πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Microsoft Edge, Google Chrome Roll Out Password Protection Tools ❌

The new tools on Chrome and Edge will make it easier for browser users to discover - and change - compromised passwords.

πŸ“– Read

via "Threat Post".
🦿 Microsoft President urges tech leaders to follow lessons from Apollo missions and "War Games" 🦿

President Brad Smith said that national security is threatened by the industry's inability to learn lessons from the past.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Intel Confirms Unauthorized Access of Earnings-Related Data πŸ•΄

News likely contributed to slide of over 9% in chipmaker's stock at one point Friday.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Comparing Different AI Approaches to Email Security πŸ•΄

Get to know the difference between "supervised" and "unsupervised" machine learning.

πŸ“– Read

via "Dark Reading".
πŸ›  AIDE 0.17 πŸ› 

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Logwatch 7.5.5 πŸ› 

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

πŸ“– Read

via "Packet Storm Security".
⚠ US administration adds β€œsubliminal” ad to White House website ⚠

Hiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!

πŸ“– Read

via "Naked Security".
πŸ•΄ How to Better Secure Your Microsoft 365 Environment πŸ•΄

Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments.

πŸ“– Read

via "Dark Reading".
⚠ Naked Security Live – Don’t let digital jokes turn into digital disasters ⚠

Here's the latest Naked Security Live video - watch and enjoy!

πŸ“– Read

via "Naked Security".
🦿 2021 predictions: Quantifying and prioritizing cyber and business risk 🦿

Every new year brings new challenges surrounding risk management. Learn how to protect your company and its assets with these tips from an industry insider.

πŸ“– Read

via "Tech Republic".
🦿 Analysts question viability of last-minute executive order from Trump on IaaS companies' foreign users 🦿

In response to the Solar Winds attack, the order forces cloud companies to keep the names, addresses, emails, credit card numbers, and more, any time cloud services are used.

πŸ“– Read

via "Tech Republic".
❌ SonicWall Breach Stems from β€˜Probable’ Zero-Days ❌

The security vendor is investigating potential zero-day vulnerabilities in its Secure Mobile Access (SMA) 100 series.

πŸ“– Read

via "Threat Post".
❌ Cisco DNA Center Bug Opens Enterprises to Remote Attack ❌

The high-severity security vulnerability (CVE-2021-1257) allows cross-site request forgery (CSRF) attacks.

πŸ“– Read

via "Threat Post".
🦿 Homebrew: How to install post-exploitation tools on macOS 🦿

We'll guide you through the process of using Homebrew package manager to install post-exploit security tools on macOS to further assess compromised system vulnerabilities found in your Apple equipment.

πŸ“– Read

via "Tech Republic".
πŸ” The Most Read Data Insider Blogs of 2020 πŸ”

SOX compliance, preventing social engineering attacks, and data classification. In this blog, we count down the most read blogs of 2020.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Small Security Teams Have Big Security Fears, CISOs Report πŸ•΄

Researchers poll security leaders who are tasked with protecting large organizations but have a small presence and budget.

πŸ“– Read

via "Dark Reading".
❌ 2.28M MeetMindful Daters Compromised in Data Breach ❌

The ShinyHunters hacking group offer a raft of information, from location and contact info to dating preferences and bodily descriptions, as a free download.

πŸ“– Read

via "Threat Post".
🦿 Gartner: The future of AI is not as rosy as some might think 🦿

A Gartner report predicts that the second-order consequences of widespread AI will have massive societal impacts, to the point of making us unsure if and when we can trust our own eyes.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-21272 β€Ό

ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.

πŸ“– Read

via "National Vulnerability Database".
❌ Outgoing FCC Chair Issues Final Security Salvo Against China ❌

Ajit Pai says Chinese telecom companies β€˜biggest national security threat’ for regulators in exit interview.

πŸ“– Read

via "Threat Post".
πŸ•΄ Deloitte & Touche Buys Threat-Hunting Firm πŸ•΄

Root9B (R9B) offers threat hunting and other managed security services.

πŸ“– Read

via "Dark Reading".