πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 This Mini Router Gives You Lifetime Wi-Fi and VPN Coverage for $599.99 🦿

Connect and protect your whole team with this mini router that offers 10,000 sq ft coverage and a built-in VPN for the low price of $599.99.

πŸ“– Read

via "Tech Republic".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.8.10 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ‘2
🦿 Get a VPN for Yourself and Your Employees This Holiday Season 🦿

Want to make sure everyone on your team is secure? Get a lifetime subscription to FastestVPN PRO, now just $29.97 through Christmas Day for 15 devices.

πŸ“– Read

via "Tech Republic".
πŸ‘3
🦿 Hotspot Shield VPN Review 2023: Features, Pros & Cons 🦿

Hotspot Shield’s speed-oriented features may not be enough to overcome its lack of testing and questionable data logs. Read more in our full review below.

πŸ“– Read

via "Tech Republic".
πŸ‘1πŸ‘Ž1πŸ”₯1
🦿 Mozilla VPN Review (2023): Features, Pricing, and Security 🦿

Mozilla VPN’s fast performance may not be enough to make up for its small server network and lack of features. Learn more about it in our full review below.

πŸ“– Read

via "Tech Republic".
πŸ‘2
🦿 Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware 🦿

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat.

πŸ“– Read

via "Tech Republic".
🦿 How to Use Titan Security Keys With Passkey Support 🦿

Google's updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords.

πŸ“– Read

via "Tech Republic".
🦿 Google Adds Gemini Pro API to AI Studio and Vertex AI 🦿

Google also announced Duet AI for Developers and Duet AI in Security Operations, but neither uses Gemini yet.

πŸ“– Read

via "Tech Republic".
❀1πŸ‘1
πŸ›  Faraday 5.0.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
β™ŸοΈ Ten Years Later, New Clues in the Target Breach β™ŸοΈ

On Dec. 18, 2013, KrebsOnSecurity broke the news that U.S. retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. The malware used in the Target breach included the text string "Rescator," which also was the handle chosen by the cybercriminal who was selling all of the cards stolen from Target customers. Ten years later, KrebsOnSecurity has uncovered new clues about the real-life identity of Rescator.

πŸ“– Read

via "Krebs on Security".
❀1
πŸ›  American Fuzzy Lop plus plus 4.09c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
πŸ›  I2P 2.4.0 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read

via "Packet Storm Security".
❀1
🦿 12 Essential Steps Mac Users Need To Take At Year End 🦿

As the year comes to a close, Mac users should take these steps to ensure their device's security, performance and organization.

πŸ“– Read

via "Tech Republic".
πŸ‘1
🦿 What Australia’s Digital ID Means to How Citizens Interact With Businesses Online 🦿

Australia is about to get a national online ID system β€” the Digital ID β€” which promises to improve the security and privacy of data online. However, concerns among Australians persist.

πŸ“– Read

via "Tech Republic".
🀯1
β™ŸοΈ BlackCat Ransomware Raises Ante After FBI Disruption β™ŸοΈ

The U.S. Federal Bureau of Investigation (FBI) disclosed today that it infiltrated the world's second most prolific ransomware gang, a Russia-based criminal group known as ALPHV and BlackCat. The FBI said it seized the gang's darknet website, and released a decryption tool that hundreds of victim companies can use to recover systems. Meanwhile, BlackCat responded by briefly "unseizing" its darknet site with a message promising 90 percent commissions for affiliates who continue to work with the crime group, and open season on everything from hospitals to nuclear power plants.

πŸ“– Read

via "Krebs on Security".
πŸ‘1
🦿 Top 7 Cybersecurity Threats for 2024 🦿

2024 will be a pivotal year for cybersecurity. The global threat landscape is undergoing deep transformations, driven by emerging technologies, new tactics and shifting geopolitical dynamics.

πŸ“– Read

via "Tech Republic".
❀1πŸ‘1
🦿 Cyber Security Trends to Watch in Australia in 2024 🦿

Ransomware attacks on infrastructure and mid-market businesses are tipped to rise, while the use of AI cyber tools will grow as IT customers seek more signal and less noise from vendors.

πŸ“– Read

via "Tech Republic".
πŸ‘2
🦿 BlackCat Ransomware Site Seized in International Takedown Effort 🦿

The ransomware group, which has distributed ransomware to more than 1,000 victims, reportedly recovered control of its website on Tuesday. Learn how to defend against ransomware.

πŸ“– Read

via "Tech Republic".
πŸ‘1
πŸ›  OpenSSH 9.6p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Read

via "Packet Storm Security".
🦿 Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia 🦿

ASIC research shows 44% of Australian organisations are not managing third-party supply chain risk. Tesserent says it remains a key risk, and disruption could emerge from geopolitical tensions.

πŸ“– Read

via "Tech Republic".
🦿 Google Cloud’s Cybersecurity Predictions of 2024 and Look Back at 2023 🦿

Generative AI can be used by attackers, but security professionals shouldn't lose sleep over it, according to a Google Cloud threat intelligence analyst. Find out why.

πŸ“– Read

via "Tech Republic".