πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Meet the Computer Scientist Who Helped Push for Paper Ballots πŸ•΄

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi.

πŸ“– Read

via "Dark Reading: ".
❌ DoJ Indicts Two Hackers for Defacing Websites with Pro-Iran Messages ❌

The two hackers allegedly hacked more than 50 websites hosted in the U.S. and vandalized them with pro-Iran messages.

πŸ“– Read

via "Threatpost".
❀1
πŸ•΄ CISA Joins MITRE to Issue Vulnerability Identifiers πŸ•΄

The Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ” My stolen credit card details were used 4,500 miles away. I tried to find out how it happened πŸ”

When cybersecurity reporter Danny Palmer found his card was apparently used on another continent, he set out to discover more.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How did my credit card details get stolen and used half the world away? πŸ”

Cybersecurity reporter Danny Palmer tells Karen Roby what he discovered when he tried to find out how someone in South America attempted to use his bank details.

πŸ“– Read

via "Security on TechRepublic".
❌ DDoS Attacks Skyrocket as Pandemic Bites ❌

More people being online during lockdowns and work-from-home shifts has proven to be lucrative for DDoS-ers.

πŸ“– Read

via "Threatpost".
πŸ•΄ 8 Reasons Perimeter Security Alone Won't Protect Your Crown Jewels πŸ•΄

Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications?

πŸ“– Read

via "Dark Reading: ".
πŸ” How to Comply with Accountability in Data Protection πŸ”

A new framework published by the UK Information Commissioner's Office can help organizations comply with the GDPR's accountability requirements.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2014-10402

An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ US Charges Five Members of China-Linked APT41 for Global Attacks πŸ•΄

The five Chinese nationals are among seven defendants arrested for intrusion campaigns into more than 100 organizations, the DoJ reports.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to Comply with Accountability in Data Protection πŸ”

A new framework published by the UK Information Commissioner's Office can help organizations comply with the GDPR's accountability requirements.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Hackers Continue Cyberattacks Against Vatican, Catholic Orgs ❌

The China-linked threat group RedDelta has continued to launch cyberattacks against Catholic institutions since May 2020 until as recently as last week.

πŸ“– Read

via "Threatpost".
πŸ•΄ Most Organizations Plan to Make COVID-19 Changes Permanent πŸ•΄

After the pandemic, companies will continue to invest in improving IT infrastructure and security as well as automate tasks to reduce errors and improve network resiliency.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ h2c Smuggling: A New 'Devastating' Kind of HTTP Request Smuggling πŸ•΄

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, say researchers. Here's what infosec pros should know.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against brute-force attacks πŸ”

Cybersecurity is critical. With the shift toward remote work, brute-force attacks are increasingly targeting accounts that use Microsoft's Remote Desktop Protocol, says NordVPN Teams.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  nfstream 6.1.1 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ DDoS Attacks Rose 151% in First Half of 2020 πŸ•΄

Attacks grew in number, size, and sophistication as the coronavirus pandemic took hold.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Likely Links Emerge Between Lazarus Group and Russian-Speaking Cybercriminals πŸ•΄

Researchers examine security incidents over the past several years that seemingly connect North Korea's Lazarus Group with Russian-speaking attackers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What's on Your Enterprise Network? You Might be Surprised πŸ•΄

The strangest connected devices are showing up, and the threats they pose to security should not be overlooked.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-12787

Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.

πŸ“– Read

via "National Vulnerability Database".
⚠ Zerologon – hacking Windows servers with a bunch of zeros ⚠

Cryptography is hard. And cryptographic blunders can be hard to spot. This one was there for years...

πŸ“– Read

via "Naked Security".