πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Apple Tackles Over a Dozen Bugs in its Catalina 10.15 Update ❌

Apple released fixes for Catalina and patches for iCloud and iTunes for Windows software.

πŸ“– Read

via "Threatpost".
πŸ” UT Austin launches first ever healthcare cybersecurity leadership program in the US πŸ”

With the shortage of cybersecurity professionals in the US, UT's program aims to develop individuals who can mitigate security risks in healthcare.

πŸ“– Read

via "Security on TechRepublic".
❌ Critical Microsoft Remote Desktop Flaw Fixed in Security Update ❌

Microsoft has released fixes for nine critical and 49 important vulnerabilities as part of Patch Tuesday.

πŸ“– Read

via "Threatpost".
πŸ•΄ Can the Girl Scouts Save the Moon from Cyberattack? πŸ•΄

The Girl Scouts Cyber Challenge event, later this month, pledges to give middle and high-school girls a realistic, and fun, look at cybersecurity careers.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Faraday 3.9.2 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Intimate Details on Healthcare Workers Exposed as Cloud Security Lags ❌

Ponemon survey data shows that only a third of IT staff say they take a security-first approach to data storage in the cloud.

πŸ“– Read

via "Threatpost".
πŸ•΄ NSA Issues Advisory on VPN Vulnerability Trio πŸ•΄

Vulnerabilities with Pulse Secure, Fortinet, and Palo Alto Networks VPNs are called out in the advisory.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Utilities' Operational Networks Continue to Be Vulnerable πŸ•΄

More than half of utilities have suffered an outage or data loss in the last 12 months, but only a minority of organizations seem ready for an attack that could affect operations, a survey finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Issues 9 Critical Security Patches πŸ•΄

None of the total 59 patches were for previously known vulnerabilities nor are any under active attack, Microsoft reports.

πŸ“– Read

via "Dark Reading: ".
⚠ TOMS hacker tells people to log off and enjoy a screenless day ⚠

TOMS seems like a really nice shoe company, and it just got hacked in a really nice way. But it's still a hack.

πŸ“– Read

via "Naked Security".
⚠ Copy-and-paste sharing on Stack Overflow spreads insecure code ⚠

It’s the time-saving technique employed by many coders - copy and paste code from crowd-sourcing 'Q&A' websites. But is it always secure?

πŸ“– Read

via "Naked Security".
⚠ Deepfakes have doubled, overwhelmingly targeting women ⚠

Deepfake tech has push-button apps and service portals. Can code commodification do the same for detection, so women can actually afford it?

πŸ“– Read

via "Naked Security".
❌ Twitter Uses Phone Numbers, Emails to Sell Ads ❌

Data collected for two-factor authentication purposes β€œinadvertently” matched users to targeted-advertising lists, the company admits.

πŸ“– Read

via "Threatpost".
⚠ October Patch Tuesday: Microsoft fixes critical remote desktop bug ⚠

Microsoft fixed 59 vulnerabilities in October's Patch Tuesday, including several critical remote code execution (RCE) flaws.

πŸ“– Read

via "Naked Security".
πŸ•΄ How the Software-Defined Perimeter Is Redefining Access Control πŸ•΄

In a world where traditional network boundaries no longer exist, VPNs are showing their age.

πŸ“– Read

via "Dark Reading: ".
πŸ›  OpenSSH 8.1p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” 70% of business report Pass the Hash attacks directly impact operational costs πŸ”

Ignorance surrounding Pass the Hash attacks puts the majority of businesses at risk of compromised credentials.

πŸ“– Read

via "Security on TechRepublic".
❌ Privacy Groups: Ring’s Police Partnerships Can Lead to Sinister Ends ❌

Increasing concerns over unauthorized surveillance, integration with facial recognition and more are plaguing the doorbell-video camera company.

πŸ“– Read

via "Threatpost".
πŸ•΄ Twitter Slip-Up Spills MFA Phone Numbers, Emails to Advertisers πŸ•΄

Email addresses and phone numbers provided to secure user accounts were accidentally shared with marketers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Financial industry spending millions to deal with breaches in 2019 πŸ”

A new study says financial services organizations experienced an average of 10 attacks a year and spent an average of $1.3 million to restore services after each DNS attack.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ A Realistic Threat Model for the Masses πŸ•΄

For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here's why.

πŸ“– Read

via "Dark Reading: ".