β Mac Cryptocurrency Traders Targeted by Trojanized Apps β
π Read
via "Threatpost".
Four trojanized cryptocurrency trading apps have been found spreading malware that drains cryptocurrency wallets and collects Mac users' browsing data.π Read
via "Threatpost".
Threat Post
Mac Cryptocurrency Traders Targeted by Trojanized Apps
Four trojanized cryptocurrency trading apps have been found spreading malware that drains cryptocurrency wallets and collects Mac users' browsing data.
β 7 VPNs that leaked their logs β the logs that βdidnβt existβ β
π Read
via "Naked Security".
Just how private is your Virtual Private Network?π Read
via "Naked Security".
Naked Security
7 VPNs that leaked their logs β logs that werenβt even supposed to exist
Just how private is your Virtual Private Network?
π Phishing attacks aim to steal sensitive data by prompting people to renew Microsoft subscription π
π Read
via "Security on TechRepublic".
The initial scam emails claim that the recipient must renew their Microsoft Office 365 subscription, says Abnormal Security.π Read
via "Security on TechRepublic".
β Facebookβs NSO Group Lawsuit Over WhatsApp Spying Set to Proceed β
π Read
via "Threatpost".
A federal judge in California ruled that the spyware vendor does not have sovereign immunity.π Read
via "Threatpost".
Threat Post
Facebookβs NSO Group Lawsuit Over WhatsApp Spying Set to Proceed
A federal judge in California ruled that the spyware vendor does not have sovereign immunity.
π΄ UK Data Privacy Legislation Cannot Be Bypassed to Limit Spread of COVID-19 π΄
π Read
via "Dark Reading: ".
The UK faces GDPR data privacy challenges regarding its COVID-19 "Test and Trace" program. Despite the importance of contact tracing, its intent to ignore privacy legislation is extremely worrying.π Read
via "Dark Reading: ".
Dark Reading
UK Data Privacy Legislation Cannot Be Bypassed to Limit Spread of COVID-19
The UK faces GDPR data privacy challenges regarding its COVID-19 Test and Trace program. Despite the importance of contact tracing, its intent to ignore privacy legislation is extremely worrying.
π nfstream 5.2.0 π
π Go!
via "Security Tool Files β Packet Storm".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
nfstream 5.2.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Scapy Packet Manipulation Tool 2.4.4rc1 π
π Go!
via "Security Tool Files β Packet Storm".
Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Scapy Packet Manipulation Tool 2.4.4rc1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ England 'Test and Trace' Program Violates GDPR Privacy Law π΄
π Read
via "Dark Reading: ".
The UK government confirms the program launched in May without a Data Protection Impact Assessment, as required under GDPR.π Read
via "Dark Reading: ".
Dark Reading
England 'Test and Trace' Program Violates GDPR Privacy Law
The UK government confirms the program launched in May without a Data Protection Impact Assessment, as required under GDPR.
π΄ Number of Reported Breaches Decrease In First Half of 2020 π΄
π Read
via "Dark Reading: ".
With the pandemic as a backdrop, publicly reported US data breaches dropped as more employees and suppliers stayed home.π Read
via "Dark Reading: ".
Dark Reading
Number of Reported Breaches Decrease In First Half of 2020
With the pandemic as a backdrop, publicly reported US data breaches dropped as more employees and suppliers stayed home.
π΄ SIGRed: What You Should Know About the Windows DNS Server Bug π΄
π Read
via "Dark Reading: ".
DNS experts share their thoughts on the wormable vulnerability and explain why it should be a high priority for businesses.π Read
via "Dark Reading: ".
Dark Reading
SIGRed: What You Should Know About the Windows DNS Server Bug
DNS experts share their thoughts on the wormable vulnerability and explain why it should be a high priority for businesses.
π΄ Internet Scan Shows Decline in Insecure Network Services π΄
π Read
via "Dark Reading: ".
While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.π Read
via "Dark Reading: ".
Dark Reading
Internet Scan Shows Decline in Insecure Network Services
While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.
