πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ New Social Engineering Event to Train Business Pros on Human Hacking πŸ•΄

The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Lulzbuster 1.0.0 πŸ› 

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Monday review – the hot 21 stories of the week ⚠

From a big Microsoft data breach to the seizing of a stolen-creds site by the FBI - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ New York wants to ban taxpayer-funded ransomware payments ⚠

One of the proposed bills would set up a $5m fund to help small towns upgrade their systems and bolster their security.

πŸ“– Read

via "Naked Security".
⚠ Instagram CEO’s homes were targetted by SWATters ⚠

Instagram CEO Adam Mosseri's houses were surrounded by SWAT teams after hoax phone calls claimed hostages were being held there.

πŸ“– Read

via "Naked Security".
⚠ Tinder to get panic button, catfish-fighting facial recognition ⚠

It's both a genius move to protect from assault and fraud and a personal data grab.

πŸ“– Read

via "Naked Security".
❌ Mandatory IoT Security in the Offing with U.K. Proposal ❌

The new U.K. law mandates that manufacturers apply several security controls to their connected devices.

πŸ“– Read

via "Threatpost".
⚠ Cardplanet mastermind pleads guilty to credit card fraud ⚠

Cardplanet offered refunds on invalid card data, along with a card checking service that ensured a stolen card was still valid.

πŸ“– Read

via "Naked Security".
πŸ” What's your organization's cybersecurity strategy? πŸ”

Take this quick, multiple choice survey and tell us about your company's cybersecurity strategies for the upcoming year.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Greater Focus on Privacy Pays Off for Firms πŸ•΄

Privacy-mature companies complete sales more quickly, have fewer and less serious breaches, and recover from incidents faster, according to Cisco's annual survey.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-4558

Tiki 8.2 and earlier allows remote administrators to execute arbitrary PHP code via crafted input to the regexres and regex parameters.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2006-7246

NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.

πŸ“– Read

via "National Vulnerability Database".
❌ N.Y. Could Ban Cities from Paying Ransomware Attackers ❌

State senators have issued proposals they say would encourage municipalities to upgrade their cyber-postures.

πŸ“– Read

via "Threatpost".
πŸ” Insider Leaked 1.2K Patient Records for 20 Months πŸ”

The employee accessed information, including names, addresses, and social security numbers, from Feb. 2017 to Oct. 2019.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ As Necurs Botnet Falls from Grace, Emotet Rises ❌

Researchers wonder if a recent "amateur spam" campaign by the once-prevalant malware distribution botnet is a sign of trojans looking to other infection paths.

πŸ“– Read

via "Threatpost".
❌ Google, Mozilla Ban Hundreds of Browser Extensions in Chrome, Firefox ❌

After discovering a wide pattern of potentially malicious behavior in browser extensions, the two search giants are cracking down.

πŸ“– Read

via "Threatpost".
πŸ” How to protect previous Firefox tabs from being hijacked πŸ”

Learn how to secure Firefox tabs from mischief with the Don't Touch My Tabs add-on.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Risk managers: Here are the must-have skills for 2020 πŸ”

The risk management field is growing more challenging as threats evolve. How will these changing threats affect your organization in 2020?

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Aircrack-ng Wireless Network Tools 1.6 πŸ› 

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".