πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Twitter Says Business Users Were Vulnerable to Data Breach πŸ•΄

The now-patched vulnerability left business users' personal information in web browser caches for anyone to find.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Previews Windows Defender ATP for Android πŸ•΄

In addition, the first release of Defender ATP for Linux is now generally available.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Keystone 0.9.2 πŸ› 

Keystone is a lightweight multi-platform, multi-architecture assembler framework. Highlight features include multi-architecture, with support for Arm, Arm64 (AArch64/Armv8), Hexagon, Mips, PowerPC, Sparc, SystemZ, and X86 (include 16/32/64bit). It has a clean and lightweight architecture-neutral API. It's implemented in C/C++ languages, with bindings for Python, NodeJS, Ruby, Go and Rust available and also has native support for Windows and various Unix flavors.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ iOS 14, macOS Big Sur, Safari to give us β€˜No, thanks!’ option for ad tracking ⚠

At WWDC, Apple promised to double down on data protection in its upcoming iOS 14, macOS Big Sur, and Safari releases.

πŸ“– Read

via "Naked Security".
πŸ” Cybersecurity market grows but faces pressure amid shrinking IT budgets πŸ”

Spending on cybersecurity technology rose last quarter but will dip this year due to budgetary constraints, says Canalys.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Rethinking Enterprise Access, Post-COVID-19 πŸ•΄

New approaches will allow businesses to reduce risk while meeting the needs of users, employees, and third parties. Here are three issues to consider when reimagining enterprise application access.

πŸ“– Read

via "Dark Reading: ".
❌ Experts Denounce Racial Bias of Crime-Predictive Facial-Recognition AI ❌

An open letter signed by experts in the field from MIT, Microsoft and Google aim to stop the β€˜tech to prison’ pipeline.

πŸ“– Read

via "Threatpost".
πŸ” How IT teams have been challenged by the shift to remote working πŸ”

IT staffers have grappled with such user issues as password lockouts and an inability to access internal apps, says Hitachi ID.

πŸ“– Read

via "Security on TechRepublic".
❌ New Bill Targeting β€˜Warrant-Proof’ Encryption Draws Ire ❌

The Lawful Access to Encrypted Data Act is being decried as "an awful idea" by security experts.

πŸ“– Read

via "Threatpost".
πŸ›  Hashcat Advanced Password Recovery 6.0.0 Binary Release πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Hashcat Advanced Password Recovery 6.0.0 Source Code πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Glupteba – the bot that gets secret messages from the Bitcoin blockchain ⚠

And you thought the Bitcoin blockchain was all about cryptocurrency!

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Survey: Breach Concerns Hit Record Levels Due to COVID-19 πŸ•΄

Annual "Black Hat USA Attendee Survey" indicates unprecedented concern over possible compromises of enterprise networks and US critical infrastructure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Average Cost of a Data Breach: $116M πŸ•΄

Sensitivity of customer information and time-to-detection determine financial blowback of cybersecurity breaches.

πŸ“– Read

via "Dark Reading: ".
πŸ” Increase in productivityβ€”and riskβ€”since the COVID-19 lockdown πŸ”

IT pros revealed widespread remote work garnered challenges and security concerns, according to a recent Sectigo survey.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Amazon, Apple, Wells Fargo fueling tech hiring resurgence after coronavirus economic damage πŸ”

Tech career platform Dice highlighted how data engineers and cybersecurity experts are in high demand.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Report Highlights IP Protection and Enforcement in the EU πŸ”

A report via the European Commission highlights the importance of protecting and enforcing intellectual property in the European Union.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ No Internet Access? Amid Protests, Here's How to Tell Whether the Government Is Behind it πŸ•΄

Government-mandated Internet shutdowns occur far more regularly than you might expect.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Apple Buys Fleetsmith πŸ•΄

The fleet management company becomes part of Apple in a deal announced today.

πŸ“– Read

via "Dark Reading: ".
❌ Self-Propagating Lucifer Malware Targets Windows Systems ❌

A new devilish malware is targeting Windows systems with cryptojacking and DDoS capabilities.

πŸ“– Read

via "Threatpost".
❌ Emerging Ransomware Targets Photos, Videos on Android Devices ❌

The CryCryptor malware strain is a brand-new family of threats, leveraging COVID-19 to spread.

πŸ“– Read

via "Threatpost".