๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ” Report: Unskilled hackers can breach about 3 out of 4 companies ๐Ÿ”

Positive Technologies found in a recent study that criminals with few skills can hack a company in less than 30 minutes.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ Zoom Faces More Legal Challenges Over End-to-End Encryption โŒ

The video-conferencing specialist has yet to roll out full encryption, but it says it's working on it.

๐Ÿ“– Read

via "Threatpost".
โš  Tor and anonymous browsing โ€“ just how safe is it? โš 

How to stay safe when you're using Tor, even if the network is littered with rogues.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด NSA & FBI Disclose New Russian Cyberespionage Malware ๐Ÿ•ด

APT 28, aka Fancy Bear, is deploying the Drovorub malware designed for Linux systems as part of cyber-espionage operations.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Weak and infrequent cyber-crisis training is leaving companies vulnerable, new research says ๐Ÿ”

Companies are too reliant on dated software, the most essential-to-crises staff aren't required attendance at cybersecurity training, and the pandemic exacerbated problems, according to a new report.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” US and UK workers still logging 2 extra hours every day, according to VPN data ๐Ÿ”

People in Europe and Canada have gone back to the hours they were working before the coronavirus shutdown.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ›  Wireshark Analyzer 3.2.6 ๐Ÿ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
๐Ÿ•ด Secure Development Takes a (Remote) Village ๐Ÿ•ด

The shift to work from home isn't just about giving your Dev team the physical tools they need.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2020-0261

In C2 flame devices, there is a possible bypass of seccomp due to a missing configuration file. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-146059841

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Boeing's DEF CON Debut a Sign of the Times ๐Ÿ•ด

In the wake of a stalemate between the airplane manufacturer and a security researcher over vulns found in its 787 aircraft's network, Boeing says it's ready to "embrace" the hacker community.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด The Race to Hack a Satellite at DEF CON ๐Ÿ•ด

Eight teams competed to win cash, bragging rights, and the chance to control a satellite in space.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Zero trust is critical, but very underused ๐Ÿ”

Organizations must quickly adopt the zero trust mindset of "never trust, always verify" to mitigate the spread of breaches, limit access, and prevent lateral movement, according to an Illumio report.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด RedCurl APT Group Hacks Global Companies for Corporate Espionage ๐Ÿ•ด

Researchers analyze a presumably Russian-speaking APT group that has been stealing corporate data since 2018.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” New Phishing Campaign Targets SBA COVID-19 Loan Relief Accounts ๐Ÿ”

Scams targeting small businesses are unfortunately commonplace these days. The latest attempts to phish business owners' SBA loan relief logins.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
โŒ CactusPete APT Hones Toolset, Resurfaces with New Espionage Targets โŒ

The APT is becoming more sophisticated over time.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Business Email Compromise Attacks Involving MFA Bypass Increase ๐Ÿ•ด

Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ NSA, FBI Warn of Linux Malware Used in Espionage Attacks โŒ

A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Healthcare Industry Sees Respite From Attacks in First Half of 2020 ๐Ÿ•ด

Breach disclosures are down, and reported ransomware attacks have also plummeted. Good news -- or a calm before the storm?

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด CISA Warns of Phishing Campaign with Loan-Relief Lure ๐Ÿ•ด

Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2019-20383

ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.

๐Ÿ“– Read

via "National Vulnerability Database".