πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ News Wrap: Authorities Target Evil Corp., Imminent Monitor, Money Mules ❌

In this past week, the authorities have cracked down on various BEC scams and cybercrime gangs.

πŸ“– Read

via "Threatpost".
❌ Feds Crack Down on Money Mules, Warn of BEC Scams ❌

Authorities say they have halted over 600 domestic money mules – exceeding the 400 money mules stopped last year.

πŸ“– Read

via "Threatpost".
πŸ” TeamViewer unveils new patch management system πŸ”

The new tool will provide IT departments with system-wide visibility of all the patches needed.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Analysts worry about tech security threats ahead of 2020 elections πŸ”

Security experts say most voting machines are safe and secure, but disinformation campaigns on platforms like Facebook and Twitter need to be addressed.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2012-2148

An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2130

A Security Bypass vulnerability exists in PolarSSL 0.99pre4 through 1.1.1 due to a weak encryption error when generating Diffie-Hellman values and RSA keys.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-2092

A Security Bypass vulnerability exists in Ubuntu Cobbler before 2,2,2 in the cobbler-ubuntu-import script due to an error when verifying the GPG signature.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC πŸ•΄

Money meant to fund an Israeli startup wound up directly deposited to the scammers.

πŸ“– Read

via "Dark Reading: ".
❌ Email Voted a Weak Link for Election Security, with DMARC Lagging ❌

Most counties are not protected from impersonation-based spearphishing attacks.

πŸ“– Read

via "Threatpost".
⚠ Monday review – the hot 22 stories of the week ⚠

Get up to date with the hot security stories from the past week - from fake Android apps to malware targeting Mac users.

πŸ“– Read

via "Naked Security".
⚠ $5m bounty set on the alleged head of Evil Corp banking Trojan group ⚠

Know where Maksim β€œAqua” Yakubets is? Can you pry him out of Russia and his Lamborghinis? The biggest ever cybercrook reward awaits!

πŸ“– Read

via "Naked Security".
⚠ Facebook suing ILikeAd for hijacking users’ ad accounts ⚠

Facebook says the company used celeb bait links to infect victims with malware and hijacked their ad accounts to sell diet pills.

πŸ“– Read

via "Naked Security".
⚠ HackerOne pays $20,000 bounty after breach of own systems ⚠

In an embarrassing twist, bug bounty platform HackerOne has paid a $20,000 reward to a researcher who reported a security flaw inadvertently caused by one of its staff during… a bug submission.

πŸ“– Read

via "Naked Security".
⚠ Networking attack gives hijackers VPN access ⚠

Researchers have discovered a flaw in macOS, Linux, and several other operating systems that could let attackers hijack VPN connections.

πŸ“– Read

via "Naked Security".
πŸ•΄ New: From the Core to the Edge: 7 Reasons You Need Security at the Edge πŸ•΄

No longer can you secure the perimeter and trust that nothing will get in or out.

πŸ“– Read

via "Dark Reading: ".
❌ Reddit Says Influence Campaign is Behind Leaked U.S.-U.K. Trade Documents ❌

The platform has linked documents posted on its site to a vote-manipulation campaign already observed on Facebook earlier this year.

πŸ“– Read

via "Threatpost".
πŸ•΄ 4 Tips to Run Fast in the Face of Digital Transformation πŸ•΄

This gridiron-inspired advice will guarantee your digital transformation success and keep your data safe.

πŸ“– Read

via "Dark Reading: ".
❌ GE, Dunkin’, Forever 21 Caught Up in Broad Internal Document Leak ❌

A PR and marketing provider exposed sensitive data for a raft of big-name companies.

πŸ“– Read

via "Threatpost".
πŸ›  DroneSploit Black Hat Europe 2019 Release πŸ› 

DroneSploit is a CLI framework that is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  GNU Privacy Guard 2.2.19 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Criminals Hide Fraud Behind the Green Lock Icon πŸ•΄

Criminals are using free certificate services to apply real security certs to fraudulent sites - and to take advantage of victims looking for surfing safety.

πŸ“– Read

via "Dark Reading: ".