π΄ Twitter Breach Highlights Privileged Account Security Issue π΄
π Read
via "Dark Reading: ".
Security incident that allowed attackers to hijack high-profile accounts suggests social media giant's controls for spotting insider abuse were not strong enough, security experts say.π Read
via "Dark Reading: ".
Dark Reading
Twitter Breach Highlights Privileged Account Security Issue
Security incident that allowed attackers to hijack high-profile accounts suggests social media giant's controls for spotting insider abuse were not strong enough, security experts say.
π Companies with poor privacy practices are 80% more apt to suffer data breach π
π Read
via "Security on TechRepublic".
Poor privacy=data breach as reported by Osano was proven July 15 when Twitter was hacked and 130 accounts--including Joe Biden's and Kanye West's--were exposed.π Read
via "Security on TechRepublic".
TechRepublic
Companies with poor privacy practices are 80% more apt to suffer data breach
Poor privacy=data breach as reported by Osano was proven July 15 when Twitter was hacked and 130 accounts--including Joe Biden's and Kanye West's--were exposed.
π Google Cloud adds 11 security features to G Suite π
π Read
via "Security on TechRepublic".
The updates include BIMI in Gmail, better protection in Meet, phishing protections in Chat, and more.π Read
via "Security on TechRepublic".
TechRepublic
Google Cloud adds 11 security features to G Suite
The updates include BIMI in Gmail, better protection in Meet, phishing protections in Chat, and more.
β Diebold ATM Terminals Jackpotted Using Machineβs Own Software β
π Read
via "Threatpost".
The company warned that cybercriminals are using a black box with proprietary code in attacks to illegally dispense cash across Europe.π Read
via "Threatpost".
Threat Post
Diebold ATM Terminals Jackpotted Using Machineβs Own Software
The company warned that cybercriminals are using a black box with proprietary code in attacks to illegally dispense cash across Europe.
π Phishing attacks hiding in Google Cloud to steal Microsoft account credentials π
π Read
via "Security on TechRepublic".
By hosting phishing pages at a legitimate cloud service, cybercriminals try to avoid arousing suspicion, says Check Point Research.π Read
via "Security on TechRepublic".
π΄ Leading Through Uncertainty: Be Proactive in Your Dark Web Intelligence Strategy π΄
π Read
via "Dark Reading: ".
Having a strong Dark Web intelligence posture helps security teams understand emerging vulnerability trends.π Read
via "Dark Reading: ".
Dark Reading
Leading Through Uncertainty: Be Proactive in Your Dark Web Intelligence Strategy
Having a strong Dark Web intelligence posture helps security teams understand emerging vulnerability trends.
π 5 apps for cleaning and speeding up your PC π
π Read
via "Security on TechRepublic".
Before you ditch your slow computer in favor of a new model, try using one of these apps to clean and speed it up.π Read
via "Security on TechRepublic".
TechRepublic
5 apps for cleaning and speeding up your PC
Before you ditch your slow computer in favor of a new model, try using one of these apps to clean and speed it up.
β Critical Adobe Photoshop Flaws Patched in Emergency Update β
π Read
via "Threatpost".
Adobe issued out-of-band patches for critical flaws tied to 12 CVEs in Photoshop and other applications.π Read
via "Threatpost".
Threat Post
Critical Adobe Photoshop Flaws Patched in Emergency Update
Adobe issued out-of-band patches for critical flaws tied to 12 CVEs in Photoshop and other applications.
π΄ G Suite Security Updates Bring New Features to Gmail, Meet & Chat π΄
π Read
via "Dark Reading: ".
New security features include support for a new standard in Gmail, phishing protection in Chat, and additional admin controls.π Read
via "Dark Reading: ".
Dark Reading
G Suite Security Updates Bring New Features to Gmail, Meet & Chat
New security features include support for a new standard in Gmail, phishing protection in Chat, and additional admin controls.
ATENTIONβΌ New - CVE-2018-21036
π Read
via "National Vulnerability Database".
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.π Read
via "National Vulnerability Database".