πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ FBI Says Sudden Increase in Mobile Banking Is Heightening Risks For Users πŸ•΄

Mobile malware and fake apps purporting to be legitimate banking software are big risks, law enforcement agency says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ ICS Threat Snake Ransomware Suspected in Honda Attack πŸ•΄

An attack targeting the automaker reportedly infected internal servers and led to the suspension of production at plants around the world.

πŸ“– Read

via "Dark Reading: ".
⚠ Twitter wants to know if you meant to share that article ⚠

In a bid to stop the spread of fake news Twitter has launched a test feature to remind users to read articles before retweeting them.

πŸ“– Read

via "Naked Security".
⚠ Facebook paid for a 0-day to help FBI unmask child predator ⚠

A third-party cybersecurity firm were paid to drill a hole in a Tor-reliant operating system to uncover a man who spent years sextorting young girls.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Future Will Be Both Agile and Hardened πŸ•΄

What COVID-19 has taught us about the digital revolution.

πŸ“– Read

via "Dark Reading: ".
πŸ” Blockchain expert discusses a world without usernames and passwords πŸ”

Ethereum co-founder Charles Hoskinson anticipates a future version of the internet that relies on new methods of authentication.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to detect network abuse with Wireshark πŸ”

With a few quick clicks, you can detect network abuse with Wireshark. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Haveged 1.9.11 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Building Security into Software πŸ•΄

Part 1 of a two-part series about securing machine learning.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Inside Stealthworker: How it Compromises WordPress, Step-by-Step πŸ•΄

A new wave of attacks using old malware is threatening WordPress sites that don't have strong password policies.

πŸ“– Read

via "Dark Reading: ".
⚠ Intel patches chip flaw that could leak your cryptographic secrets ⚠

Intel chip features that were intended to help you do cryptography better could have leaked your inner secrets.

πŸ“– Read

via "Naked Security".
❌ Android β€˜ActionSpy’ Malware Targets Turkic Minority Group ❌

Researchers warn that the Earth Empusa threat group is distributing the spyware by injecting code into fake and watering-hole pages.

πŸ“– Read

via "Threatpost".
❌ Microsoft Joins Ban on Sale of Facial Recognition Tech to Police ❌

Microsoft has joined Amazon and IBM in banning the sale of facial recognition technology to police departments and pushing for federal laws to regulate the technology.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 Must-Haves for a Rockin' Red Team πŸ•΄

Follow these tips for running red-team exercises that will deliver added insight into your operations.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 6/12 Edition πŸ”

A new malware strain is targeting Linux and Windows systems, mobile banking apps potentially targeted by hackers, and the city of Knoxville suffers a ransomware attack - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Knoxville Pulls IT Systems Offline Following Ransomware Attack πŸ•΄

Knoxville's government took its network offline and turned off infected servers and workstations after a ransomware attack this week.

πŸ“– Read

via "Dark Reading: ".
πŸ” Dell report details rise in cyberattacks and disruptive events πŸ”

A new report focuses on a surge in cyberattacks and other disruptions during the coronavirus pandemic and the costs of these events.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Honeypot reveals tactics used by cybercriminals to deploy ransomware πŸ”

A honeypot created by Cybereason to lure cybercriminals and analyze their methods showed that ransomware attacks infiltrate their victims in multiple stages.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Report: Most companies unaware of third-party IOT security measures πŸ”

Only 37% of "high performer" organizations monitor the risk of IoT devices used by third parties, and current IoT risk-management programs can't keep pace, study said.

πŸ“– Read

via "Security on TechRepublic".
❌ Knoxville Ransomware Attack Leads to IT Network Shutdown ❌

The ransomware attack hit the Tennessee city of Knoxville this week, causing disruptions in various services.

πŸ“– Read

via "Threatpost".
πŸ•΄ 15 Individuals Plead Guilty to Multimillion-Dollar Online Auction Fraud Scheme πŸ•΄

Members of Romanian gang used fraudulent ads for nonexistent products to extract money from US Internet users, DoJ says.

πŸ“– Read

via "Dark Reading: ".