πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Password-Cracking Teams Up in CrackQ Release πŸ•΄

The open source platform aims to make password-cracking more manageable and efficient for red teams.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Wireshark Analyzer 3.0.7 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” How to protect computers that store biometric data from malware πŸ”

More than a third of systems that handle biometric data were hit by at least one malware infection in the third quarter of 2019, according to a new Kaspersky report.

πŸ“– Read

via "Security on TechRepublic".
❌ β€˜Ultimate’ MiTM Attack Steals $1M from Israeli Startup ❌

Researchers uncovers β€œultimate man-in-the-middle attack” that used an elaborate spoofing campaign to fool a Chinese VC firm and rip off an emerging business.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep19: One of us just prevented a ransomware attack – Naked Security Podcast ⚠

Listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ The Human Factor: 5 Reasons Why Cybersecurity Is a People Problem πŸ•΄

The industry can only go so far in treating security as a challenge that can be resolved only by engineering.

πŸ“– Read

via "Dark Reading: ".
⚠ Yodel parcel tracking app blabs about other people’s parcels ⚠

Yodel's mobile parcel delivery app was leaking people's delivery data to others using the app, a security researcher discovered.

πŸ“– Read

via "Naked Security".
πŸ•΄ Microsoft Defender ATP Brings EDR Capabilities to macOS πŸ•΄

Mac computers will now have the option to use Microsoft Defender Advanced Threat Protection's endpoint and detection response.

πŸ“– Read

via "Dark Reading: ".
❌ OpenBSD Hit with Authentication, LPE Bugs ❌

The authentication bypass (CVE-2019-19521) is remotely exploitable.

πŸ“– Read

via "Threatpost".
⚠ Critical DoS messaging flaw fixed in December Android update ⚠

Android’s December 2019 updates arrived this week, patching a small list of system and Qualcomm flaws across the operating system’s two patch levels.

πŸ“– Read

via "Naked Security".
❌ HackerOne Breach Leads to $20,000 Bounty Reward ❌

HackerOne has paid out $20,000 to a bounty hunter who discovered a session cookie issue, due to "human error," on the bug bounty platform.

πŸ“– Read

via "Threatpost".
⚠ Machine-raiding Python libraries squashed by community ⚠

Python developers have once again fallen victim to malicious software libraries lurking in their favourite package manager.

πŸ“– Read

via "Naked Security".
πŸ” NERC Refocusing Cybersecurity Efforts πŸ”

In the face of mounting attacks against critical infrastructure, NERC, which oversees the United States' electrical grid, is retooling how it addresses cybersecurity.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ iCloud-hacking politician to be sentenced on Christmas eve ⚠

Former Dutch city council member Mitchel van der K invaded hundreds of iCloud accounts β€œfrequently and repeatedly”.

πŸ“– Read

via "Naked Security".
⚠ Cookie-stealing malware wants to know your Facebook ad budget ⚠

The AdKoob malware that sneakily peeks at how much you're spending on ads is back.

πŸ“– Read

via "Naked Security".
❌ Feds Offer $5M Reward to Nab β€˜Evil Corp’ Dridex Hacker ❌

Authorities cracked down on cybercrime group Evil Corp. with sanctions and charges against its leader, known for his lavish lifestyle.

πŸ“– Read

via "Threatpost".
❌ AT&T, Verizon Subscribers Exposed as Mobile Bills Turn Up on the Open Web ❌

Names, addresses, phone numbers, call and text message records and account PINs were all caught up in a cloud misconfiguration.

πŸ“– Read

via "Threatpost".
πŸ•΄ SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit πŸ•΄

Assessments can be used against your company in court proceedings. Here's how to mitigate this potential risk.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 10 Security 'Chestnuts' We Should Roast Over the Open Fire πŸ•΄

These outdated security rules we all know (and maybe live by) no longer apply.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-1104

A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ With Aporeto, Palo Alto Looks Away from the Firewall and Toward the Future πŸ•΄

Seeing its firewall sales softening, the security vendor makes another acquisition to reorient itself for the cloud era.

πŸ“– Read

via "Dark Reading: ".