π GNU Privacy Guard 2.2.22 π
π Go!
via "Security Tool Files β Packet Storm".
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
GNU Privacy Guard 2.2.22 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Facebook Hits Back At Appleβs iOS 14 Privacy Update β
π Read
via "Threatpost".
While privacy experts praised Appleβs upcoming iOS 14 updates, Facebook said the new features could cut its advertising business in half.π Read
via "Threatpost".
Threat Post
Facebook Hits Back At Appleβs iOS 14 Privacy Update
While privacy experts praised Appleβs upcoming iOS 14 updates, Facebook said the new features could cut its advertising business in half.
π΄ The Inside Threat from Psychological Manipulators π΄
π Read
via "Dark Reading: ".
How internal manipulators can actually degrade your organization's cyber defense, and how to defend against them.π Read
via "Dark Reading: ".
Dark Reading
The Inside Threat from Psychological Manipulators
How internal manipulators can actually degrade your organization's cyber defense, and how to defend against them.
π Digital Guardian Named A Top Player in the Most Recent Data Loss Prevention Market Quadrant π
π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian has been named a βTop Playerβ in The Radicati Groupβs Data Loss Prevention Market Quadrant, which the most up to date market quadrant for enterprise DLP in the industry.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Digital Guardian Named A Top Player in the Most Recent Data Loss Prevention Market Quadrant
Digital Guardian has been named a βTop Playerβ in The Radicati Groupβs Data Loss Prevention Market Quadrant, which the most up to date market quadrant for enterprise DLP in the industry.
π How state and local governments can better combat cyberattacks π
π Read
via "Security on TechRepublic".
Government agencies can suffer from differences in funding, a lack of standard policies, and other issues that affect security, says BlueVoyant.π Read
via "Security on TechRepublic".
TechRepublic
How state and local governments can better combat cyberattacks
Government agencies can suffer from differences in funding, a lack of standard policies, and other issues that affect security, says BlueVoyant.
π΄ Fastly to Acquire Signal Sciences for $775M π΄
π Read
via "Dark Reading: ".
Signal Sciences' technology will be used to build a new web application and API security tool called Secure@Edge.π Read
via "Dark Reading: ".
Dark Reading
Fastly to Acquire Signal Sciences for $775M
Signal Sciences' technology will be used to build a new web application and API security tool called Secure@Edge.
π How the pandemic and remote work initiatives forced organizations to change IT priorities π
π Read
via "Security on TechRepublic".
Global tech professionals reveal recruiting projects fueled by budgets prioritizing staff education, according to a recent IT trends report from Netwrix.π Read
via "Security on TechRepublic".
TechRepublic
How the pandemic and remote work initiatives forced organizations to change IT priorities
Global tech professionals reveal recruiting projects fueled by budgets prioritizing staff education, according to a recent IT trends report from Netwrix.
π Why Vivaldi outshines all other browsers' history management π
π Read
via "Security on TechRepublic".
If you're serious about managing your browser's history, Vivaldi makes this task incredibly easy. Jack Wallen shows you how.π Read
via "Security on TechRepublic".
TechRepublic
Why Vivaldi outshines all other browsers' history management
If you're serious about managing your browser's history, Vivaldi makes this task incredibly easy. Jack Wallen shows you how.
π North Korean hackers are actively robbing banks around the world, US government warns π
π Read
via "Security on TechRepublic".
The BeagleBoyz have made off with nearly $2 billion since 2015, and they're back to attacking financial institutions after a short lull in activity.π Read
via "Security on TechRepublic".
TechRepublic
North Korean hackers are actively robbing banks around the world, US government warns
The BeagleBoyz have made off with nearly $2 billion since 2015, and they're back to attacking financial institutions after a short lull in activity.
π How to enable guest accounts from the lock screen in Android π
π Read
via "Security on TechRepublic".
If you frequently hand your phone over to others, Guest Mode is a feature you should be using on Android. Jack Wallen shows you how to access the feature from your lock screen.π Read
via "Security on TechRepublic".
