πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Smartphone and speaker voice assistants can be hacked using lasers ⚠

Researchers have discovered that some voice assistants will accept β€œsignal injection” commands sent to them using pulses of laser light.

πŸ“– Read

via "Naked Security".
❌ Presentation Template: Build Your 2020 Security Plan ❌

The 2020 Security Plan PPT template helps security professionals engage their organization's decision-makers and gets their backing for critical security decisions.

πŸ“– Read

via "Threatpost".
❌ Google Analytics Emerges as a Phishing Tool ❌

Web analytics help phishers hone their attacks -- but website defenders can also use these tactics to better detect the scope of attacks and mitigate their effects.

πŸ“– Read

via "Threatpost".
πŸ” IBM develops financial services-ready public cloud πŸ”

A new platform is being unveiled that is aimed at banks and their suppliers. The goal is to help them adhere to strict industry regulatory compliance, security and resiliency requirements.

πŸ“– Read

via "Security on TechRepublic".
❌ Emotet Resurgence Continues With New Tactics, Techniques and Procedures ❌

Since Emotet came out of hibernation last month, researchers are seeing the banking trojan's authors take on a consistent trend of new evasion tactics and social engineering techniques.

πŸ“– Read

via "Threatpost".
πŸ•΄ A Warning From Weird Al πŸ•΄

Should you get an e-mail with the subject 'stinky cheese'...

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ A Warning From Weird Al πŸ•΄

Should you get an e-mail with the subject 'stinky cheese'...

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Uphill Battle of Triaging Alerts πŸ•΄

Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to locate and close an open port in Linux πŸ”

Locating and blocking unwanted open ports in Linux should be a task every network admin knows how to do.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Bluto 2.4.16 πŸ› 

Bluto is a dns reconnaissance, vulnerability checking, and enumeration tool.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  AIEngine 1.9.1 πŸ› 

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” How to copy a file from one server to another from a third with SSH πŸ”

Find out how to work some SSH magic, by transferring a file from one machine to another from a third.

πŸ“– Read

via "Security on TechRepublic".
❌ DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks ❌

The group was exposed after a ShadowBrokers leak.

πŸ“– Read

via "Threatpost".
❌ Facebook Privacy Breach: 100 Developers Improperly Accessed Data ❌

Facebook said that 100+ third-party app developers had access to restricted data for members of Groups, in its latest privacy snafu.

πŸ“– Read

via "Threatpost".
πŸ•΄ California DMV Leak Spills Data from Thousands of Drivers πŸ•΄

Federal agencies reportedly had improper access to Social Security data belonging to 3,200 license holders.

πŸ“– Read

via "Dark Reading: ".
πŸ” Cybercriminals using Google Analytics to enhance phishing efforts πŸ”

A report from security firm Akamai found that hackers were using analytics services to optimize their phishing efforts.

πŸ“– Read

via "Security on TechRepublic".
πŸ” FBI, NIH Continue Biomed Research Theft Probe πŸ”

A report in the New York Times this week revealed how widespread the theft of biomedical secrets is at U.S. universities and research institutions.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Social Media: Corporate Cyber Espionage's Channel of Choice πŸ•΄

Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2010-2471

drupal6 version 6.16 has open redirection

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-2446

Rbot Reaction plugin allows command execution

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-2247

makepasswd 1.10 default settings generate insecure passwords

πŸ“– Read

via "National Vulnerability Database".