πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Sharing Is Caring πŸ•΄

Do you do any cybersecurity-related volunteer work?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition πŸ•΄

Make your favorite security experts laugh with these affordable holiday gifts.

πŸ“– Read

via "Dark Reading: ".
❌ Authorities Break Up Imminent Monitor Spyware Organization ❌

The infrastructure behind a remote access tool (RAT) allowing full remote takeover of a victim machine has been dismantled.

πŸ“– Read

via "Threatpost".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.12 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  I2P 0.9.44 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Microsoft Fixes Flaw Threatening Azure Accounts πŸ•΄

Researchers detail a bug they found in some of Microsoft's OAuth 2.0 applications.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft OAuth Flaw Opens Azure Accounts to Takeover ❌

The Microsoft applications are vulnerable to an OAuth authentication flaw that could enable Azure account takeover.

πŸ“– Read

via "Threatpost".
πŸ•΄ Poll Results: Security Pros Make The (Hypothetically) Ultimate Data Decision πŸ•΄

What if you could protect only one category of your organization's data?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ StrandHogg Vulnerability Affects All Versions of Android πŸ•΄

The bug enables malware to pose as any legitimate Android app, letting attackers track messages, photos, credentials, and phone conversations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DHS to Require Federal Agencies Set Vulnerability Disclosure Policies πŸ•΄

The Cybersecurity and Infrastructure Security Agency (CISA) publishes a draft document mandating a vulnerability disclosure policy and a strategy for handling reports of security weaknesses.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Kali Linux Gets New Desktop Environment & Undercover Theme πŸ•΄

Updates to pen-testing platform are designed to improve performance and user interface, says Offensive Security, maintainer of the open source project.

πŸ“– Read

via "Dark Reading: ".
⚠ Ad fraud: Fake local news sites are rolling in the dough ⚠

"forbesbusinessinsider.com?" Names like that sound close enough to real news domains to pass, but bots are the only ones visiting.

πŸ“– Read

via "Naked Security".
⚠ IM RAT spy tool seller raided, busted, kicked offline ⚠

The spyware gave complete control of victimized computers, sold for as little as$25, and was bought by 14,500 hackers worldwide.

πŸ“– Read

via "Naked Security".
⚠ Mixcloud user accounts up for sale on dark web ⚠

A hacker is ransoming account data stolen from music streaming service Mixcloud, according to reports.

πŸ“– Read

via "Naked Security".
⚠ SMS company exposes millions of text messages, credentials online ⚠

Researchers at VpnMentor claim that the TrueDialog data leak exposure could have compromised tens of millions of people.

πŸ“– Read

via "Naked Security".
❌ β€˜StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android Apps ❌

The flaw can allow hackers to take over typical device functions like sending messages and taking photos because users think malicious activity is a mobile app they use regularly.

πŸ“– Read

via "Threatpost".
❌ Supply Chain Account Takeover: How Criminals Exploit Third-Party Access ❌

It’s important for businesses of all sizes to not only view their suppliers’ attack surface as their own but also extend some of their security protections.

πŸ“– Read

via "Threatpost".
πŸ” New Android bug targets banking apps on Google Play store πŸ”

Labeled "StrandHogg," the vulnerability discovered by the mobile security vendor Promon could give hackers access to users' photos, contacts, phone logs, and more.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-12503

Due to unencrypted and unauthenticated data communication, the wireless barcode scanner Inateck BCST-60 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12394

Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication.

πŸ“– Read

via "National Vulnerability Database".