πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” A new type of DDoS attack can amplify attack strength by more than 15,300% πŸ”

By abusing a little-known multicast protocol, attackers can launch DDoS attacks of immense power, but there may be an easy fix.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Security Startup Emerges from Stealth Mode πŸ•΄

GK8 creates proprietary platform for securing blockchain transactions, no Internet needed.

πŸ“– Read

via "Dark Reading: ".
πŸ” MITRE Releases 2019 List of Top Security Weaknesses πŸ”

MITRE has published a list of the most dangerous software errors - weaknesses that could lead to a critical vulnerability and in turn, code execution and the theft of data, if left unresolved.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ DevSecOps: Recreating Cybersecurity Culture πŸ•΄

Bringing developers and security teams together guided by a common goal requires some risk-taking. With patience and confidence, it will pay off. Here's how.

πŸ“– Read

via "Dark Reading: ".
πŸ” 1Password releases security tool designed for businesses πŸ”

1Password has created an advanced protection suite with new security tools for 1Password business users.

πŸ“– Read

via "Security on TechRepublic".
❌ Rethinking Responsibilities and Remedies in Social-Engineering Attacks ❌

The idea that humans are the weakest link shouldn't guide the thinking on social-engineering defense.

πŸ“– Read

via "Threatpost".
πŸ•΄ Github Becomes CVE Numbering Authority, Acquires Semmle πŸ•΄

Latest moves will make it much more likely that vulnerabilities in open source projects will be found and reported, GitHub says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Top 'Human Hacks' to Watch For Now πŸ•΄

Social engineering is as old as mankind. But its techniques have evolved with time. Here are the latest tricks criminals are using to dupe end users.

πŸ“– Read

via "Dark Reading: ".
❌ IRS Emails Promise a Refund But Deliver Botnet Recruitment ❌

The fake emails direct victims to log into a bogus IRS site.

πŸ“– Read

via "Threatpost".
❌ Marc Rogers: Success of Anonymous Bug Submission Program β€˜Takes A Village’ ❌

Marc Rogers discusses the logistics behind a recently-proposed anonymous bug submission program, meant to encourage ethical hackers to submit high-level bugs anonymously.

πŸ“– Read

via "Threatpost".
πŸ•΄ WannaCry Detections At An All-Time High πŸ•΄

More than 12,000 variants of the infamous malware are targeting systems that are still open to the EternalBlue exploit - but the potential danger is low, Sophos warns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Saudi IT Providers Hit in Cyber Espionage Operation πŸ•΄

Symantec identifies new 'Tortoiseshell' nation-state group as the attackers.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Packet Fence 9.1.0 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ No surprises in the top 25 most dangerous software errors ⚠

An in-depth study of reported bugs has produced a list of the top 25 bug categories in software today - with some old familiar names topping the list.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 20 Worst Metrics in Cybersecurity πŸ•΄

Security leaders are increasingly making their case through metrics, as well they should - as long as they're not one of these.

πŸ“– Read

via "Dark Reading: ".
❌ Smart TVs, Subscription Services Leak Data to Facebook, Google ❌

Researchers discovered that smart TVs from Samsung, LG and others are sending sensitive user data to partner tech firms even when devices are idle.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep9: DDoSes, privacy and network hacks – Naked Security Podcast ⚠

The latest Naked Security Podcast is live - listen now!

πŸ“– Read

via "Naked Security".
⚠ US files suit against Snowden to keep book profits out of his hands ⚠

The government, alleging that Snowden violated NDAs with the CIA and NSA, isn't looking to stop the book's publication or distribution.

πŸ“– Read

via "Naked Security".
⚠ Researchers find 737 million medical images exposed on the internet ⚠

Of the 2,300 archiving systems looked at, 590 were accessible from the internet, exposing 24 million medical records from 52 countries.

πŸ“– Read

via "Naked Security".
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".