πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Google Play Malicious Apps Racked Up 335M+ Installs in September ❌

A total of 172 malicious apps were detected on Google Play in September, with more than 330 million installations.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Focus on More Disruptive Ransomware Infections πŸ•΄

Details from a campaign tracked over the past five months shows how cybercriminals are continuing to refine their strategies and attempting to adjust to victims' resolve to not pay ransoms.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat Europe 2019 Debuts First Sessions & Offers Early Reg Discount πŸ•΄

You can now register to attend Black Hat Europe at a discounted rate but move quickly: the early bird discount period ends this Friday, October 4th!

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cost of Data Breach Hits $1.4M, Security Budgets Near $19M πŸ•΄

Researchers report businesses with an internal SOC suffer half the average financial damage.

πŸ“– Read

via "Dark Reading: ".
πŸ” Data breaches now cost companies an average of $1.41 million πŸ”

IT security budgets now average $18.9 million, up from $8.9 million, with savings credited to internal cybersecurity, according to new Kaspersky report.

πŸ“– Read

via "Security on TechRepublic".
❌ Hackers Turn to OpenDocument Format to Avoid AV Detection ❌

Malware laced OpenDocument files target Microsoft Office, OpenOffice and LibreOffice users.

πŸ“– Read

via "Threatpost".
πŸ•΄ Navigating Your First Month as a New CISO πŸ•΄

The single most important thing you can do is to start building the relationships and political capital you'll need to run your security program. Here's how.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Father of Identity Theft' Convicted on 13 Federal Counts πŸ•΄

James Jackson, a 58-year-old Memphis resident, used the identities of deceased individuals to steal money from banks and the estates of the dead.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to Find and Retain Skilled Cybersecurity Talent πŸ”

To kickoff this year’s National Cybersecurity Awareness Month we asked our VP of Cybersecurity what organizations can do to find and retain skilled cybersecurity talent.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Ransomware Attacks Leave U.S. Hospitals Turning Away Patients ❌

Ransomware attacks have crippled hospitals worldwide, forcing them to turn away patients and cancel surgeries.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Malware Campaign Targets US Petroleum Companies πŸ•΄

Attackers are using an obfuscated version of Adwind Remote Access Trojan for stealing data, Netskope says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 tips to prevent ransomware πŸ”

Ransomware continues to present a real cybersecurity threat. Tom Merritt offers five ways you can prevent it from affecting your business.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 tips to prevent ransomware πŸ”

Ransomware continues to present a real cybersecurity threat. Tom Merritt offers five ways you can prevent it from affecting your business.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cisco Webex & Zoom Bug Lets Attackers Spy on Conference Calls πŸ•΄

The "Prying-Eye" vulnerability could let intruders scan for unprotected meeting IDs and snoop on conference calls.

πŸ“– Read

via "Dark Reading: ".
πŸ›  tcpdump 4.9.3 πŸ› 

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.10 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Haveged 1.9.8 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Hack Breaks PDF Encryption, Opens Content to Attackers ❌

PDFex can bypass encryption and password protection in most PDF readers and online validation services

πŸ“– Read

via "Threatpost".
πŸ” Two enterprise-worthy password managers: LastPass and RoboForm πŸ”

Everyone in your company needs a password manager -- and there are lots of great options. But two cross-platform tools rise above the rest, thanks to their excellent support for enterprise networks.

πŸ“– Read

via "Security on TechRepublic".
⚠ Yahoo engineer pleads guilty to hacking 6,000 women’s accounts ⚠

Reyes Daniel Ruiz went after younger women's accounts, including those of his personal friends and work colleagues, he admitted.

πŸ“– Read

via "Naked Security".
πŸ” Google: Most people still have terrible password habits πŸ”

Celebrate Cybersecurity Awareness Month by turning on two-factor authentication and replacing your "fido123" password.

πŸ“– Read

via "Security on TechRepublic".