πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Blockchain expert discusses a world without usernames and passwords πŸ”

Ethereum co-founder Charles Hoskinson anticipates a future version of the internet that relies on new methods of authentication.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to detect network abuse with Wireshark πŸ”

With a few quick clicks, you can detect network abuse with Wireshark. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Haveged 1.9.11 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Building Security into Software πŸ•΄

Part 1 of a two-part series about securing machine learning.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Inside Stealthworker: How it Compromises WordPress, Step-by-Step πŸ•΄

A new wave of attacks using old malware is threatening WordPress sites that don't have strong password policies.

πŸ“– Read

via "Dark Reading: ".
⚠ Intel patches chip flaw that could leak your cryptographic secrets ⚠

Intel chip features that were intended to help you do cryptography better could have leaked your inner secrets.

πŸ“– Read

via "Naked Security".
❌ Android β€˜ActionSpy’ Malware Targets Turkic Minority Group ❌

Researchers warn that the Earth Empusa threat group is distributing the spyware by injecting code into fake and watering-hole pages.

πŸ“– Read

via "Threatpost".
❌ Microsoft Joins Ban on Sale of Facial Recognition Tech to Police ❌

Microsoft has joined Amazon and IBM in banning the sale of facial recognition technology to police departments and pushing for federal laws to regulate the technology.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 Must-Haves for a Rockin' Red Team πŸ•΄

Follow these tips for running red-team exercises that will deliver added insight into your operations.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 6/12 Edition πŸ”

A new malware strain is targeting Linux and Windows systems, mobile banking apps potentially targeted by hackers, and the city of Knoxville suffers a ransomware attack - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Knoxville Pulls IT Systems Offline Following Ransomware Attack πŸ•΄

Knoxville's government took its network offline and turned off infected servers and workstations after a ransomware attack this week.

πŸ“– Read

via "Dark Reading: ".
πŸ” Dell report details rise in cyberattacks and disruptive events πŸ”

A new report focuses on a surge in cyberattacks and other disruptions during the coronavirus pandemic and the costs of these events.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Honeypot reveals tactics used by cybercriminals to deploy ransomware πŸ”

A honeypot created by Cybereason to lure cybercriminals and analyze their methods showed that ransomware attacks infiltrate their victims in multiple stages.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Report: Most companies unaware of third-party IOT security measures πŸ”

Only 37% of "high performer" organizations monitor the risk of IoT devices used by third parties, and current IoT risk-management programs can't keep pace, study said.

πŸ“– Read

via "Security on TechRepublic".
❌ Knoxville Ransomware Attack Leads to IT Network Shutdown ❌

The ransomware attack hit the Tennessee city of Knoxville this week, causing disruptions in various services.

πŸ“– Read

via "Threatpost".
πŸ•΄ 15 Individuals Plead Guilty to Multimillion-Dollar Online Auction Fraud Scheme πŸ•΄

Members of Romanian gang used fraudulent ads for nonexistent products to extract money from US Internet users, DoJ says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cryptominers Found in Azure Kubernetes Containers πŸ•΄

Images from a public repository contained cryptominers that Microsoft researchers found in Kubeflow instances running on Azure.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-15123

The Branding Module in Viki Vera 4.9.1.26180 allows an authenticated user to change the logo on the website. An attacker could use this to upload a malicious .aspx file and gain Remote Code Execution on the site.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-16252

Missing SSL Certificate Validation in the Nutfind.com application through 3.9.12 for Android allows a man-in-the-middle attacker to sniff and manipulate all API requests, including login credentials and location data.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Expert Insight - test πŸ•΄

Creating a culture of supporting and advancing women is no small feat, but it's worth the challenge. Start with yourself. Here's how.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – the hot 13 stories of the week ⚠

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".