πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC πŸ•΄

Money meant to fund an Israeli startup wound up directly deposited to the scammers.

πŸ“– Read

via "Dark Reading: ".
❌ Email Voted a Weak Link for Election Security, with DMARC Lagging ❌

Most counties are not protected from impersonation-based spearphishing attacks.

πŸ“– Read

via "Threatpost".
⚠ Monday review – the hot 22 stories of the week ⚠

Get up to date with the hot security stories from the past week - from fake Android apps to malware targeting Mac users.

πŸ“– Read

via "Naked Security".
⚠ $5m bounty set on the alleged head of Evil Corp banking Trojan group ⚠

Know where Maksim β€œAqua” Yakubets is? Can you pry him out of Russia and his Lamborghinis? The biggest ever cybercrook reward awaits!

πŸ“– Read

via "Naked Security".
⚠ Facebook suing ILikeAd for hijacking users’ ad accounts ⚠

Facebook says the company used celeb bait links to infect victims with malware and hijacked their ad accounts to sell diet pills.

πŸ“– Read

via "Naked Security".
⚠ HackerOne pays $20,000 bounty after breach of own systems ⚠

In an embarrassing twist, bug bounty platform HackerOne has paid a $20,000 reward to a researcher who reported a security flaw inadvertently caused by one of its staff during… a bug submission.

πŸ“– Read

via "Naked Security".
⚠ Networking attack gives hijackers VPN access ⚠

Researchers have discovered a flaw in macOS, Linux, and several other operating systems that could let attackers hijack VPN connections.

πŸ“– Read

via "Naked Security".
πŸ•΄ New: From the Core to the Edge: 7 Reasons You Need Security at the Edge πŸ•΄

No longer can you secure the perimeter and trust that nothing will get in or out.

πŸ“– Read

via "Dark Reading: ".
❌ Reddit Says Influence Campaign is Behind Leaked U.S.-U.K. Trade Documents ❌

The platform has linked documents posted on its site to a vote-manipulation campaign already observed on Facebook earlier this year.

πŸ“– Read

via "Threatpost".
πŸ•΄ 4 Tips to Run Fast in the Face of Digital Transformation πŸ•΄

This gridiron-inspired advice will guarantee your digital transformation success and keep your data safe.

πŸ“– Read

via "Dark Reading: ".
❌ GE, Dunkin’, Forever 21 Caught Up in Broad Internal Document Leak ❌

A PR and marketing provider exposed sensitive data for a raft of big-name companies.

πŸ“– Read

via "Threatpost".
πŸ›  DroneSploit Black Hat Europe 2019 Release πŸ› 

DroneSploit is a CLI framework that is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  GNU Privacy Guard 2.2.19 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Criminals Hide Fraud Behind the Green Lock Icon πŸ•΄

Criminals are using free certificate services to apply real security certs to fraudulent sites - and to take advantage of victims looking for surfing safety.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Nation-State Attackers May Have Co-opted Vega Ransomware πŸ•΄

The tactics used by the latest version of the Vega cryptolocker program indicates the code may have been stolen from its authors and is now being used for destructive attacks, a new report suggests.

πŸ“– Read

via "Dark Reading: ".
⚠ Will the new iPhone 11 track you even if you tell it not to? ⚠

Does turning location access off for all your apps mean that location access is off altogether?

πŸ“– Read

via "Naked Security".
πŸ•΄ 10 Notable Cybersecurity Acquisitions of 2019, Part 2 πŸ•΄

As mergers and acquisitions continued to shape the security industry throughout 2019, these deals were most significant.

πŸ“– Read

via "Dark Reading: ".
❌ Elder Scrolls Online Targeted by Cybercrooks Hunting In-Game Loot ❌

A phishing attack is masquerading as messages from the game's developers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Two Bayrob Cybercrime Members Sentenced to 20 and 18 Years in Prison πŸ•΄

The Romanian nationals stole some $4 million in a vast malware, botnet, and cryptocurrency operation.

πŸ“– Read

via "Dark Reading: ".
πŸ” NYDFS Cybersecurity TPSP Certification of Compliance Deadline Looms πŸ”

The New York Department of Financial Services' Cybersecurity Regulation was implemented years ago but one of the regulation's compliance deadlines remains.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Intel expert divulges security trends πŸ”

Intel's Amit Elazari Bar On discussed IoT security, ethical hackers, bug bounties, and more.

πŸ“– Read

via "Security on TechRepublic".