πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How Women Make Engineering Great πŸ”

On International Women in Engineering Day, our CTO Debra Danielson gives examples of female engineers who have made a profound impact and why diversity in engineering matters.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Only 31% of Americans concerned with data security, despite 400% rise in cyberattacks πŸ”

Bad actors have flooded the enterprise with coronavirus-related attacks, but professionals working from home have other worries, Unisys Security found.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Back to Basics with Cloud Permissions Management πŸ•΄

By using the AAA permissions management framework for cloud operations, organizations can address authentication, authorization, and auditing.

πŸ“– Read

via "Dark Reading: ".
❌ Work From Home Opens New Remote Insider Threats ❌

Remote work is opening up new insider threats - whether it's negligence or malicious employees - and companies are scrambling to stay on top of these unprecedented risks.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Scanning for PoS Software in New Sodinokibi Ransomware Campaign πŸ•΄

Making extra money from victims appears to be the goal, Symantec says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Twitter Says Biz Users Were Vulnerable to Data Breach πŸ•΄

The now-patched vulnerability left business users' personal information in web browser caches for anyone to find.

πŸ“– Read

via "Dark Reading: ".
❌ Sodinokibi Ransomware Now Scans Networks For PoS Systems ❌

Attackers are compromising large companies with the Cobalt Strike malware, and then deploying the Sodinokibi ransomware.

πŸ“– Read

via "Threatpost".
πŸ•΄ Twitter Says Business Users Were Vulnerable to Data Breach πŸ•΄

The now-patched vulnerability left business users' personal information in web browser caches for anyone to find.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Previews Windows Defender ATP for Android πŸ•΄

In addition, the first release of Defender ATP for Linux is now generally available.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Keystone 0.9.2 πŸ› 

Keystone is a lightweight multi-platform, multi-architecture assembler framework. Highlight features include multi-architecture, with support for Arm, Arm64 (AArch64/Armv8), Hexagon, Mips, PowerPC, Sparc, SystemZ, and X86 (include 16/32/64bit). It has a clean and lightweight architecture-neutral API. It's implemented in C/C++ languages, with bindings for Python, NodeJS, Ruby, Go and Rust available and also has native support for Windows and various Unix flavors.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ iOS 14, macOS Big Sur, Safari to give us β€˜No, thanks!’ option for ad tracking ⚠

At WWDC, Apple promised to double down on data protection in its upcoming iOS 14, macOS Big Sur, and Safari releases.

πŸ“– Read

via "Naked Security".
πŸ” Cybersecurity market grows but faces pressure amid shrinking IT budgets πŸ”

Spending on cybersecurity technology rose last quarter but will dip this year due to budgetary constraints, says Canalys.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Rethinking Enterprise Access, Post-COVID-19 πŸ•΄

New approaches will allow businesses to reduce risk while meeting the needs of users, employees, and third parties. Here are three issues to consider when reimagining enterprise application access.

πŸ“– Read

via "Dark Reading: ".
❌ Experts Denounce Racial Bias of Crime-Predictive Facial-Recognition AI ❌

An open letter signed by experts in the field from MIT, Microsoft and Google aim to stop the β€˜tech to prison’ pipeline.

πŸ“– Read

via "Threatpost".
πŸ” How IT teams have been challenged by the shift to remote working πŸ”

IT staffers have grappled with such user issues as password lockouts and an inability to access internal apps, says Hitachi ID.

πŸ“– Read

via "Security on TechRepublic".
❌ New Bill Targeting β€˜Warrant-Proof’ Encryption Draws Ire ❌

The Lawful Access to Encrypted Data Act is being decried as "an awful idea" by security experts.

πŸ“– Read

via "Threatpost".
πŸ›  Hashcat Advanced Password Recovery 6.0.0 Binary Release πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Hashcat Advanced Password Recovery 6.0.0 Source Code πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Glupteba – the bot that gets secret messages from the Bitcoin blockchain ⚠

And you thought the Bitcoin blockchain was all about cryptocurrency!

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Survey: Breach Concerns Hit Record Levels Due to COVID-19 πŸ•΄

Annual "Black Hat USA Attendee Survey" indicates unprecedented concern over possible compromises of enterprise networks and US critical infrastructure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Average Cost of a Data Breach: $116M πŸ•΄

Sensitivity of customer information and time-to-detection determine financial blowback of cybersecurity breaches.

πŸ“– Read

via "Dark Reading: ".