πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Enterprise Data Security: It’s Time to Flip the Established Approach ❌

Companies should forget about auditing where data resides and who has access to it.

πŸ“– Read

via "Threatpost".
πŸ•΄ Major Flaws Open the Edge to Attack πŸ•΄

Attackers are using critical exploits for flaws in VPN appliances, app-delivery services, and other network-edge hardware and software to punch through corporate perimeters. What can companies do?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 8 Signs of a Smartphone Hack πŸ•΄

A rapidly dwindling battery life or sudden spike in data usage could indicate your iOS or Android device has been compromised.

πŸ“– Read

via "Dark Reading: ".
πŸ” CISOs discuss cybersecurity in the COVID-19 environment πŸ”

A digital panel discussion sponsored by MIT's Sloan CIO Digital Learning Series covered a range of topics from protecting remote workers to phishing to how to manage risk.

πŸ“– Read

via "Security on TechRepublic".
⚠ Apple’s latest updates are out for iPhones and Macs – get them now! ⚠

None of Apple's bugs have nicknames like Microsoft's recent "SIGRed" - but there are nevertheless kernel-level code holes to be patched...

πŸ“– Read

via "Naked Security".
πŸ” How to install Malware Information Sharing Platform on Ubuntu Server 18.04 πŸ”

If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.

πŸ“– Read

via "Security on TechRepublic".
❌ CISA Emergency Directive Orders Immediate Fix of Windows DNS Server Bug ❌

An emergency directive orders some federal agencies to apply Microsoft’s patch for a critical DNS vulnerability by Friday, July 17 at 2 p.m. (ET).

πŸ“– Read

via "Threatpost".
πŸ” Phishing: Email fraudsters are impersonating colleagues, customers, and vendors, report says πŸ”

Nearly a third of professionals said they have to remediate email-based attacks every day, GreatHorn found.

πŸ“– Read

via "Security on TechRepublic".
❌ Twitter Hack Update: What We Know (and What We Don’t) ❌

With limited confirmed information, a raft of theories and circumstantial evidence has come to light as to who was behind the attack and how they carried it out.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybercriminals Targeted Streaming Services to Provide Pandemic Entertainment πŸ•΄

Prior to 2020, about 1 in 5 credential attacks targeted video services, but that's nothing compared to the first quarter of 2020, according to newly published data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Election Security: Recovering from 2016, Looking Toward 2020 πŸ•΄

Researchers publish the results of a four-year investigation and discuss whether the US is ready to secure its largest elections.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 7/17 Edition πŸ”

US Secret Service forms a cyber fraud task force, Twitter deals with the hacking of high-profile Twitter accounts, and more - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ›  Sifter 8.5 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SMB12 Information Gathering πŸ› 

SMB12 Information Gathering is a data gathering python script that inspects SMB1 and SMB2 endpoints. It will extract various attributes from the remote server such as OS version (only supported by SMB1 as per protocol definition), DNS computer name, DNS domain name, NetBIOS computer name and NetBIOS domain name (SMB1 and SMB2).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover ❌

Less than 500 machines have been patched since U.S. Cyber Command issued an alert to patch a critical bug that's under active exploit.

πŸ“– Read

via "Threatpost".
πŸ•΄ Emotet Lives! πŸ•΄

Emotet malware has back to action after a four-month hiatus that allowed cybersecurity experts to worry about other things.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-4090

"HCL Campaign is vulnerable to cross-site scripting when a user provides XSS scripts in Campaign Description field."

πŸ“– Read

via "National Vulnerability Database".
πŸ” This new open source project could be key to securing database applications πŸ”

Commentary: Cyral has been on a roll with two open source projects designed to make security a natural part of the development workflow.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-12000

HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot stories of the week ⚠

Catch up on the past week's stories, and watch our latest Naked Security Live video.

πŸ“– Read

via "Naked Security".
πŸ” Microsoft Defender ATP for Android: This security software can help protect your devices and data πŸ”

Microsoft recently announced its first Android security tooling. But what is it for, and should you deploy it to your users?

πŸ“– Read

via "Security on TechRepublic".