๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โš  Monday review โ€“ the hot 15 stories of the week โš 

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

๐Ÿ“– Read

via "Naked Security".
โŒ Can Governments Defeat Nation-State Attacks on Critical Infrastructures? โŒ

The one cyber risk that governments are much better at controlling than we are is insider threats. Governments have been dealing with people threats for centuries and have powerful tools at their disposal for such investigations.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ” Ransomware: Consumers would hold CEOs personally responsible for attacks ๐Ÿ”

Some people believe the CEO of a company hit by ransomware should pay a fine, resign, or even be sent to prison, says Veritas.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Safeguard Your Remote Workforce ๐Ÿ•ด

DDoS attacks on VPN servers can not only bring remote work to a standstill but also cut off admins from accessing their systems. Here are three ways to stay safer.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” How open source software vulnerabilities create risk for organizations ๐Ÿ”

Security flaws in open source software have increased and can take a long time to be added to the National Vulnerability Database, says RiskSense.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ›  Bing.com Hostname / IP Enumerator 1.0.3 ๐Ÿ› 

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
๐Ÿ›  UFONet 1.5 ๐Ÿ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
๐Ÿ›  OpenStego Free Steganography Solution 0.7.4 ๐Ÿ› 

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
๐Ÿ” Ransomware attack: Why a small business paid the $150,000 ransom ๐Ÿ”

The CFO of a small company that was the victim of a ransomware attack and reveals why they paid the ransom (in Bitcoin) to gain back control of their systems.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ Phishing Attack Hits German Coronavirus Task Force โŒ

More than 100 executives at a multinational company that's part of a German task force for creating coronavirus protective gear, were targeted in an ongoing phishing attack.

๐Ÿ“– Read

via "Threatpost".
โŒ SMBGhost RCE Exploit Threatens Corporate Networks โŒ

The release of a PoC for the Windows flaw known as "SMBGhost" could set off cyberattack waves, CISA warned.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ” Ransomware attack: Why a small business paid the $150,000 ransom ๐Ÿ”

The CFO of a small company that was the victim of a ransomware attack and reveals why they paid the ransom (in Bitcoin) to gain back control of their systems.

๐Ÿ“– Read

via "Security on TechRepublic".
โš  Double-crossing ransomware decryptor scrambles your files again! โš 

Just when you thought a bad thing could get no worse...

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด Flaws Found in Some Open Source Projects Exploited More Often ๐Ÿ•ด

A study of major open source projects finds that 3.3% of vulnerabilities are exploited, but the rate of exploitation varies significantly.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Final Regulations For CCPA Sent For Review ๐Ÿ”

With CCPA enforcement on track for less than four weeks from now, Californiaโ€™s AG sent his final proposed regulations for the law to be reviewed.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
๐Ÿ” Cyber incidents at NASA spiked 366% in 2019 ๐Ÿ”

While the agency experienced 1,468 incidents, its budget was decreased last year, according to a report by Atlas VPN.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Canada's Fitness Depot Alerts Customers to Data Breach ๐Ÿ•ด

The retailer reports cybercriminals infected its online store and used a fraudulent form to steal shoppers' information.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2019-19412

Some Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. The affected products and versions are: ALP-AL00B Versions earlier than 9.0.0.181(C00E87R2P20T8) ALP-L09 Versions earlier than 9.0.0.201(C432E4R1P9) ALP-L29 Versions earlier than 9.0.0.177(C185E2R1P12T8), Versions earlier than 9.0.0.195(C636E2R1P12) Anne-AL00 Versions earlier than 8.0.0.168(C00) BLA-AL00B Versions earlier than 9.0.0.181(C00E88R2P15T8) BLA-L09C Versions earlier than 9.0.0.177(C185E2R1P13T8), Versions earlier than 9.0.0.206(C432E4R1P11) BLA-L29C Versions earlier than 9.0.0.179(C576E2R1P7T8), Versions earlier than 9.0.0.194(C185E2R1P13), Versions earlier than 9.0.0.206(C432E4R1P11), Versions earlier than 9.0.0.210(C635E4R1P13) Berkeley-AL20 Versions earlier than 9.0.0.156(C00E156R2P14T8) Berkeley-L09 Versions earlier than 8.0.0.172(C432), Versions earlier than 8.0.0.173(C636) Emily-L29C Versions earlier than 9.0.0.159(C185E2R1P12T8), Versions earlier than 9.0.0.159(C461E2R1P11T8), Versions earlier than 9.0.0.160(C432E7R1P11T8), Versions earlier than 9.0.0.165(C605E2R1P12), Versions earlier than 9.0.0.168(C636E7R1P13T8), Versions earlier than 9.0.0.168(C782E3R1P11T8), Versions earlier than 9.0.0.196(C635E2R1P11T8) Figo-L03 Versions earlier than 9.1.0.130(C605E6R1P5T8) Figo-L21 Versions earlier than 9.1.0.130(C185E6R1P5T8), Versions earlier than 9.1.0.130(C635E6R1P5T8) Figo-L23 Versions earlier than 9.1.0.130(C605E6R1P5T8) Figo-L31 Versions earlier than 9.1.0.130(C432E8R1P5T8) Florida-L03 Versions earlier than 9.1.0.121(C605E5R1P1T8) Florida-L21 Versions earlier than 8.0.0.129(C605), Versions earlier than 8.0.0.131(C432), Versions earlier than 8.0.0.132(C185) Florida-L22 Versions earlier than 8.0.0.132(C636) Florida-L23 Versions earlier than 8.0.0.144(C605) HUAWEI P smart Versions earlier than 9.1.0.130(C185E6R1P5T8), Versions earlier than 9.1.0.130(C605E6R1P5T8) HUAWEI P smart, HUAWEI Y7s Versions earlier than 9.1.0.124(C636E6R1P5T8) HUAWEI P20 lite Versions earlier than 8.0.0.148(C635), Versions earlier than 8.0.0.155(C185), Versions earlier than 8.0.0.155(C605), Versions earlier than 8.0.0.156(C605), Versions earlier than 8.0.0.157(C432) HUAWEI nova 3e, HUAWEI P20 lite Versions earlier than 8.0.0.147(C461), Versions earlier than 8.0.0.148(ZAFC185), Versions earlier than 8.0.0.160(C185), Versions earlier than 8.0.0.160(C605), Versions earlier than 8.0.0.168(C432), Versions earlier than 8.0.0.172(C636) Honor View 10 Versions earlier than 9.0.0.202(C567E6R1P12T8) Leland-AL00A Versions earlier than 8.0.0.182(C00) Leland-L21A Versions earlier than 8.0.0.135(C185), Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L22A Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L22C Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L31A Versions earlier than 8.0.0.139(C432)

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Singaporeโ€™s Contact Tracing Wearable Causes Privacy Backlash โŒ

Thousands have signed a petition that underscores data privacy issues with Singapore's newly announced contact-tracing wearable, in development.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Chinese and Iranian APT Groups Targeted US Presidential Campaigns ๐Ÿ•ด

Google analysts report advanced persistent threat groups linked to China and Iran launched phishing attacks against the Biden and Trump campaigns.

๐Ÿ“– Read

via "Dark Reading: ".