πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ ICANN Launches Service to Help With WHOIS Lookups β™ŸοΈ

More than five years after domain name registrars started redacting personal data from all public domain registration records, the non-profit organization overseeing the domain industry has introduced a centralized online service designed to make it easier for researchers, law enforcement and others to request the information directly from registrars.

πŸ“– Read

via "Krebs on Security".
❀1
🦿 Windows 10 Extended Security Updates Promised for Small Businesses and Home Users 🦿

Already common for enterprises, for the first time, individuals will also get the option to pay for extended security updates for a Windows operating system that's out of support.

πŸ“– Read

via "Tech Republic".
❀2πŸ€”1
🦿 Bitwarden vs LastPass 2023: Which Password Manager Is Best? 🦿

In this comparison between Bitwarden and LastPass, we explore their features, security, ease of use and pricing. Find out which password manager is best for you.

πŸ“– Read

via "Tech Republic".
🦿 Norton Secure VPN Review (2023): Pricing, Features & Security 🦿

Norton VPN’s small server network and lack of notable features make it hard to recommend over other available VPNs today. Read our full review to learn more.

πŸ“– Read

via "Tech Republic".
πŸ‘1πŸ‘Ž1
🦿 Widespread Windows and Linux Vulnerabilities Could Let Attackers Sneak in Malicious Code Before Boot 🦿

Lenovo, AMI and Insyde have released patches for LogoFAIL, an image library poisoning attack.

πŸ“– Read

via "Tech Republic".
🦿 This Mini Router Gives You Lifetime Wi-Fi and VPN Coverage for $599.99 🦿

Connect and protect your whole team with this mini router that offers 10,000 sq ft coverage and a built-in VPN for the low price of $599.99.

πŸ“– Read

via "Tech Republic".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.8.10 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ‘2
🦿 Get a VPN for Yourself and Your Employees This Holiday Season 🦿

Want to make sure everyone on your team is secure? Get a lifetime subscription to FastestVPN PRO, now just $29.97 through Christmas Day for 15 devices.

πŸ“– Read

via "Tech Republic".
πŸ‘3
🦿 Hotspot Shield VPN Review 2023: Features, Pros & Cons 🦿

Hotspot Shield’s speed-oriented features may not be enough to overcome its lack of testing and questionable data logs. Read more in our full review below.

πŸ“– Read

via "Tech Republic".
πŸ‘1πŸ‘Ž1πŸ”₯1
🦿 Mozilla VPN Review (2023): Features, Pricing, and Security 🦿

Mozilla VPN’s fast performance may not be enough to make up for its small server network and lack of features. Learn more about it in our full review below.

πŸ“– Read

via "Tech Republic".
πŸ‘2
🦿 Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware 🦿

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat.

πŸ“– Read

via "Tech Republic".
🦿 How to Use Titan Security Keys With Passkey Support 🦿

Google's updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords.

πŸ“– Read

via "Tech Republic".
🦿 Google Adds Gemini Pro API to AI Studio and Vertex AI 🦿

Google also announced Duet AI for Developers and Duet AI in Security Operations, but neither uses Gemini yet.

πŸ“– Read

via "Tech Republic".
❀1πŸ‘1
πŸ›  Faraday 5.0.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
β™ŸοΈ Ten Years Later, New Clues in the Target Breach β™ŸοΈ

On Dec. 18, 2013, KrebsOnSecurity broke the news that U.S. retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. The malware used in the Target breach included the text string "Rescator," which also was the handle chosen by the cybercriminal who was selling all of the cards stolen from Target customers. Ten years later, KrebsOnSecurity has uncovered new clues about the real-life identity of Rescator.

πŸ“– Read

via "Krebs on Security".
❀1
πŸ›  American Fuzzy Lop plus plus 4.09c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
πŸ›  I2P 2.4.0 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read

via "Packet Storm Security".
❀1
🦿 12 Essential Steps Mac Users Need To Take At Year End 🦿

As the year comes to a close, Mac users should take these steps to ensure their device's security, performance and organization.

πŸ“– Read

via "Tech Republic".
πŸ‘1
🦿 What Australia’s Digital ID Means to How Citizens Interact With Businesses Online 🦿

Australia is about to get a national online ID system β€” the Digital ID β€” which promises to improve the security and privacy of data online. However, concerns among Australians persist.

πŸ“– Read

via "Tech Republic".
🀯1
β™ŸοΈ BlackCat Ransomware Raises Ante After FBI Disruption β™ŸοΈ

The U.S. Federal Bureau of Investigation (FBI) disclosed today that it infiltrated the world's second most prolific ransomware gang, a Russia-based criminal group known as ALPHV and BlackCat. The FBI said it seized the gang's darknet website, and released a decryption tool that hundreds of victim companies can use to recover systems. Meanwhile, BlackCat responded by briefly "unseizing" its darknet site with a message promising 90 percent commissions for affiliates who continue to work with the crime group, and open season on everything from hospitals to nuclear power plants.

πŸ“– Read

via "Krebs on Security".
πŸ‘1
🦿 Top 7 Cybersecurity Threats for 2024 🦿

2024 will be a pivotal year for cybersecurity. The global threat landscape is undergoing deep transformations, driven by emerging technologies, new tactics and shifting geopolitical dynamics.

πŸ“– Read

via "Tech Republic".
❀1πŸ‘1