Hits German Coronavirus Task Force โ
๐ Read
via "Threatpost".
More than 100 executives at a multinational company that's part of a German task force for creating coronavirus protective gear, were targeted in an ongoing phishing attack.๐ Read
via "Threatpost".
Threat Post
Phishing Attack Hits German Coronavirus Task Force
More than 100 executives at a multinational company that's part of a German task force for creating PPE, were targeted in an ongoing phishing attack.