πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ How To Keep Your Privacy and Data Secure While Working With a Remote Team πŸ•΄

Implementing basic strategies can ensure your remote team's work will be secure, data will be protected, and you'll be far less exposed to security risks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners πŸ•΄

Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money - and cred with major criminal syndicates.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Android Malware for Mobile Ad Fraud Spiked Sharply in 2019 πŸ•΄

Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Two Vulnerabilities Found in Microsoft Azure Infrastructure πŸ•΄

Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.

πŸ“– Read

via "Dark Reading: ".
πŸ” How organizations should handle data breaches πŸ”

How an organization handles a breach can be just as critical as protecting against one, according to Security.org.

πŸ“– Read

via "Security on TechRepublic".
⚠ Facebook to pay $550m to settle face-tagging suit ⚠

A class-action lawsuit against Facebook for the use of its tag suggestions feature looks like it's finally done churning through the courts.

πŸ“– Read

via "Naked Security".
❌ Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program ❌

Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.

πŸ“– Read

via "Threatpost".
⚠ Financial tech firms disagree on ban of customer data screen-scraping ⚠

They use it to offer things like budgeting apps. It puts passwords and privacy at risk, but some say they can't afford to build APIs instead.

πŸ“– Read

via "Naked Security".
⚠ US Interior Dept extends drone grounding over foreign hacking fears ⚠

The DOI has doubled down on a previous order, keeping the agency’s drones grounded for another 30 days for a more in-depth security review.

πŸ“– Read

via "Naked Security".
⚠ UN hacked via unpatched SharePoint server ⚠

UN staffers: the "entire domain" was probably compromised by an attacker who was lurking on the UN's networks.

πŸ“– Read

via "Naked Security".
❌ Sodinokibi Ransomware Group Sponsors Hacking Contest ❌

Larger winnings for underground skills competitions are attracting sophisticated crime groups.

πŸ“– Read

via "Threatpost".
πŸ” How to avoid the mistakes made in the UN data breach πŸ”

Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Lulzbuster 1.1.0 πŸ› 

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.2.6 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Faraday 3.10.2 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Zero Day Initiative Bug Hunters Rake in $1.5M in 2019 ❌

Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.

πŸ“– Read

via "Threatpost".
πŸ” How to change iOS 13 settings for better security πŸ”

Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings.

πŸ“– Read

via "Security on TechRepublic".
⚠ Serious Security – How β€˜special case’ code blew a hole in OpenSMTPD ⚠

Patch now before you receive a message that's more than just bad news!

πŸ“– Read

via "Naked Security".
πŸ•΄ AppSec Concerns Drove 61% of Businesses to Change Applications πŸ•΄

According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.

πŸ“– Read

via "Dark Reading: ".