πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” FBI warns about cybercriminals exploiting mobile banking apps πŸ”

With increased use, phony apps and banking trojans will try to steal account credentials, according to the FBI.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Siemens and SparkCognition unveil AI-driven cybersecurity solution for ICS endpoints πŸ”

DeepArmor Industrial, fortified by Siemens, increases operational visibility, improves malware detection, and provides protection across a company's fleet of industrial control systems and end points.

πŸ“– Read

via "Security on TechRepublic".
❌ Kubernetes Falls to Cryptomining via Machine-Learning Framework ❌

Misconfigured dashboards are at the heart of a widespread XMRIG Monero-mining campaign.

πŸ“– Read

via "Threatpost".
πŸ” Ad Industry Still Wary of CCPA πŸ”

A handful of advertising trade groups are voicing their dissatisfaction with the CCPA's final proposed regulations, which were sent for review last week.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Two-factor authentication: A cheat sheet πŸ”

A password alone will not protect sensitive information from hackers--two-factor authentication is also necessary. Here's what security pros and users need to know about two-factor authentication.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Protocol Vulnerability Threatens Mobile Networks πŸ•΄

A vuln in the GTP protocol could allow DoS, fraud, and data theft attacks against cellular networks from virtually anywhere.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybersecurity pros are working harder than ever during the pandemic πŸ”

The COVID-19 pandemic has affected many tech career fields. Learn how it has impacted cybersecurity professionals, and how to help.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Outlook Users Targeted By Gamaredon’s New VBA Macro ❌

The Gamaredon APT has started using a new VBA macro to target Microsoft Outlook victims' contact lists.

πŸ“– Read

via "Threatpost".
❌ Black Lives Matter Emails Deliver TrickBot Malware ❌

Malspam emails are claiming to deliver a survey on BLM -- but in reality they deliver the infamous banking trojan.

πŸ“– Read

via "Threatpost".
πŸ•΄ FBI Says Sudden Increase in Mobile Banking Is Heightening Risks For Users πŸ•΄

Mobile malware and fake apps purporting to be legitimate banking software are big risks, law enforcement agency says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ ICS Threat Snake Ransomware Suspected in Honda Attack πŸ•΄

An attack targeting the automaker reportedly infected internal servers and led to the suspension of production at plants around the world.

πŸ“– Read

via "Dark Reading: ".
⚠ Twitter wants to know if you meant to share that article ⚠

In a bid to stop the spread of fake news Twitter has launched a test feature to remind users to read articles before retweeting them.

πŸ“– Read

via "Naked Security".
⚠ Facebook paid for a 0-day to help FBI unmask child predator ⚠

A third-party cybersecurity firm were paid to drill a hole in a Tor-reliant operating system to uncover a man who spent years sextorting young girls.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Future Will Be Both Agile and Hardened πŸ•΄

What COVID-19 has taught us about the digital revolution.

πŸ“– Read

via "Dark Reading: ".
πŸ” Blockchain expert discusses a world without usernames and passwords πŸ”

Ethereum co-founder Charles Hoskinson anticipates a future version of the internet that relies on new methods of authentication.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to detect network abuse with Wireshark πŸ”

With a few quick clicks, you can detect network abuse with Wireshark. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Haveged 1.9.11 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Building Security into Software πŸ•΄

Part 1 of a two-part series about securing machine learning.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Inside Stealthworker: How it Compromises WordPress, Step-by-Step πŸ•΄

A new wave of attacks using old malware is threatening WordPress sites that don't have strong password policies.

πŸ“– Read

via "Dark Reading: ".
⚠ Intel patches chip flaw that could leak your cryptographic secrets ⚠

Intel chip features that were intended to help you do cryptography better could have leaked your inner secrets.

πŸ“– Read

via "Naked Security".
❌ Android β€˜ActionSpy’ Malware Targets Turkic Minority Group ❌

Researchers warn that the Earth Empusa threat group is distributing the spyware by injecting code into fake and watering-hole pages.

πŸ“– Read

via "Threatpost".