πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Marc Rogers: Success of Anonymous Bug Submission Program β€˜Takes A Village’ ❌

Marc Rogers discusses the logistics behind a recently-proposed anonymous bug submission program, meant to encourage ethical hackers to submit high-level bugs anonymously.

πŸ“– Read

via "Threatpost".
πŸ•΄ WannaCry Detections At An All-Time High πŸ•΄

More than 12,000 variants of the infamous malware are targeting systems that are still open to the EternalBlue exploit - but the potential danger is low, Sophos warns.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Saudi IT Providers Hit in Cyber Espionage Operation πŸ•΄

Symantec identifies new 'Tortoiseshell' nation-state group as the attackers.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Packet Fence 9.1.0 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ No surprises in the top 25 most dangerous software errors ⚠

An in-depth study of reported bugs has produced a list of the top 25 bug categories in software today - with some old familiar names topping the list.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 20 Worst Metrics in Cybersecurity πŸ•΄

Security leaders are increasingly making their case through metrics, as well they should - as long as they're not one of these.

πŸ“– Read

via "Dark Reading: ".
❌ Smart TVs, Subscription Services Leak Data to Facebook, Google ❌

Researchers discovered that smart TVs from Samsung, LG and others are sending sensitive user data to partner tech firms even when devices are idle.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep9: DDoSes, privacy and network hacks – Naked Security Podcast ⚠

The latest Naked Security Podcast is live - listen now!

πŸ“– Read

via "Naked Security".
⚠ US files suit against Snowden to keep book profits out of his hands ⚠

The government, alleging that Snowden violated NDAs with the CIA and NSA, isn't looking to stop the book's publication or distribution.

πŸ“– Read

via "Naked Security".
⚠ Researchers find 737 million medical images exposed on the internet ⚠

Of the 2,300 archiving systems looked at, 590 were accessible from the internet, exposing 24 million medical records from 52 countries.

πŸ“– Read

via "Naked Security".
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
πŸ” How to handle the public disclosure of bugs and security vulnerabilities πŸ”

A full 90% of security professionals say yes, according to a poll conducted by 451 Research and commissioned by security testing company Veracode.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Yahoo data breach settlement means affected users may get $100 πŸ”

If you had a Yahoo account between January 1, 2012 and December 31, 2016, you may be entitled to a bit of money.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Crowdsourced Security & the Gig Economy πŸ•΄

Crowdsourced platforms have redefined both pentesting and the cybersecurity gig economy. Just not in a good way.

πŸ“– Read

via "Dark Reading: ".
⚠ Air Force to offer up a satellite to hackers at Defcon 2020 ⚠

This year, the Air Force presented vetted hackers with a plane's subsystem, which they duly tore up. Next year, it will be a satellite.

πŸ“– Read

via "Naked Security".
πŸ” What is Electronic Healthcare Network Accreditation Commission (EHNAC) Compliance? πŸ”

Learn about what the Electronic Healthcare Network Accreditation Commission, or EHNAC, is, its benefits, the accreditation process, and best practices in Data Protection 101, our series on the fundamentals of data security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Why businesses would rather lose revenue than data πŸ”

While businesses don't want to lose data, 66% of business decision makers said their current IT resources do not keep up with growing technological demands.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Ping Identity Prices IPO at $15 per Share πŸ•΄

The identity management company plans to sell 12.5 million shares, raising $187.5 million in its initial public offering.

πŸ“– Read

via "Dark Reading: ".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.1.6 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".