πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.10 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Haveged 1.9.8 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Hack Breaks PDF Encryption, Opens Content to Attackers ❌

PDFex can bypass encryption and password protection in most PDF readers and online validation services

πŸ“– Read

via "Threatpost".
πŸ” Two enterprise-worthy password managers: LastPass and RoboForm πŸ”

Everyone in your company needs a password manager -- and there are lots of great options. But two cross-platform tools rise above the rest, thanks to their excellent support for enterprise networks.

πŸ“– Read

via "Security on TechRepublic".
⚠ Yahoo engineer pleads guilty to hacking 6,000 women’s accounts ⚠

Reyes Daniel Ruiz went after younger women's accounts, including those of his personal friends and work colleagues, he admitted.

πŸ“– Read

via "Naked Security".
πŸ” Google: Most people still have terrible password habits πŸ”

Celebrate Cybersecurity Awareness Month by turning on two-factor authentication and replacing your "fido123" password.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ ReliaQuest Acquires Threatcare πŸ•΄

Attack simulation tool will be integrated into ReliaQuest's GreyMatter platform.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Inestimable Values of an Attacker's Mindset & Alex Trebek πŸ•΄

Akamai security architect Marc Pardee tells the story of cutting his security teeth as an NSA intern and why all cybersecurity professionals can benefit from learning how to break things.

πŸ“– Read

via "Dark Reading: ".
πŸ” Nearly 60% of businesses suffered a data breach in the past 3 years πŸ”

Some 36% of companies who haven't suffered a breach said it is likely they are unknowingly experiencing one now.

πŸ“– Read

via "Security on TechRepublic".
⚠ 218 million Words With Friends players lose data to hackers ⚠

The serial hacker GnosticPlayers is claiming to have ransacked Zynga's user data - including names, emails and passwords.

πŸ“– Read

via "Naked Security".
⚠ O.MG! Evil Lightning cable about to hit mass distribution ⚠

This malicious O.MG Lightning cable has come a long way, with extensive work on the kinds of payload it can deliver.

πŸ“– Read

via "Naked Security".
⚠ Exim suffers another β€˜critical’ remote code execution flaw ⚠

This latest Exim flaw could lead to at least a denial of service crash in the software but also the possibility of remote code execution.

πŸ“– Read

via "Naked Security".
πŸ•΄ Controlling Data Leakage in Cloud Test-Dev Environments πŸ•΄

The focus on digital transformation and compressing development release cycles is appealing, but that means security can be left behind. How should security practitioners address this challenge?

πŸ“– Read

via "Dark Reading: ".
πŸ” MasterMana Botnet targets business users with sophisticated phishing attacks πŸ”

A new botnet known as MasterMana shows a high level of sophistication with a low cost to execute, according a report from cybersecurity firm Prevailion.

πŸ“– Read

via "Security on TechRepublic".
❌ Google Adds Password Checkup Feature to Chrome Browser ❌

Google's new password checkup tool joins other similar services including Have I Been Pwned and Mozilla's Firefox Monitor.

πŸ“– Read

via "Threatpost".
πŸ” Yahoo porn hacking breach shows need for better security: 5 ways to protect your company πŸ”

This week, a former Yahoo employee pleaded guilty to hacking into the email accounts of more than 6,000 users, looking for porn. Companies need to protect themselves from similar security breaches. Here's what to do.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to quickly deploy a honeypot with Kali Linux πŸ”

Lure possible attackers into a trap with a Kali Linux honeypot.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to quickly deploy a honeypot with Kali Linux πŸ”

Lure possible attackers into a trap with a Kali Linux honeypot.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Private Are You? πŸ•΄

Think twice before posting about ... grits.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ MasterMana Botnet Shows Trouble Comes at Low Cost πŸ•΄

For less than $200, attackers were able to infect thousands of systems, stealing user credentials, cryptocurrency wallets, and web histories, an analysis finds.

πŸ“– Read

via "Dark Reading: ".