πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  UFONet 1.6 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multi-threading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Encrypted Linux x86-64 Loadable Kernel Modules (ELKM) πŸ› 

In this paper, the author presents ELKM, a Linux tool that provides a mechanism to securely transport and load encrypted Loadable Kernel Modules (LKM). The aim is to protect kernel-based rootkits and implants against observation by Endpoint Detection and Response (EDR) software and to neutralize the effects of recovery by disk forensics tooling. The tool as well as the whitepaper is provided in this archive.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  ClamOne 0.102.4-1 πŸ› 

ClamOne is an open source Linux front-end to the ClamAV Antivirus Engine. A basic graphical user interface, designed for a Desktop environment, to provide instant feedback when threats are detected on the local system. Features include configuring the clamd daemon directly from the GUI, indication of threats via visual cues as well as notifications, monitoring and updating the virus definitions, monitoring various clam-related event logs and messages, quarantining of detected threats, and visual graphing of antivirus activity.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ US liquor giant hit by ransomware – what the rest of us can do to help ⚠

If blackmailers dump data stolen from a company that refused to pay - don't even peek at the data, Reward the refusal...

πŸ“– Read

via "Naked Security".
πŸ” Credential stuffing attacks can be stopped, says Auth0 πŸ”

Stolen credentials are a thorn in any internet-facing organization's side. Auth0 claims it can reduce the effectiveness of attacks using them by 85% with its new bot detection tool.

πŸ“– Read

via "Security on TechRepublic".
❌ Large Orgs Plagued with Bugs, Face Giant Patch Backlogs ❌

Vulnerability management continues to challenge businesses, as they face tens of thousands of bugs with every scan.

πŸ“– Read

via "Threatpost".
πŸ•΄ New 'Duri' Campaign Uses HTML Smuggling to Deliver Malware πŸ•΄

Researchers who detected the attack explain what businesses should know about the HTML smuggling technique.

πŸ“– Read

via "Dark Reading: ".
❌ Researchers Warn of Active Malware Campaign Using HTML Smuggling ❌

A recently uncovered, active campaign called "Duri" makes use of HTML smuggling to deliver malware.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Campaign Combines Extortion, DDoS πŸ•΄

Latest attacks bank on the reputation of two prominent APT groups to increase the threat credibility.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Canadian Government Issues Statement on Credential-Stuffing Attacks πŸ•΄

The government is responding to threats targeting the GCKey service and CRA accounts, which are used to access federal services.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware Attack on Carnival May Have Been Its Second Compromise This Year πŸ•΄

Security vendor Prevailion says it observed signs of malicious activity on the cruise operator's network between at least February and June.

πŸ“– Read

via "Dark Reading: ".
❌ The Sounds a Key Make Can Produce 3D-Printed Replica ❌

Researchers reveal technology called SpiKey that can β€˜listen’ to the clicks a key makes in a lock and create a duplicate from the sounds.

πŸ“– Read

via "Threatpost".
❌ Airline DMARC Policies Lag, Opening Flyers to Email Fraud ❌

Up to 61 percent out of the IATA (International Air Transport Association) airline members do not have a published DMARC record.

πŸ“– Read

via "Threatpost".
πŸ•΄ Stolen Data: The Gift That Keeps on Giving πŸ•΄

Users regularly reuse logins and passwords, and data thieves are leveraging that reality to breach multiple accounts.

πŸ“– Read

via "Dark Reading: ".
πŸ” Industrial control system cybersecurity vulnerabilities are rising in 2020 πŸ”

365 ICS vulnerabilities were disclosed in the first half of the year, 75% of them are high or critical on the CVSS scale, and nearly three-quarters can be exploited remotely, according to a report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” NordVPN: How to protect your organization from DDoS attacks πŸ”

Without early threat detection, you may not know your website has been hit by a DDoS attack until it slows down or stops, says NordVPN.

πŸ“– Read

via "Security on TechRepublic".
πŸ” IBM finds vulnerability in IoT chips present in billions of devices πŸ”

Manufactured by Thales, the EHS8 module family has security flaws that could allow attackers to take total control over internet-connected industrial machines.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to restrict Nextcloud login to IP addresses πŸ”

Looking to lock down your Nextcloud instance so only certain computers can login? Jack Wallen shows you how to do just this.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How to Control Security Costs During a Down Economy πŸ•΄

Three key areas security professionals should watch when managing their budgets.

πŸ“– Read

via "Dark Reading: ".
πŸ” Ransomware Crew Ravages Liquor, Wine Company πŸ”

The parent company of some of the biggest names in liquor, including Jack Daniel's, was hit by ransomware, allowing attackers to steal 1 TB of data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".