πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Synack's Trust Report uses Attacker Resistance Score to rate cybersecurity defenses πŸ”

Manufacturers and utilities rank highest while e-commerce companies come in last.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Report: APT gang increased cyberattacks on businesses in Q3 πŸ”

Hackers used email addresses, malicious Word docs, and compromised SharePoint sites to deliver malware.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Data from 21M Mixcloud Users Compromised in Breach πŸ•΄

The music streaming service received reports indicating attackers gained unauthorized access to its systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Sharing Is Caring πŸ•΄

Do you do any cybersecurity-related volunteer work?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition πŸ•΄

Make your favorite security experts laugh with these affordable holiday gifts.

πŸ“– Read

via "Dark Reading: ".
❌ Authorities Break Up Imminent Monitor Spyware Organization ❌

The infrastructure behind a remote access tool (RAT) allowing full remote takeover of a victim machine has been dismantled.

πŸ“– Read

via "Threatpost".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.12 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  I2P 0.9.44 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Microsoft Fixes Flaw Threatening Azure Accounts πŸ•΄

Researchers detail a bug they found in some of Microsoft's OAuth 2.0 applications.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft OAuth Flaw Opens Azure Accounts to Takeover ❌

The Microsoft applications are vulnerable to an OAuth authentication flaw that could enable Azure account takeover.

πŸ“– Read

via "Threatpost".
πŸ•΄ Poll Results: Security Pros Make The (Hypothetically) Ultimate Data Decision πŸ•΄

What if you could protect only one category of your organization's data?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ StrandHogg Vulnerability Affects All Versions of Android πŸ•΄

The bug enables malware to pose as any legitimate Android app, letting attackers track messages, photos, credentials, and phone conversations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DHS to Require Federal Agencies Set Vulnerability Disclosure Policies πŸ•΄

The Cybersecurity and Infrastructure Security Agency (CISA) publishes a draft document mandating a vulnerability disclosure policy and a strategy for handling reports of security weaknesses.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Kali Linux Gets New Desktop Environment & Undercover Theme πŸ•΄

Updates to pen-testing platform are designed to improve performance and user interface, says Offensive Security, maintainer of the open source project.

πŸ“– Read

via "Dark Reading: ".
⚠ Ad fraud: Fake local news sites are rolling in the dough ⚠

"forbesbusinessinsider.com?" Names like that sound close enough to real news domains to pass, but bots are the only ones visiting.

πŸ“– Read

via "Naked Security".
⚠ IM RAT spy tool seller raided, busted, kicked offline ⚠

The spyware gave complete control of victimized computers, sold for as little as$25, and was bought by 14,500 hackers worldwide.

πŸ“– Read

via "Naked Security".
⚠ Mixcloud user accounts up for sale on dark web ⚠

A hacker is ransoming account data stolen from music streaming service Mixcloud, according to reports.

πŸ“– Read

via "Naked Security".
⚠ SMS company exposes millions of text messages, credentials online ⚠

Researchers at VpnMentor claim that the TrueDialog data leak exposure could have compromised tens of millions of people.

πŸ“– Read

via "Naked Security".
❌ β€˜StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android Apps ❌

The flaw can allow hackers to take over typical device functions like sending messages and taking photos because users think malicious activity is a mobile app they use regularly.

πŸ“– Read

via "Threatpost".
❌ Supply Chain Account Takeover: How Criminals Exploit Third-Party Access ❌

It’s important for businesses of all sizes to not only view their suppliers’ attack surface as their own but also extend some of their security protections.

πŸ“– Read

via "Threatpost".