πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ 5 tips to avoid spear-phishing attacks ⚠

Our tips will help you boost your resistance to phishing, even when the crooks make a determined effort to reel you in.

πŸ“– Read

via "Naked Security".
❌ News Wrap: PoC Exploits, Cable Haunt and Joker Malware ❌

Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.

πŸ“– Read

via "Threatpost".
πŸ” Why blockchain-based cybersecurity may be the answer for vulnerable IoT networks πŸ”

CES 2020: A "hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats.

πŸ“– Read

via "Security on TechRepublic".
❌ Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea? ❌

Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?

πŸ“– Read

via "Threatpost".
πŸ” Why baby boomers are looking to IoT and analytics to stay safe πŸ”

IoT security is becoming a top-of-mind priority in the personal care industry. Essence group believes it has the solution and had it on display at CES 2020.

πŸ“– Read

via "Security on TechRepublic".
❌ Mobile Carrier Customer Service Ushers in SIM-Swap Fraud ❌

Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2007-6070

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-1382. Reason: This candidate is a reservation duplicate of CVE-2008-1382. Notes: All CVE users should reference CVE-2008-1382 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
❌ Feds Cut Off Access to Billions of Breached Records with Site Takedown ❌

The WeLeakInfo "data breach notification" domain is no more.

πŸ“– Read

via "Threatpost".
❌ New JhoneRAT Malware Targets Middle East ❌

Researchers say that JhoneRAT has various anti-detection techniques - including making use of Google Drive, Google Forms and Twitter.

πŸ“– Read

via "Threatpost".
πŸ” This new startup aims to make developers love security πŸ”

Commentary: As more workloads move to the cloud, developers need help with security. Find out how the startup Cyral is helping to improve data security in the cloud.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 27 stories of the week ⚠

From nasty snakes to rickrolling the NSA, get up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Facebook and Instagram ban alleged β€˜brainwashing’ service ⚠

The Spinner personalises β€œsubconscious influencing” for a specific target.

πŸ“– Read

via "Naked Security".
⚠ Teen entered β€˜dark rabbit hole of suicidal content’ online ⚠

Molly Russell's grieving father has backed a psychiatrists' report, saying that tech companies must be forced to hand over anonymized data.

πŸ“– Read

via "Naked Security".
⚠ FBI to inform election officials about hacking attempts ⚠

The FBI has announced that it will tell local election officials when hackers try to infiltrate their systems.

πŸ“– Read

via "Naked Security".
⚠ FBI seizes credentials-for-sale site WeLeakInfo.com ⚠

The FBI has seized the domain for WeLeakInfo.com, a site that sold breached data records, after a multinational effort by law enforcement.

πŸ“– Read

via "Naked Security".
πŸ•΄ Are We Secure Yet? How to Build a "Post-Breach" Culture πŸ•΄

There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Maavi Fuzzing Utility πŸ› 

Maavi is a fuzzing tool that scans for vulnerabilities with obfuscated payloads. Has proxy support, records full history of actions, and has various bells and whistles.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” New Bill Would Aid CCPA Compliance for HIPAA Business Associates πŸ”

A new bill in California would amend the CCPA and further health data exemptions - namely data that's been de-identified in the eyes of HIPAA.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Are We Secure Yet? How to Build a 'Post-Breach' Culture πŸ•΄

There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to access your 2FA Docker Hub account from the command line πŸ”

With 2FA enabled on your Docker Hub account, you'll find you cannot access it with your user password from within the CLI. Jack Wallen shows you how to make this work.

πŸ“– Read

via "Security on TechRepublic".