TechRepublic
How to enable guest accounts from the lock screen in Android | TechRepublic
If you frequently hand your phone over to others, Guest Mode is a feature you should be using on Android. Jack Wallen shows you how to access the feature from your lock screen.
π΄ Old Malware Tool Acquires New Tricks π΄
π Read
via "Dark Reading: ".
Latest version of Qbot has acquired a new feature for collecting email threads from Outlook clients.π Read
via "Dark Reading: ".
Dark Reading
Old Malware Tool Acquires New Tricks
Latest version of Qbot has acquired a new feature for collecting email threads from Outlook clients.
β Ex-Cisco Employee Pleads Guilty to Deleting 16K Webex Teams Accounts β
π Read
via "Threatpost".
Former Cisco employee Sudhish Kasaba Ramesh admitted to accessing Ciscoβs cloud infrastructure and deleting 16,000 Webex Teams employee accounts.π Read
via "Threatpost".
Threat Post
Ex-Cisco Employee Pleads Guilty to Deleting 16K Webex Teams Accounts
Former Cisco employee Sudhish Kasaba Ramesh admitted to accessing Ciscoβs cloud infrastructure and deleting 16,000 Webex Teams employee accounts.
π΄ Vulnerability Volume Poised to Overwhelm Infosec Teams π΄
π Read
via "Dark Reading: ".
The collision of Microsoft and Oracle patches on the same day has contributed to risk and stress for organizations.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π A quick and easy way to lock down SSH π
π Read
via "Security on TechRepublic".
Anxious to get your Linux server SSH access locked down? Jack Wallen shows you one more step you can take--one that will only take seconds.π Read
via "Security on TechRepublic".
TechRepublic
A quick and easy way to lock down SSH
Anxious to get your Linux server SSH access locked down? Jack Wallen shows you one more step you can take--one that will only take seconds.
π΄ DDoS Attacks Halt NZ Exchange Trading for Third Day π΄
π Read
via "Dark Reading: ".
New Zealand Exchange officials say the motive for the attacks is unclear.π Read
via "Dark Reading: ".
Dark Reading
DDoS Attacks Halt NZ Exchange Trading for Third Day
New Zealand Exchange officials say the motive for the attacks is unclear.
π΄ Is China the World's Greatest Cyber Power? π΄
π Read
via "Dark Reading: ".
While the US, Russia, Israel, and several European nations all have sophisticated cyber capabilities, one threat intelligence firm argues that China's aggressive approach to cyber operations has made it "perhaps the world's greatest cyber power."π Read
via "Dark Reading: ".
Dark Reading
Is China the World's Greatest Cyber Power?
While the US, Russia, Israel, and several European nations all have sophisticated cyber capabilities, one threat intelligence firm argues that China's aggressive approach to cyber operations has made it perhaps the world's greatest cyber power.
ATENTIONβΌ New - CVE-2020-10518
π Read
via "National Vulnerability Database".
A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in 2.21.6, 2.20.15, and 2.19.21. The underlying issues contributing to this vulnerability were identified both internally and through the GitHub Security Bug Bounty program.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-10517
π Read
via "National Vulnerability Database".
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to determine the names of unauthorized private repositories given their numerical IDs. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in versions 2.21.6, 2.20.15, and 2.19.21. This vulnerability was reported via the GitHub Bug Bounty program.π Read
via "National Vulnerability Database".
π Microsoft just made securing Windows 10 PCs a whole lot easier for IT admins π
π Read
via "Security on TechRepublic".
New security capabilities designed for SMEs allow IT admins to apply baseline security settings across an organization.π Read
via "Security on TechRepublic".
β DoJ Aims to Seize 280 Cryptocurrency Accounts Used by Hackers β
π Read
via "Threatpost".
Complaint details collaboration with China to funnel $250m in stolen funds as part of state-sponsored attacks.π Read
via "Threatpost".
Threat Post
DoJ Aims to Seize 280 Cryptocurrency Accounts Used by Hackers
Complaint details collaboration with China to funnel $250m in stolen funds as part of state-sponsored attacks.
β Fake Android notifications β first Google, then Microsoft affected β
π Read
via "Naked Security".
Were you woken up by a bogus Android notification from Google or Microsoft this week?π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News