πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ HackerOne pays $20,000 bounty after breach of own systems ⚠

In an embarrassing twist, bug bounty platform HackerOne has paid a $20,000 reward to a researcher who reported a security flaw inadvertently caused by one of its staff during… a bug submission.

πŸ“– Read

via "Naked Security".
⚠ Networking attack gives hijackers VPN access ⚠

Researchers have discovered a flaw in macOS, Linux, and several other operating systems that could let attackers hijack VPN connections.

πŸ“– Read

via "Naked Security".
πŸ•΄ New: From the Core to the Edge: 7 Reasons You Need Security at the Edge πŸ•΄

No longer can you secure the perimeter and trust that nothing will get in or out.

πŸ“– Read

via "Dark Reading: ".
❌ Reddit Says Influence Campaign is Behind Leaked U.S.-U.K. Trade Documents ❌

The platform has linked documents posted on its site to a vote-manipulation campaign already observed on Facebook earlier this year.

πŸ“– Read

via "Threatpost".
πŸ•΄ 4 Tips to Run Fast in the Face of Digital Transformation πŸ•΄

This gridiron-inspired advice will guarantee your digital transformation success and keep your data safe.

πŸ“– Read

via "Dark Reading: ".
❌ GE, Dunkin’, Forever 21 Caught Up in Broad Internal Document Leak ❌

A PR and marketing provider exposed sensitive data for a raft of big-name companies.

πŸ“– Read

via "Threatpost".
πŸ›  DroneSploit Black Hat Europe 2019 Release πŸ› 

DroneSploit is a CLI framework that is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  GNU Privacy Guard 2.2.19 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Criminals Hide Fraud Behind the Green Lock Icon πŸ•΄

Criminals are using free certificate services to apply real security certs to fraudulent sites - and to take advantage of victims looking for surfing safety.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Nation-State Attackers May Have Co-opted Vega Ransomware πŸ•΄

The tactics used by the latest version of the Vega cryptolocker program indicates the code may have been stolen from its authors and is now being used for destructive attacks, a new report suggests.

πŸ“– Read

via "Dark Reading: ".
⚠ Will the new iPhone 11 track you even if you tell it not to? ⚠

Does turning location access off for all your apps mean that location access is off altogether?

πŸ“– Read

via "Naked Security".
πŸ•΄ 10 Notable Cybersecurity Acquisitions of 2019, Part 2 πŸ•΄

As mergers and acquisitions continued to shape the security industry throughout 2019, these deals were most significant.

πŸ“– Read

via "Dark Reading: ".
❌ Elder Scrolls Online Targeted by Cybercrooks Hunting In-Game Loot ❌

A phishing attack is masquerading as messages from the game's developers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Two Bayrob Cybercrime Members Sentenced to 20 and 18 Years in Prison πŸ•΄

The Romanian nationals stole some $4 million in a vast malware, botnet, and cryptocurrency operation.

πŸ“– Read

via "Dark Reading: ".
πŸ” NYDFS Cybersecurity TPSP Certification of Compliance Deadline Looms πŸ”

The New York Department of Financial Services' Cybersecurity Regulation was implemented years ago but one of the regulation's compliance deadlines remains.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Intel expert divulges security trends πŸ”

Intel's Amit Elazari Bar On discussed IoT security, ethical hackers, bug bounties, and more.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Maersk CISO Says NotPeyta Devastated Several Unnamed US firms πŸ•΄

At least two companies may have been dealt even more damage than the shipping giant, which lost nearly its entire global IT infrastructure.

πŸ“– Read

via "Dark Reading: ".
❌ Romanian Duo Receives Jailtime For Infecting 400,000 With Malware ❌

Since 2007, the two allegedly operated a cybercrime ring called "Bayrob Group."

πŸ“– Read

via "Threatpost".
⚠ Serious Security: Understanding how computers count ⚠

The hard disks that fail abruptly at 32,768 hours of use - why simply 'adding 1' can send you into oblivion.

πŸ“– Read

via "Naked Security".
❌ Birth Certificate Data Laid Bare on the Web in Multiple States ❌

A platform that allows online applications for copies of birth certificates did not store its data properly.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft 'Campaign Views' Offers Full Look at Office 365 Attacks πŸ•΄

Campaign views, arriving in public preview, aims to share more context around how attackers targeted an organization and whether its defenses worked.

πŸ“– Read

via "Dark Reading: ".