πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 8 Ways Businesses Unknowingly Help Hackers πŸ•΄

From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep11: Fleeceware, Chrome bug and the sextortion scam that won’t die – Naked Security Podcast ⚠

Listen to the latest episode of our podcast now.

πŸ“– Read

via "Naked Security".
πŸ•΄ Cybercrime: AI's Growing Threat πŸ•΄

Cyberecurity incidents expected to rise by nearly 70% and cost $5 trillion annually by 2024.

πŸ“– Read

via "Dark Reading: ".
⚠ Buying a new laptop? Here’s how to secure it ⚠

Getting the basics right gives you a lot of protection. Here's how.

πŸ“– Read

via "Naked Security".
❌ Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier ❌

An attacker whose motives are unclear compromised an Asterisk server in a highly targeted campaign.

πŸ“– Read

via "Threatpost".
πŸ•΄ Complex Environments Cause Schools to Struggle for Passing Security Grade πŸ•΄

As ransomware attacks surge against school systems, an analysis of 1,200 K-12 institutions in North America shows complex environments and conflicting security controls.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Android 0-Day Seen Exploited in the Wild πŸ•΄

The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices.

πŸ“– Read

via "Dark Reading: ".
❌ Google Warns of Android Zero-Day Bug Under Active Attack ❌

Flaw impacts 18 Android models including Google’s flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 10/4 Edition πŸ”

News on new vulnerabilities - both in the PDF format and a network protocol, and why fighting cyber crime is a focal point of the U.S. Secret Service.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2018-11768

In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ FBI Investigates Mobile Voting Intrusion πŸ•΄

A group tried to access West Virginia's mobile voting app in 2018; now, the FBI is looking into what actually happened.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage' πŸ•΄

In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Iran Caught Targeting US Presidential Campaign Accounts πŸ•΄

Microsoft detected the so-called Phosphorus nation-state gang attacking 241 user accounts associated with a US presidential campaign, current and former US government officials, journalists, others.

πŸ“– Read

via "Dark Reading: ".
πŸ›  WhatWeb Scanner 0.5.0 πŸ› 

WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Zeek 3.0.0 (Formerly Known As Bro) πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Monday review – the hot 22 stories of the week ⚠

From the hacker's folks who whisked away his stolen crypto to the O.MG! evil lightning cable - and all the top security stories in between.

πŸ“– Read

via "Naked Security".
⚠ Wi-Fi signals let researchers ID people through walls from their gait ⚠

Police could set up transceivers outside a building and compare spectrograms of suspects walking vs. crime scene footage.

πŸ“– Read

via "Naked Security".
⚠ Social media platforms can be forced to delete illegal content worldwide ⚠

The EU's top court ruled that platforms like Facebook can be ordered to proactively seek out and delete all copies of illegal content.

πŸ“– Read

via "Naked Security".
⚠ Facebook urged by governments to halt end-to-end encryption plans ⚠

The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.

πŸ“– Read

via "Naked Security".
⚠ Android devices hit by zero-day exploit Google thought it had patched ⚠

Android smartphones have recently become vulnerable to a zero-day vulnerability that Google thought it had patched for good two years ago.

πŸ“– Read

via "Naked Security".