πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ TikTok owner to separate company over US national security worries ⚠

Chinese-owned video-sharing app TikTok might be under fire from US politicians but it’s not going to go down without a fight.

πŸ“– Read

via "Naked Security".
⚠ Convicted murderer wins β€˜right to be forgotten’ case ⚠

Google must remove details of a convicted murderer from its search results in Europe following a German court ruling, it emerged last week.

πŸ“– Read

via "Naked Security".
⚠ Uncle Sam opens arms to friendly hackers ⚠

All you bug hunters out there are about to get a nice Christmas gift - the US federal government finally wants to hear from you.

πŸ“– Read

via "Naked Security".
⚠ Fake Android apps uploaded to Play store by notorious Sandworm hackers ⚠

The Russian β€˜Sandworm’ hacking group has been caught repeatedly uploading fake and modified Android apps to Google’s Play Store.

πŸ“– Read

via "Naked Security".
❌ Insecure Database Exposes Millions of Private SMS Messages ❌

Researchers discovered an unprotected TrueDialog database hosted by Microsoft Azure with diverse and business-related data from tens of millions of users.

πŸ“– Read

via "Threatpost".
πŸ•΄ 3 Modern Myths of Threat Intelligence πŸ•΄

More intelligence does not lead to more security. Here's why.

πŸ“– Read

via "Dark Reading: ".
❌ Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds Warn ❌

TV takeover, privacy threats, botnet concerns and Wi-Fi network compromise are all big concerns when it comes to connected TVs.

πŸ“– Read

via "Threatpost".
πŸ•΄ New: State of the Internet: Web Attacks and Gaming Abuse πŸ•΄

Attackers see credential abuse as a low-risk venture with potential for a high payout, at least for now.

πŸ“– Read

via "Dark Reading: ".
❌ CISA Pushing U.S. Agencies to Adopt Vulnerability Disclosure Policies ❌

A newly proposed CISA directive would require all U.S. agencies to develop and implement vulnerability disclosure processes for their internet connected systems.

πŸ“– Read

via "Threatpost".
πŸ” SafeBreach catches 3 major vulnerabilities with Trend Micro, Autodesk and Kaspersky πŸ”

The issues have been patched or solved but researchers say they represent a worrying step in how attackers can manipulate trusted security systems.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Synack's Trust Report uses Attacker Resistance Score to rate cybersecurity defenses πŸ”

Manufacturers and utilities rank highest while e-commerce companies come in last.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Report: APT gang increased cyberattacks on businesses in Q3 πŸ”

Hackers used email addresses, malicious Word docs, and compromised SharePoint sites to deliver malware.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Data from 21M Mixcloud Users Compromised in Breach πŸ•΄

The music streaming service received reports indicating attackers gained unauthorized access to its systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Sharing Is Caring πŸ•΄

Do you do any cybersecurity-related volunteer work?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition πŸ•΄

Make your favorite security experts laugh with these affordable holiday gifts.

πŸ“– Read

via "Dark Reading: ".
❌ Authorities Break Up Imminent Monitor Spyware Organization ❌

The infrastructure behind a remote access tool (RAT) allowing full remote takeover of a victim machine has been dismantled.

πŸ“– Read

via "Threatpost".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.12 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  I2P 0.9.44 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Microsoft Fixes Flaw Threatening Azure Accounts πŸ•΄

Researchers detail a bug they found in some of Microsoft's OAuth 2.0 applications.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft OAuth Flaw Opens Azure Accounts to Takeover ❌

The Microsoft applications are vulnerable to an OAuth authentication flaw that could enable Azure account takeover.

πŸ“– Read

via "Threatpost".