πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How poor security practices from remote employees are wasting the time of IT staff πŸ”

Along with the independence remote work affords employees comes the use of shadow IT and poor password practices, according to a new survey by 1Password.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Study finds misconfigured cloud storage services in 93% of cloud deployments analyzed πŸ”

An Accurics study said cloud breaches will likely increase in velocity and scale as more enterprises move to the cloud.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Securing IoT as a Remote Workforce Strategy πŸ•΄

Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-20001

An issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.

πŸ“– Read

via "National Vulnerability Database".
❌ Twitter Could Face $250M FTC Fine Over Improper Data Use ❌

The potential FTC fine comes after Twitter last year acknowledged that user emails and phone numbers were being used for targeted advertising.

πŸ“– Read

via "Threatpost".
πŸ›  Sifter 9.2 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.8 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Google & Amazon Replace Apple as Phishers' Favorite Brands πŸ•΄

Google and Amazon were the most imitated brands in the second quarter, knocking out Apple.

πŸ“– Read

via "Dark Reading: ".
πŸ” Google and Amazon most impersonated brands in phishing attacks πŸ”

WhatsApp, Facebook, and Microsoft rounded out the top five as the most spoofed brands last quarter, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Retooling the SOC for a Post-COVID World πŸ•΄

Residual work-from-home policies will require changes to security policies, procedures, and technologies.

πŸ“– Read

via "Dark Reading: ".
❌ Newsletter WordPress Plugin Opens Door to Site Takeover ❌

An XSS bug and a PHP object-injection vulnerability are present in a plugin used by hundreds of thousands of websites.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Dangerous Defaults Attackers Love (and You Should Know) πŸ•΄

Default configurations can be massive vulnerabilities. Here are a half dozen to check on for your network.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Spin on a Longtime DNS Intel Tool πŸ•΄

Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.

πŸ“– Read

via "Dark Reading: ".
πŸ” Trade Secret Theft Case Involving Pharma Giant Can Move Forward πŸ”

An ex-worker who allegedly stole hundreds of company files had previously attempted to dismiss the lawsuit.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ New Spin on a Longtime DNS Intel Tool πŸ•΄

Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why multi-factor authentication should be set up for all your services and devices πŸ”

More than ever, now is the time to make absolutely sure that your services and devices are using the best protection available to keep data secured and away from unauthorized hands.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-13523

An exploitable information disclosure vulnerability exists in SoftPerfectÒ€ℒs RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
❌ NetWalker Ransomware Rakes in $29M Since March ❌

The ransomware has surged since moving to a RaaS model.

πŸ“– Read

via "Threatpost".
πŸ•΄ How Ransomware Threats Are Evolving & How to Spot Them πŸ•΄

A series of new reports explains how ransomware attackers are changing techniques and how organizations can spot stealthy criminals.

πŸ“– Read

via "Dark Reading: ".