πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Trickbot Operators Now Selling Attack Tools to APT Actors πŸ•΄

North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.

πŸ“– Read

via "Dark Reading: ".
πŸ›  TestSSL 3.0rc6 πŸ› 

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Apple iOS 13.3 is here, bringing support for keyfobby authentication ⚠

Bullet-proof authentication is just a tap away!

πŸ“– Read

via "Naked Security".
⚠ December Patch Tuesday blunts WizardOpium attack chain ⚠

December 2019’s Patch Tuesday updates are, including a fix for the Windows flaw used in recently discovered WizardOpium attacks.

πŸ“– Read

via "Naked Security".
❌ Retail Cyberattacks Set to Soar 20% in 2019 Holiday Season ❌

A couple of factors this year are making the 2019 holiday shopping season a circus for cybercriminals when it comes to cyberattacks against retail orgs.

πŸ“– Read

via "Threatpost".
❌ Your Smart Christmas Lights Are Safer Than They Were Last Year ❌

Manufacturers of the Twinkly IoT-connected lights slightly boosted security by switching out the Wi-Fi module, according to Pen Test Partners.

πŸ“– Read

via "Threatpost".
πŸ•΄ Waking Up to Third-Party Security Risk πŸ•΄

You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep20: Why don’t they send ransomware on floppies anymore? ⚠

New episode available now!

πŸ“– Read

via "Naked Security".
πŸ” Organizations moving toward more rigorous security testing to ensure compliance πŸ”

More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Lessons from the NSA: Know Your Assets πŸ•΄

Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Smart Building Security Awareness Grows πŸ•΄

In 2020, expect to hear more about smart building security.

πŸ“– Read

via "Dark Reading: ".
⚠ Brexit – even cybercriminals want to have their say… ⚠

These crooks stashed a message in the virus code itelf - we found it, but we don't know which way to take it!

πŸ“– Read

via "Naked Security".
❌ Maze Ransomware Behind Pensacola Attack, Data Breach Looms ❌

Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached. 

πŸ“– Read

via "Threatpost".
⚠ Chrome 79 includes anti-phishing and hacked password protection ⚠

Version 79 of Chrome is out, and it promises to do a better job of protecting you against phishing sites and credential stuffing attacks.

πŸ“– Read

via "Naked Security".
⚠ Facebook refuses to break end-to-end encryption ⚠

Congress on Tuesday told Facebook it must put backdoors into its end-to-end encryption, or it'll be forced to.

πŸ“– Read

via "Naked Security".
πŸ•΄ Thanks, Larry! πŸ•΄

A no-tech trick, a la social engineering, can lead to huge corporate security consequences -- and it might just score the criminal a new car.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Get Organized Like a Villain πŸ•΄

What cybercrime group FIN7 can teach us about using agile frameworks.

πŸ“– Read

via "Dark Reading: ".
❌ All in the (Ransomware) Family: 10 Ways to Take Action ❌

Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware.

πŸ“– Read

via "Threatpost".
πŸ” Why Behavioral Analysis Should Play a Role in Data Protection Programs πŸ”

Ignoring the value in behavioral analytics could leave your data vulnerable to attack. We asked 18 security experts why behavioral analysis should factor into your data protection program.

πŸ“– Read

via "Subscriber Blog RSS Feed ".