πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ h2c Smuggling: A New 'Devastating' Kind of HTTP Request Smuggling πŸ•΄

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, say researchers. Here's what infosec pros should know.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against brute-force attacks πŸ”

Cybersecurity is critical. With the shift toward remote work, brute-force attacks are increasingly targeting accounts that use Microsoft's Remote Desktop Protocol, says NordVPN Teams.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  nfstream 6.1.1 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ DDoS Attacks Rose 151% in First Half of 2020 πŸ•΄

Attacks grew in number, size, and sophistication as the coronavirus pandemic took hold.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Likely Links Emerge Between Lazarus Group and Russian-Speaking Cybercriminals πŸ•΄

Researchers examine security incidents over the past several years that seemingly connect North Korea's Lazarus Group with Russian-speaking attackers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What's on Your Enterprise Network? You Might be Surprised πŸ•΄

The strangest connected devices are showing up, and the threats they pose to security should not be overlooked.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-12787

Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.

πŸ“– Read

via "National Vulnerability Database".
⚠ Zerologon – hacking Windows servers with a bunch of zeros ⚠

Cryptography is hard. And cryptographic blunders can be hard to spot. This one was there for years...

πŸ“– Read

via "Naked Security".
πŸ•΄ h2c Smuggling: A New 'Devastating' Kind of HTTP Request πŸ•΄

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.

πŸ“– Read

via "Dark Reading: ".
πŸ” How ransomware operators are joining forces to carry out attacks πŸ”

Attackers buy stolen data from other criminals, while the Maze group publishes data captured by other gangs, says Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  nfstream 6.1.2 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ California Elementary Kids Kicked Off Online Learning by Ransomware ❌

The attack on the Newhall District in Valencia is part of a wave of ransomware attacks on the education sector, which shows no sign of dissipating.

πŸ“– Read

via "Threatpost".
πŸ•΄ How IT Security Organizations are Attacking the Cybersecurity Problem πŸ•΄

The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Struggling to Secure Remote IT? 3 Lessons from the Office πŸ•΄

The great remote work experiment has exacerbated existing challenges and exposed new gaps, but there are things to be learned from office challenges.

πŸ“– Read

via "Dark Reading: ".
❌ APT41 Operatives Indicted as Sophisticated Hacking Activity Continues ❌

Five alleged members of the China-linked advanced threat group and two associates have been indicted by a Federal grand jury, on dozens of charges.

πŸ“– Read

via "Threatpost".
❌ Google Play Bans Stalkerware and β€˜Misrepresentation’ ❌

The official app store is taking on spy- and surveillance-ware, along with apps that could be used to mount political-influence campaigns.

πŸ“– Read

via "Threatpost".
πŸ•΄ Black Hat Europe πŸ•΄

Virtual Event

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Time for CEOs to Stop Enabling China's Blatant IP Theft πŸ•΄

Protecting intellectual property in the name of US economic and national security should be part of every company's fiduciary duty.

πŸ“– Read

via "Dark Reading: ".
πŸ” DOJ Charges Two Iranians in Cyber Intrusion Campaign πŸ”

For years, the hackers infiltrated systems and targeted intellectual property and national security data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” CISOs top traits revealed in report: Improvement needed πŸ”

A new Gartner report found only 12% of chief information security officers (CISOs) met the criteria for being considered highly effective.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-0392

In getLayerDebugInfo of SurfaceFlinger.cpp, there is a possible code execution due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-150226608

πŸ“– Read

via "National Vulnerability Database".