πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  SMB12 Information Gathering πŸ› 

SMB12 Information Gathering is a data gathering python script that inspects SMB1 and SMB2 endpoints. It will extract various attributes from the remote server such as OS version (only supported by SMB1 as per protocol definition), DNS computer name, DNS domain name, NetBIOS computer name and NetBIOS domain name (SMB1 and SMB2).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover ❌

Less than 500 machines have been patched since U.S. Cyber Command issued an alert to patch a critical bug that's under active exploit.

πŸ“– Read

via "Threatpost".
πŸ•΄ Emotet Lives! πŸ•΄

Emotet malware has back to action after a four-month hiatus that allowed cybersecurity experts to worry about other things.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-4090

"HCL Campaign is vulnerable to cross-site scripting when a user provides XSS scripts in Campaign Description field."

πŸ“– Read

via "National Vulnerability Database".
πŸ” This new open source project could be key to securing database applications πŸ”

Commentary: Cyral has been on a roll with two open source projects designed to make security a natural part of the development workflow.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-12000

HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot stories of the week ⚠

Catch up on the past week's stories, and watch our latest Naked Security Live video.

πŸ“– Read

via "Naked Security".
πŸ” Microsoft Defender ATP for Android: This security software can help protect your devices and data πŸ”

Microsoft recently announced its first Android security tooling. But what is it for, and should you deploy it to your users?

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Keys for a Safe Return to the Post-Coronavirus Office πŸ•΄

Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.

πŸ“– Read

via "Dark Reading: ".
❌ Paving the Path to Passwordless ❌

Password management tools and apps can help ease the pain of passwords, but even those don’t totally solve all of the password challenges all of the time. 

πŸ“– Read

via "Threatpost".
πŸ•΄ What Organizations Need to Know About IoT Supply Chain Risk πŸ•΄

Here are some factors organizations should consider as they look to limit the risk posed by risks like Ripple20.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybersecurity spending to grow this year but may be hit by budget constraints πŸ”

Spending on security products and services for 2020 could increase as much as 5.6%, or as little as 2.5%, depending on the economic impact of the coronavirus on IT budgets, says Canalys.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Keys for a Safe Return to the Post-Quarantine Office πŸ•΄

Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is Cloud Security? πŸ”

With more businesses running vital business computing functions in the cloud today, cloud security is a must as attackers seek to exploit vulnerabilities and gain unauthorized access to sensitive data. In this post, we’ll talk about the benefits of cloud security as well as some best practices to follow.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Mac Cryptocurrency Traders Targeted by Trojanized Apps ❌

Four trojanized cryptocurrency trading apps have been found spreading malware that drains cryptocurrency wallets and collects Mac users' browsing data.

πŸ“– Read

via "Threatpost".
⚠ 7 VPNs that leaked their logs – the logs that β€œdidn’t exist” ⚠

Just how private is your Virtual Private Network?

πŸ“– Read

via "Naked Security".
πŸ” Phishing attacks aim to steal sensitive data by prompting people to renew Microsoft subscription πŸ”

The initial scam emails claim that the recipient must renew their Microsoft Office 365 subscription, says Abnormal Security.

πŸ“– Read

via "Security on TechRepublic".
❌ Facebook’s NSO Group Lawsuit Over WhatsApp Spying Set to Proceed ❌

A federal judge in California ruled that the spyware vendor does not have sovereign immunity.

πŸ“– Read

via "Threatpost".
πŸ•΄ UK Data Privacy Legislation Cannot Be Bypassed to Limit Spread of COVID-19 πŸ•΄

The UK faces GDPR data privacy challenges regarding its COVID-19 "Test and Trace" program. Despite the importance of contact tracing, its intent to ignore privacy legislation is extremely worrying.

πŸ“– Read

via "Dark Reading: ".
πŸ›  nfstream 5.2.0 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Scapy Packet Manipulation Tool 2.4.4rc1 πŸ› 

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".