πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to copy a file from one server to another from a third with SSH πŸ”

Find out how to work some SSH magic, by transferring a file from one machine to another from a third.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Samhain File Integrity Checker 4.4.0 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.11 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Details of Attack on Electric Utility Emerge πŸ•΄

The March 5 DDoS attack interrupted communications between generating facilities and the electrical grid in three western states.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 11/1 Edition πŸ”

The hackers behind Uber's 2016 breach finally plead guilty, WhatsApp pushes back against NSO Group, and an army admin steals millions from veterans - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ News Wrap: APTs, Office 365 Voicemail Phish and Bed Bath & Beyond Breach ❌

Threatpost editors discuss this week's biggest news - from a data breach of Bed Bath & Beyond, a tricky phishing attack and widespread APT activity. 

πŸ“– Read

via "Threatpost".
πŸ” Wanted: More women hackers πŸ”

Capture the Flag challenge encourages women to pursue cybersecurity careers and connects experts with newcomers

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2005-2351

Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2005-2350

Cross-site scripting (XSS) vulnerability in websieve v0.62 allows remote attackers to inject arbitrary web script or HTML code in the web user interface.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Free & Discounted Security Services Now Available for US Election Orgs πŸ•΄

Nonprofit Defending Digital Campaigns (DDC) offers security services for email, user education, mobile, and encrypted communications, to federal election committees.

πŸ“– Read

via "Dark Reading: ".
❌ Solar, Wind Power Utility Disrupted in Rare Cyberattack ❌

A simple attack on an unpatched server could have been catastrophic for the Utah-based utility.

πŸ“– Read

via "Threatpost".
❌ Office for Mac Users Warned of Malicious SYLK Files ❌

Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protections.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2005-2352

I race condition in Temp files was found in gs-gpl before 8.56 addons scripts.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 21 stories of the week ⚠

Roundup: From updating macOS Catalina and old i-devices, to the ransomware attack that took a city offline - and everything in between.

πŸ“– Read

via "Naked Security".
⚠ US grounds Chinese-made drones as part of security review ⚠

The exception: drones being used in emergencies, such as fighting wildfires, search and rescue, and dealing with natural disasters.

πŸ“– Read

via "Naked Security".
❌ BlueKeep Attacks Have Arrived, Are Initially Underwhelming ❌

The first attacks that exploit the zero-day Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential.

πŸ“– Read

via "Threatpost".
⚠ Undercover reporter tells all after working for a Polish troll farm ⚠

Together with her troll colleagues, she managed 200 fake social profiles, promoted clients’ products, and trolled their competitors.

πŸ“– Read

via "Naked Security".
πŸ•΄ New: 2019 State of the Internet / Security: Phishing - Baiting the Hook πŸ•΄

Phishing attacks require two things: a lure and a landing. This Akamai-sponsored report digs deep into how the phishing economy works and ways organizations can protect themselves from the ever-evolving threat.

πŸ“– Read

via "Dark Reading: ".
⚠ Pentagon publishes AI guidelines ⚠

As the specter of warrior robots looms large, the Pentagon has published a set of ethical guidelines for its use of artificial intelligence.

πŸ“– Read

via "Naked Security".
⚠ Russia’s sovereign internet law comes into force ⚠

The new law compels the country’s ISPs to forward all data arriving and departing from their networks through special gateway servers.

πŸ“– Read

via "Naked Security".
πŸ•΄ To Secure Multicloud Environments, First Acknowledge You Have a Problem πŸ•΄

Multicloud environments change rapidly. Organizations need a security framework that is purpose-built for the cloud and that aligns with their digital transformation strategy.

πŸ“– Read

via "Dark Reading: ".