πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Monday review – the hot 23 stories of the week ⚠

From a fake news generator to critical flaws in Medtronic equipment - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Wikipedia co-founder offers a Facebook/Twitter wannabe ⚠

Tired of being a tracked, ad-bedeviled product sold by social media companies? The cost to immediately join a network with no tracking/ads: $12.99/month.

πŸ“– Read

via "Naked Security".
⚠ Two men busted for hijacking victims’ phones and email accounts ⚠

Prosecutors allege that Meiggs and Harrington took over their targets' mobile phone and email accounts via SIM-swapping.

πŸ“– Read

via "Naked Security".
⚠ GitHub launches Security Lab to boost open source security ⚠

The idea is simple – create a global platform for reporting and fixing vulnerabilities in open source projects before they do damage.

πŸ“– Read

via "Naked Security".
⚠ NSA won’t collect phone location data, promises US government ⚠

US intelligence agencies won’t harvest US residents’ geolocation data in future investigations, revealed the US government this month.

πŸ“– Read

via "Naked Security".
πŸ•΄ New: Everything You Always Wanted to Know About Security at the Edge But Were Afraid to Ask πŸ•΄

The secure perimeter as we know it is dissolving. So how do you protect your crown jewels when the castle has no walls?

πŸ“– Read

via "Dark Reading: ".
❌ Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Successfully Hacked ❌

White-hat hackers using never-before-seen zero days against popular applications and devices against competed at two-day gathering in Chengdu.

πŸ“– Read

via "Threatpost".
πŸ•΄ 13 Security Pros Share Their Most Valuable Experiences πŸ•΄

From serving as an artillery Marine to working a help desk, a baker's dozen of security pros share experiences that had the greatest influence on their careers.

πŸ“– Read

via "Dark Reading: ".
❌ Pipka Card Skimmer Removes Itself After Infecting eCommerce Sites ❌

The web skimmer has been spotted on at least 17 popular eCommerce websites, a new Visa alert warns.

πŸ“– Read

via "Threatpost".
πŸ•΄ Quantum Computing Breakthrough Accelerates the Need for Future-Proofed PKI πŸ•΄

Public key infrastructure is a foundational security tool that has evolved to become a critical base for future advancements. Today's generation of PKI can be coupled with quantum-resistant algorithms to extend the lifespan of digital certificates for decades.

πŸ“– Read

via "Dark Reading: ".
❌ β€˜Wildly Different’ Privacy Regulations Causing Compliancy Chaos ❌

Threatpost talks to Anthony di Bello with OpenText, at ENFUSE 2019, about the successes and failures of security regulations, and how companies are changing as they struggle to keep up with compliancy issues.

πŸ“– Read

via "Threatpost".
πŸ›  XSSer Penetration Testing Tool 1.8-2 πŸ› 

XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to try to bypass certain filters, and various special techniques of code injection.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  cryptmount Filesystem Manager 5.3.2 πŸ› 

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Office 365 Admins Targeted in Ongoing Phishing Scam ❌

Using a real Office 365 account at a legitimate company to send out lures helps phishers evade email defenses.

πŸ“– Read

via "Threatpost".
πŸ•΄ Facebook Discloses WhatsApp MP4 Video Vulnerability πŸ•΄

A stack-based buffer overflow bug can be exploited by sending a specially crafted video file to a WhatsApp user.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How Medical Device Vendors Hold Healthcare Security for Ransom πŸ•΄

While being pummeled by ransomware attacks, healthcare centers also face growing IoT-related threats. Here's how they manage security amid a complex set of risks.

πŸ“– Read

via "Dark Reading: ".
πŸ” PrivSec conference highlights CISO concerns and future data privacy laws πŸ”

The conference, hosted by Columbia University, brought together CISOs, lawmakers, academics, and businesses to discuss GDPR, CCPA, and data privacy in all its forms.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Mastering DFIR: Digital Guardian for DFIR and Data Protection πŸ”

In this post, the second of two blogs, Bill Bradley breaks down DG Wingman and Digital Guardian's data protection capabilities.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ The Unhappiest Subscribers on Earth? Disney+ Accounts Hacked & Hijacked ❌

Thousands of accounts showed up on the Dark Web -- and customers say Disney has been no help.

πŸ“– Read

via "Threatpost".
❌ WhatsApp Remote Code Execution Triggered by Videos ❌

The flaw can be trivially exploited.

πŸ“– Read

via "Threatpost".