🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🔐 New Python-based trojan targets financial tech firms to steal sensitive data 🔐

Dubbed PyVil, the new remote access trojan goes after passwords, documents, browser cookies, and email credentials, says Cybereason.

📖 Read

via "Security on TechRepublic".
Facebook Debuts Third-Party Vulnerability Disclosure Policy

If the social-media behemoth finds a bug in another platform's code, the project has 90 days to remediate before Facebook goes public.

📖 Read

via "Threatpost".
Vulnerability Disclosure: Ethical Hackers Seek Best Practices

Cybersecurity researchers Brian Gorenc and Dustin Childs talk about the biggest vulnerability disclosure challenges in IoT and the industrial vertical.

📖 Read

via "Threatpost".
🕴 Ad Fraud: The Multi-Billion Dollar Cybercrime CISOs Might Overlook 🕴

Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.

📖 Read

via "Dark Reading: ".
🕴 Collection of Metadata -- as Done by the NSA -- Likely Unconstitutional, US Court Suggests 🕴

A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.

📖 Read

via "Dark Reading: ".
Social Media: Thwarting The Phishing-Data Goldmine

Cybercriminals can use social media in many ways in order to trick employees.

📖 Read

via "Threatpost".
🕴 Warner Music Group Admits Breach 🕴

The months-long breach hit financial details for customers.

📖 Read

via "Dark Reading: ".
🔐 Qualcomm unveils new Snapdragon processor to power 5G computers 🔐

The Snapdragon 8cx Gen 2 5G chip is designed to bring 5G to commercial and consumer Always On, Always Connected PCs. The processor supports Wi-Fi 6 and offers productivity and security benefits.

📖 Read

via "Security on TechRepublic".
🔐 What SMBs and startups can learn from securing a presidential campaign 🔐

Mayor Pete Buttigieg's former CISO and Splunk security advisor Mick Baccio explains the cybersecurity best practices he learned from protecting a presidential candidate's campaign.

📖 Read

via "Security on TechRepublic".
🔐 What SMBs and startups can learn from securing a presidential campaign 🔐

Mayor Pete Buttigieg's former CISO and Splunk security advisor Mick Baccio explains the cybersecurity best practices he learned from protecting a presidential candidate's campaign.

📖 Read

via "Security on TechRepublic".
🕴 Ad Fraud: The Multibillion-Dollar Cybercrime CISOs Might Overlook 🕴

Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.

📖 Read

via "Dark Reading: ".
🔐 How to move Google Authenticator from one iPhone or Android device to another 🔐

If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.

📖 Read

via "Security on TechRepublic".
🛠 Faraday 3.12 🛠

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🛠 GNU Privacy Guard 2.2.23 🛠

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🛠 Scapy Packet Manipulation Tool 2.4.4 🛠

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🕴 DDoS Attacks on Education Escalate in 2020 🕴

The number of DDoS attacks affecting educational resources was far higher between February and June 2020 compared with 2019.

📖 Read

via "Dark Reading: ".
🕴 How Cybercriminals Take the Fun Out of Gaming 🕴

It's all fun and games until someone loses their V-Bucks, right? Here's how cyberattackers are cheating the gaming biz -- and winning big.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2019-20916

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.

📖 Read

via "National Vulnerability Database".
🔐 Apple will release iOS 14 without this privacy feature: What iPhone users and developers need to know 🔐

The iOS 14, iPadOS 14, and tvOS 14 anti-tracking feature is on hold until early 2021 to give developers time to make the necessary changes, according to Apple.

📖 Read

via "Security on TechRepublic".
🕴 Name That Toon: Mask Out 🕴

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

📖 Read

via "Dark Reading: ".
Monday review – catch up on our latest articles and videos

Our recent articles and videos, all in one place.

📖 Read

via "Naked Security".