πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Rethinking Enterprise Access, Post-COVID-19 πŸ•΄

New approaches will allow businesses to reduce risk while meeting the needs of users, employees, and third parties. Here are three issues to consider when reimagining enterprise application access.

πŸ“– Read

via "Dark Reading: ".
❌ Experts Denounce Racial Bias of Crime-Predictive Facial-Recognition AI ❌

An open letter signed by experts in the field from MIT, Microsoft and Google aim to stop the β€˜tech to prison’ pipeline.

πŸ“– Read

via "Threatpost".
πŸ” How IT teams have been challenged by the shift to remote working πŸ”

IT staffers have grappled with such user issues as password lockouts and an inability to access internal apps, says Hitachi ID.

πŸ“– Read

via "Security on TechRepublic".
❌ New Bill Targeting β€˜Warrant-Proof’ Encryption Draws Ire ❌

The Lawful Access to Encrypted Data Act is being decried as "an awful idea" by security experts.

πŸ“– Read

via "Threatpost".
πŸ›  Hashcat Advanced Password Recovery 6.0.0 Binary Release πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Hashcat Advanced Password Recovery 6.0.0 Source Code πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Glupteba – the bot that gets secret messages from the Bitcoin blockchain ⚠

And you thought the Bitcoin blockchain was all about cryptocurrency!

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Survey: Breach Concerns Hit Record Levels Due to COVID-19 πŸ•΄

Annual "Black Hat USA Attendee Survey" indicates unprecedented concern over possible compromises of enterprise networks and US critical infrastructure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Average Cost of a Data Breach: $116M πŸ•΄

Sensitivity of customer information and time-to-detection determine financial blowback of cybersecurity breaches.

πŸ“– Read

via "Dark Reading: ".
πŸ” Increase in productivityβ€”and riskβ€”since the COVID-19 lockdown πŸ”

IT pros revealed widespread remote work garnered challenges and security concerns, according to a recent Sectigo survey.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Amazon, Apple, Wells Fargo fueling tech hiring resurgence after coronavirus economic damage πŸ”

Tech career platform Dice highlighted how data engineers and cybersecurity experts are in high demand.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Report Highlights IP Protection and Enforcement in the EU πŸ”

A report via the European Commission highlights the importance of protecting and enforcing intellectual property in the European Union.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ No Internet Access? Amid Protests, Here's How to Tell Whether the Government Is Behind it πŸ•΄

Government-mandated Internet shutdowns occur far more regularly than you might expect.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Apple Buys Fleetsmith πŸ•΄

The fleet management company becomes part of Apple in a deal announced today.

πŸ“– Read

via "Dark Reading: ".
❌ Self-Propagating Lucifer Malware Targets Windows Systems ❌

A new devilish malware is targeting Windows systems with cryptojacking and DDoS capabilities.

πŸ“– Read

via "Threatpost".
❌ Emerging Ransomware Targets Photos, Videos on Android Devices ❌

The CryCryptor malware strain is a brand-new family of threats, leveraging COVID-19 to spread.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2020-11095

In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11068

In LoRaMac-node before 4.4.4, a reception buffer overflow can happen due to the received buffer size not being checked. This has been fixed in 4.4.4.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10740

A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10736

An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10561

An issue was discovered on Xiaomi Mi Jia ink-jet printer < 3.4.6_0138. Injecting parameters to ippserver through the web management background, resulting in command execution vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".