πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ UN hacked via unpatched SharePoint server ⚠

UN staffers: the "entire domain" was probably compromised by an attacker who was lurking on the UN's networks.

πŸ“– Read

via "Naked Security".
❌ Sodinokibi Ransomware Group Sponsors Hacking Contest ❌

Larger winnings for underground skills competitions are attracting sophisticated crime groups.

πŸ“– Read

via "Threatpost".
πŸ” How to avoid the mistakes made in the UN data breach πŸ”

Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Lulzbuster 1.1.0 πŸ› 

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.2.6 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Faraday 3.10.2 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Zero Day Initiative Bug Hunters Rake in $1.5M in 2019 ❌

Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.

πŸ“– Read

via "Threatpost".
πŸ” How to change iOS 13 settings for better security πŸ”

Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings.

πŸ“– Read

via "Security on TechRepublic".
⚠ Serious Security – How β€˜special case’ code blew a hole in OpenSMTPD ⚠

Patch now before you receive a message that's more than just bad news!

πŸ“– Read

via "Naked Security".
πŸ•΄ AppSec Concerns Drove 61% of Businesses to Change Applications πŸ•΄

According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 1/31 Edition πŸ”

The state of New York may ban ransomware payments, NFL Twitter accounts get hacked, and Facebook releases a new data privacy tool for users - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2011-4117

The Batch::BatchRun module 1.03 for Perl does not properly handle temporary files.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4116

_is_safe in the File::Temp module for Perl does not properly handle symlinks.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4115

Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4088

ABRT might allow attackers to obtain sensitive information from crash reports.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ashley Madison Breach Returns with Extortion Campaign πŸ•΄

The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach.

πŸ“– Read

via "Dark Reading: ".
❌ Iranian Hackers Target U.S. Gov. Vendor With Malware ❌

APT34 has been spotted in a malware campaign targeting customers and employees of a company that works closely with U.S. federal agencies, and state and local governments.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'George' the Most Popular Password That's a Name πŸ•΄

A new study of stolen passwords reflects the consequences of password overload.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ What It's Like to Be a CISO: Check Point Security Leader Weighs In πŸ•΄

Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software.

πŸ“– Read

via "Dark Reading: ".
πŸ” Ashley Madison breach victims have more to worry about πŸ”

Five-year old data from the site's breach is at the center of a new cryptocurrency ransom campaign, and it may be the beginning of a new trend.

πŸ“– Read

via "Security on TechRepublic".