πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Malicious Attachments Remain a Cybercriminal Threat Vector Favorite ❌

Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.

πŸ“– Read

via "Threatpost".
πŸ” What a year of penetration testing data can reveal about the state of cybersecurity πŸ”

From web app flaws to a lack of 2FA, Rapid7 found lots of common soft targets in the networks it breached on behalf of clients.

πŸ“– Read

via "Security on TechRepublic".
⚠ Russian cybercrime suspect arrested in $1m ransomware conspiracy ⚠

When ransomware hits, there are always 3 questions. How much? Did they pay? And the big one: How did the crooks get in?

πŸ“– Read

via "Naked Security".
❌ Magecart’s Success Paves Way For Cybercriminal Credit Card β€˜Sniffer’ Market ❌

Magecart's successes have led to threat actors actively advertising 'sniffers' that can be injected into e-commerce websites in order to exfiltrate payment cards.

πŸ“– Read

via "Threatpost".
πŸ•΄ How CISOs Can Play a New Role in Defining the Future of Work πŸ•΄

Rather than just reacting to security issues in the COVID-19 era, CISOs are now in a position to be change agents alongside their C-suite peers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Qbot trojan hijacking email threads to carry out phishing campaigns πŸ”

The latest variant of this trojan extracts email threads from Outlook, which it uses for phishing attacks, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  I2P 0.9.47 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  GNU Privacy Guard 2.2.22 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Facebook Hits Back At Apple’s iOS 14 Privacy Update ❌

While privacy experts praised Apple’s upcoming iOS 14 updates, Facebook said the new features could cut its advertising business in half.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Inside Threat from Psychological Manipulators πŸ•΄

How internal manipulators can actually degrade your organization's cyber defense, and how to defend against them.

πŸ“– Read

via "Dark Reading: ".
πŸ” Digital Guardian Named A Top Player in the Most Recent Data Loss Prevention Market Quadrant πŸ”

Digital Guardian has been named a β€œTop Player” in The Radicati Group’s Data Loss Prevention Market Quadrant, which the most up to date market quadrant for enterprise DLP in the industry.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How state and local governments can better combat cyberattacks πŸ”

Government agencies can suffer from differences in funding, a lack of standard policies, and other issues that affect security, says BlueVoyant.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Fastly to Acquire Signal Sciences for $775M πŸ•΄

Signal Sciences' technology will be used to build a new web application and API security tool called Secure@Edge.

πŸ“– Read

via "Dark Reading: ".
πŸ” How the pandemic and remote work initiatives forced organizations to change IT priorities πŸ”

Global tech professionals reveal recruiting projects fueled by budgets prioritizing staff education, according to a recent IT trends report from Netwrix.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why Vivaldi outshines all other browsers' history management πŸ”

If you're serious about managing your browser's history, Vivaldi makes this task incredibly easy. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ” North Korean hackers are actively robbing banks around the world, US government warns πŸ”

The BeagleBoyz have made off with nearly $2 billion since 2015, and they're back to attacking financial institutions after a short lull in activity.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable guest accounts from the lock screen in Android πŸ”

If you frequently hand your phone over to others, Guest Mode is a feature you should be using on Android. Jack Wallen shows you how to access the feature from your lock screen.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Old Malware Tool Acquires New Tricks πŸ•΄

Latest version of Qbot has acquired a new feature for collecting email threads from Outlook clients.

πŸ“– Read

via "Dark Reading: ".
❌ Ex-Cisco Employee Pleads Guilty to Deleting 16K Webex Teams Accounts ❌

Former Cisco employee Sudhish Kasaba Ramesh admitted to accessing Cisco’s cloud infrastructure and deleting 16,000 Webex Teams employee accounts.

πŸ“– Read

via "Threatpost".
πŸ•΄ Vulnerability Volume Poised to Overwhelm Infosec Teams πŸ•΄

The collision of Microsoft and Oracle patches on the same day has contributed to risk and stress for organizations.

πŸ“– Read

via "Dark Reading: ".
πŸ” A quick and easy way to lock down SSH πŸ”

Anxious to get your Linux server SSH access locked down? Jack Wallen shows you one more step you can take--one that will only take seconds.

πŸ“– Read

via "Security on TechRepublic".