πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage' πŸ•΄

In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Iran Caught Targeting US Presidential Campaign Accounts πŸ•΄

Microsoft detected the so-called Phosphorus nation-state gang attacking 241 user accounts associated with a US presidential campaign, current and former US government officials, journalists, others.

πŸ“– Read

via "Dark Reading: ".
πŸ›  WhatWeb Scanner 0.5.0 πŸ› 

WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Zeek 3.0.0 (Formerly Known As Bro) πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Monday review – the hot 22 stories of the week ⚠

From the hacker's folks who whisked away his stolen crypto to the O.MG! evil lightning cable - and all the top security stories in between.

πŸ“– Read

via "Naked Security".
⚠ Wi-Fi signals let researchers ID people through walls from their gait ⚠

Police could set up transceivers outside a building and compare spectrograms of suspects walking vs. crime scene footage.

πŸ“– Read

via "Naked Security".
⚠ Social media platforms can be forced to delete illegal content worldwide ⚠

The EU's top court ruled that platforms like Facebook can be ordered to proactively seek out and delete all copies of illegal content.

πŸ“– Read

via "Naked Security".
⚠ Facebook urged by governments to halt end-to-end encryption plans ⚠

The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.

πŸ“– Read

via "Naked Security".
⚠ Android devices hit by zero-day exploit Google thought it had patched ⚠

Android smartphones have recently become vulnerable to a zero-day vulnerability that Google thought it had patched for good two years ago.

πŸ“– Read

via "Naked Security".
❌ Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says ❌

A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign.

πŸ“– Read

via "Threatpost".
πŸ•΄ 10 Steps to Assess SOC Maturity in SMBs πŸ•΄

Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.

πŸ“– Read

via "Dark Reading: ".
πŸ” Shifting allegiances of hackers causing confusion for defense efforts πŸ”

According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Nevada's New Consumer Privacy Law Goes Into Effect πŸ”

Nevada's new privacy law requires websites to post a privacy notice and allow consumers to opt out of the sale of their personal data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Alabama Hospitals Pay Up in Ransomware Attack ❌

A trio of Alabama hospitals have decided to pay for a decryption key.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 things to know about the splinternet πŸ”

As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 things to know about the splinternet πŸ”

As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Magecart Skimmers Spotted on 2M Websites πŸ•΄

Researchers say supply chain attacks are responsible for the most significant spikes in Magecart detections.

πŸ“– Read

via "Dark Reading: ".
❌ D-Link Home Routers Open to Remote Takeover Will Remain Unpatched ❌

CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Active Directory Security Tips for Your Poor, Neglected AD πŸ•΄

The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybercriminals using gifs to corrupt Drupal sites πŸ”

Hackers are taking advantage of vulnerabilities in the Drupal CMS platform by using malicious code disguised as gifs.

πŸ“– Read

via "Security on TechRepublic".