πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 2018 State of Cyber Workforce πŸ•΄

Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ UK, US to Sign Accord on AI, Cybersecurity Cooperation πŸ•΄

Royal Navy, US Navy, and tech industry leaders ready to commit to 'a framework for dialogue and cooperation' at inaugural meeting of the Atlantic Future Forum.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Tops Global Malware C2 Distribution πŸ•΄

The United States hosts 35% of the world's command-and-control infrastructure, driving the frequency of host compromises.

πŸ“– Read

via "Dark Reading: ".
<b>&#9000; Who Is Agent Tesla? &#9000;</b>

<code>A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity β€” attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malware’s apparent creator seems to have done little to hide his real-life identity.</code><code>The proprietors of Agent Tesla market their product at agenttesla-dot-com, selling access to the software in monthly licenses paid for via bitcoin, for prices ranging from $15 to $69 per month depending on the desired features.</code><code>Media</code><code>The Agent Tesla Web site emphasizes that the software is strictly β€œfor monitoring your personel [sic] computer.” The site’s β€œabout” page states that Agent Tesla β€œis not a malware. Please, don’t use for computers which is not access permission.” To backstop this disclaimer, the site warns that any users caught doing otherwise will have their software licenses revoked and subscriptions canceled.</code><code>At the same time, the Agent Tesla Web site and its 24/7 technical support channel (offered via Discord) is replete with instances of support personnel instructing users on ways to evade antivirus software detection, use software vulnerabilities to deploy the product, and secretly bundle the program inside of other file types, such as images, text, audio and even Microsoft Office files.</code><code>Media</code><code>A description of some of the options posted to the Agent Tesla sales Web site.</code><code>In August 2018, computer security firm LastLine said it witnessed a 100 percent increase in Agent Tesla instances detected in the wild over just a three month period.</code><code>β€œActing as a fully-functional information stealer, it is capable of extracting credentials from different browsers, mail, and FTP clients,” LastLine wrote. β€œIt logs keys and clipboards data, captures screen and video, and performs form-grabbing (Instagram, Twitter, Gmail, Facebook, etc.) attacks.”</code><code>Media</code><code>Most of the options included in Agent Tesla revolve around stealth, persistence, evading security tools, spreading to other computers, or tampering with system settings.</code><code>I CAN HAZ TESLA</code><code>The earliest versions of Agent Tesla were made available for free via a Turkish-language WordPress site that oddly enough remains online (agenttesla.wordpress-dot-com), although its home page now instructs users to visit the current AgentTesla-dot-com domain. Not long after that WordPress site was erected, its author(s) began charging for the software, accepting payments via a variety of means, including PayPal, Bitcoin and even wire transfer to several bank accounts in Turkey.</code><code>MediaHistoric WHOIS Web site registration records maintained by Domaintools.com show that the current domain for the software β€” agenttesla-dot-com β€” was registered in 2014 to a young man from Antalya, Turkey named Mustafa can Ozaydin, and to the email address mcanozaydin@gmail.com. Sometime in mid-2016 the site’s registration records were hidden behind WHOIS privacy services [full disclosure: Domaintools is a previous advertiser on KrebsOnSecurity].</code><code>That Gmail address is tied to a Youtube.com account for a Turkish individual by the same name who has uploaded exactly three videos over the past four years. In one of them, uploaded in October 2017 and titled β€œweb panel,” Mr. can Ozaydin demonstrates how to configure a Web site. At around 3:45 in the video, we can see the purpose of this demonstration is to show people one way to install an Agent Tesla control panel to keep track of systems infected with the malware.</code><code>Incidentally, the administrator of the 24/7 live support channel for Agent Tesla users at one point instructed customers to view this same…
πŸ•΄ Facebook Rumored to Be Hunting for Major Cybersecurity Acquisition πŸ•΄

Goal appears both a bid to bolster its own security and its tattered reputation for privacy, according to reporting by The Information.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Patching Paradox: A Path to Intelligent Vulnerability Management πŸ•΄

Imagine: You're out at sea, sailing through treacherous and uncharted waters. The tips of sharp rocks jutting from the waves give some forewarning of danger, but beneath the surface, twisting reefs and shallow sandbanks threaten to run you aground.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What Keeps the CISO Awake at Night πŸ•΄

How to keep your CISO sleeping soundly

πŸ“– Read

via "Dark Reading: ".
⚠ Pirates! Don’t blame your illegal file sharing on family members ⚠

Stop blaming your piracy on your mum. You can no longer avoid liability by saying that a family member had access to your connection.

πŸ“– Read

via "Naked Security".
⚠ Why is Elon Musk promoting this Bitcoin scam? (He’s not) ⚠

While scrolling through my Twitter feed I saw a Bitcoin scam so unabashed that it got me thinking.... do such scams really work?

πŸ“– Read

via "Naked Security".
⚠ Adult websites shuttered after 1.2 million user details exposed ⚠

It's not even close to the number of users affected by the massive Ashley Madison breach, but the results could be just as devastating to those who are affected.

πŸ“– Read

via "Naked Security".
❌ Thousands of Applications Vulnerable to RCE via jQuery File Upload ❌

The flaw has existed for eight years thanks to a security change in Apache.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” How sophisticated phishing grants attackers total control of your computer πŸ”

Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity predictions: More cyberattacks, social engineering, and scary IoT πŸ”

Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How sophisticated phishing grants attackers total control of your computer πŸ”

Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guysβ€”he used to be one.

πŸ“– Read

via "Security on TechRepublic".
⚠ Phishing is still the most commonly used attack on organizations, survey says ⚠

The survey found that the majority of cyberattacks - 75% - came from outsiders, while 25% were due to insiders.

πŸ“– Read

via "Naked Security".
⚠ Patch now! Multiple serious flaws found in Drupal ⚠

Drupal website owners have some important patching homework to do.

πŸ“– Read

via "Naked Security".
πŸ” How RATs infect computers with malicious software πŸ”

Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity predictions: More cyberattacks, social engineering, and scary IoT πŸ”

Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Good Times in Security Come When You Least Expect Them πŸ•΄

Not every cybersecurity endeavor can have a huge impact. But a small percentage of your efforts can still produce results that blow you away.

πŸ“– Read

via "Dark Reading: ".
❌ Adult Website Hack Exposes 1.2M β€˜Wife Lover’ Fans ❌

A 40-year-old, easily cracked encryption method was used to protect the 98MB database of user information.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ IoT Bot Landscape Expands, Attacks Vary by Country πŸ•΄

New report finds 1,005 new user names and passwords beyond Mirai's original default list two years ago.

πŸ“– Read

via "Dark Reading: ".