πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Hackers Turn to OpenDocument Format to Avoid AV Detection ❌

Malware laced OpenDocument files target Microsoft Office, OpenOffice and LibreOffice users.

πŸ“– Read

via "Threatpost".
πŸ•΄ Navigating Your First Month as a New CISO πŸ•΄

The single most important thing you can do is to start building the relationships and political capital you'll need to run your security program. Here's how.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Father of Identity Theft' Convicted on 13 Federal Counts πŸ•΄

James Jackson, a 58-year-old Memphis resident, used the identities of deceased individuals to steal money from banks and the estates of the dead.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to Find and Retain Skilled Cybersecurity Talent πŸ”

To kickoff this year’s National Cybersecurity Awareness Month we asked our VP of Cybersecurity what organizations can do to find and retain skilled cybersecurity talent.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Ransomware Attacks Leave U.S. Hospitals Turning Away Patients ❌

Ransomware attacks have crippled hospitals worldwide, forcing them to turn away patients and cancel surgeries.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Malware Campaign Targets US Petroleum Companies πŸ•΄

Attackers are using an obfuscated version of Adwind Remote Access Trojan for stealing data, Netskope says.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 tips to prevent ransomware πŸ”

Ransomware continues to present a real cybersecurity threat. Tom Merritt offers five ways you can prevent it from affecting your business.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 tips to prevent ransomware πŸ”

Ransomware continues to present a real cybersecurity threat. Tom Merritt offers five ways you can prevent it from affecting your business.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cisco Webex & Zoom Bug Lets Attackers Spy on Conference Calls πŸ•΄

The "Prying-Eye" vulnerability could let intruders scan for unprotected meeting IDs and snoop on conference calls.

πŸ“– Read

via "Dark Reading: ".
πŸ›  tcpdump 4.9.3 πŸ› 

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.10 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Haveged 1.9.8 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Hack Breaks PDF Encryption, Opens Content to Attackers ❌

PDFex can bypass encryption and password protection in most PDF readers and online validation services

πŸ“– Read

via "Threatpost".
πŸ” Two enterprise-worthy password managers: LastPass and RoboForm πŸ”

Everyone in your company needs a password manager -- and there are lots of great options. But two cross-platform tools rise above the rest, thanks to their excellent support for enterprise networks.

πŸ“– Read

via "Security on TechRepublic".
⚠ Yahoo engineer pleads guilty to hacking 6,000 women’s accounts ⚠

Reyes Daniel Ruiz went after younger women's accounts, including those of his personal friends and work colleagues, he admitted.

πŸ“– Read

via "Naked Security".
πŸ” Google: Most people still have terrible password habits πŸ”

Celebrate Cybersecurity Awareness Month by turning on two-factor authentication and replacing your "fido123" password.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ ReliaQuest Acquires Threatcare πŸ•΄

Attack simulation tool will be integrated into ReliaQuest's GreyMatter platform.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Inestimable Values of an Attacker's Mindset & Alex Trebek πŸ•΄

Akamai security architect Marc Pardee tells the story of cutting his security teeth as an NSA intern and why all cybersecurity professionals can benefit from learning how to break things.

πŸ“– Read

via "Dark Reading: ".
πŸ” Nearly 60% of businesses suffered a data breach in the past 3 years πŸ”

Some 36% of companies who haven't suffered a breach said it is likely they are unknowingly experiencing one now.

πŸ“– Read

via "Security on TechRepublic".
⚠ 218 million Words With Friends players lose data to hackers ⚠

The serial hacker GnosticPlayers is claiming to have ransacked Zynga's user data - including names, emails and passwords.

πŸ“– Read

via "Naked Security".
⚠ O.MG! Evil Lightning cable about to hit mass distribution ⚠

This malicious O.MG Lightning cable has come a long way, with extensive work on the kinds of payload it can deliver.

πŸ“– Read

via "Naked Security".