πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to install Malware Information Sharing Platform on Ubuntu Server 18.04 πŸ”

If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 'Transparent Tribe' APT Group Deploys New Android Spyware for Cyber Espionage πŸ•΄

The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India.

πŸ“– Read

via "Dark Reading: ".
πŸ” Local governments continue to be the biggest target for ransomware attacks πŸ”

Small municipalities suffer the majority of ransomware, but they aren't the only ones suffering as ransoms rise and payouts become more common.

πŸ“– Read

via "Security on TechRepublic".
❌ Revamped Qbot Trojan Packs New Punch: Hijacks Email Threads ❌

New version of trojan is spreading fast and already has claimed 100,000 victims globally, Check Point has discovered.

πŸ“– Read

via "Threatpost".
❌ Malicious Attachments Remain a Cybercriminal Threat Vector Favorite ❌

Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.

πŸ“– Read

via "Threatpost".
πŸ” What a year of penetration testing data can reveal about the state of cybersecurity πŸ”

From web app flaws to a lack of 2FA, Rapid7 found lots of common soft targets in the networks it breached on behalf of clients.

πŸ“– Read

via "Security on TechRepublic".
⚠ Russian cybercrime suspect arrested in $1m ransomware conspiracy ⚠

When ransomware hits, there are always 3 questions. How much? Did they pay? And the big one: How did the crooks get in?

πŸ“– Read

via "Naked Security".
❌ Magecart’s Success Paves Way For Cybercriminal Credit Card β€˜Sniffer’ Market ❌

Magecart's successes have led to threat actors actively advertising 'sniffers' that can be injected into e-commerce websites in order to exfiltrate payment cards.

πŸ“– Read

via "Threatpost".
πŸ•΄ How CISOs Can Play a New Role in Defining the Future of Work πŸ•΄

Rather than just reacting to security issues in the COVID-19 era, CISOs are now in a position to be change agents alongside their C-suite peers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Qbot trojan hijacking email threads to carry out phishing campaigns πŸ”

The latest variant of this trojan extracts email threads from Outlook, which it uses for phishing attacks, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  I2P 0.9.47 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  GNU Privacy Guard 2.2.22 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Facebook Hits Back At Apple’s iOS 14 Privacy Update ❌

While privacy experts praised Apple’s upcoming iOS 14 updates, Facebook said the new features could cut its advertising business in half.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Inside Threat from Psychological Manipulators πŸ•΄

How internal manipulators can actually degrade your organization's cyber defense, and how to defend against them.

πŸ“– Read

via "Dark Reading: ".
πŸ” Digital Guardian Named A Top Player in the Most Recent Data Loss Prevention Market Quadrant πŸ”

Digital Guardian has been named a β€œTop Player” in The Radicati Group’s Data Loss Prevention Market Quadrant, which the most up to date market quadrant for enterprise DLP in the industry.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How state and local governments can better combat cyberattacks πŸ”

Government agencies can suffer from differences in funding, a lack of standard policies, and other issues that affect security, says BlueVoyant.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Fastly to Acquire Signal Sciences for $775M πŸ•΄

Signal Sciences' technology will be used to build a new web application and API security tool called Secure@Edge.

πŸ“– Read

via "Dark Reading: ".
πŸ” How the pandemic and remote work initiatives forced organizations to change IT priorities πŸ”

Global tech professionals reveal recruiting projects fueled by budgets prioritizing staff education, according to a recent IT trends report from Netwrix.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why Vivaldi outshines all other browsers' history management πŸ”

If you're serious about managing your browser's history, Vivaldi makes this task incredibly easy. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ” North Korean hackers are actively robbing banks around the world, US government warns πŸ”

The BeagleBoyz have made off with nearly $2 billion since 2015, and they're back to attacking financial institutions after a short lull in activity.

πŸ“– Read

via "Security on TechRepublic".