πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Ashley Madison breach victims have more to worry about πŸ”

Five-year old data from the site's breach is at the center of a new cryptocurrency ransom campaign, and it may be the beginning of a new trend.

πŸ“– Read

via "Security on TechRepublic".
❌ Evil Corp Returns With New Malware Infection Tactic ❌

Researchers have observed the cybercrime group back in action, now using a new tactic for distributing malware.

πŸ“– Read

via "Threatpost".
❌ Advanced Obfuscation Marks Widespread Info-Stealing Campaign ❌

Agent Tesla and LokiBot are common payloads in the botnet-driven spam effort.

πŸ“– Read

via "Threatpost".
πŸ” Super Bowl 54: How 5G will help keep fans safe at the game πŸ”

High-tech security features will help keep 49ers and Chiefs fans safe during Super Bowl weekend in Miami.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Hackers using coronavirus scare to spread Emotet malware in Japan πŸ”

Cybercriminals are using global fears about the virus to spread the Emotet trojan.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 25 stories of the week ⚠

From exposing private data on Trello to critical iPhone bugs - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Google launches open-source security key project, OpenSK ⚠

OpenSK is a piece of firmware that you can install on a USB dongle of your own, turning it into a usable FIDO or U2F key.

πŸ“– Read

via "Naked Security".
⚠ Fraudsters posed as art dealer, bilked museum for millions ⚠

Scammers got away with a $3.1m BEC heist, art dealer and museum blame each other, and ownership of a valuable landscape is up in the air.

πŸ“– Read

via "Naked Security".
❌ TrickBot Switches to a New Windows 10 UAC Bypass to Evade Detection ❌

The tricky trojan evolves yet again, remaining one of the most advanced vehicles for delivering malware.

πŸ“– Read

via "Threatpost".
⚠ FTC warns VoIP providers that help robocallers: we can and will sue ⚠

It put 19 internet-calling companies on notice that helping illegal robocalls is illegal. It has sued before, and it can do it again.

πŸ“– Read

via "Naked Security".
⚠ Apple proposes simple security upgrade for SMS 2FA codes ⚠

Apple thinks it's come up with a simple way to make SMS two-factor authentication (2FA) one-time codes less susceptible to phishing attacks.

πŸ“– Read

via "Naked Security".
πŸ•΄ How Device-Aware 2FA Can Defeat Social Engineering Attacks πŸ•΄

While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why.

πŸ“– Read

via "Dark Reading: ".
❌ Ashley Madison Breach Extortion Scam Targets Hundreds ❌

A new extortion attack has targeted hundreds of users affected by the Ashley Madison breach over the past week.

πŸ“– Read

via "Threatpost".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.2 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Phishing tournament finds employees falling prey to malicious emails πŸ”

The Gone Phishing Tournament tested how susceptible people are to opening fraudulent emails and entering their login information.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Enterprises Are Developing and Maintaining Secure Applications πŸ•΄

The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Coronavirus Phishing Attack Infects US, UK Inboxes πŸ•΄

Cybercriminals capitalize on fears of a global health emergency with phishing emails claiming to offer advice for protecting against coronavirus.

πŸ“– Read

via "Dark Reading: ".
❌ Tesla Autopilot Duped By β€˜Phantom’ Images ❌

Researchers were able to fool popular autopilot systems into perceiving projected images as real - causing the cars to brake or veer into oncoming traffic lanes.

πŸ“– Read

via "Threatpost".
πŸ” 3D map shows how the coronavirus spread worldwide πŸ”

A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Facebook's $550M Biometric Settlement Is a Data Privacy Law Landmark πŸ”

The settlement, one of the highest in US history, is a testament to robust privacy legislation.

πŸ“– Read

via "Subscriber Blog RSS Feed ".