πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Fraudsters posed as art dealer, bilked museum for millions ⚠

Scammers got away with a $3.1m BEC heist, art dealer and museum blame each other, and ownership of a valuable landscape is up in the air.

πŸ“– Read

via "Naked Security".
❌ TrickBot Switches to a New Windows 10 UAC Bypass to Evade Detection ❌

The tricky trojan evolves yet again, remaining one of the most advanced vehicles for delivering malware.

πŸ“– Read

via "Threatpost".
⚠ FTC warns VoIP providers that help robocallers: we can and will sue ⚠

It put 19 internet-calling companies on notice that helping illegal robocalls is illegal. It has sued before, and it can do it again.

πŸ“– Read

via "Naked Security".
⚠ Apple proposes simple security upgrade for SMS 2FA codes ⚠

Apple thinks it's come up with a simple way to make SMS two-factor authentication (2FA) one-time codes less susceptible to phishing attacks.

πŸ“– Read

via "Naked Security".
πŸ•΄ How Device-Aware 2FA Can Defeat Social Engineering Attacks πŸ•΄

While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why.

πŸ“– Read

via "Dark Reading: ".
❌ Ashley Madison Breach Extortion Scam Targets Hundreds ❌

A new extortion attack has targeted hundreds of users affected by the Ashley Madison breach over the past week.

πŸ“– Read

via "Threatpost".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.2 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Phishing tournament finds employees falling prey to malicious emails πŸ”

The Gone Phishing Tournament tested how susceptible people are to opening fraudulent emails and entering their login information.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Enterprises Are Developing and Maintaining Secure Applications πŸ•΄

The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Coronavirus Phishing Attack Infects US, UK Inboxes πŸ•΄

Cybercriminals capitalize on fears of a global health emergency with phishing emails claiming to offer advice for protecting against coronavirus.

πŸ“– Read

via "Dark Reading: ".
❌ Tesla Autopilot Duped By β€˜Phantom’ Images ❌

Researchers were able to fool popular autopilot systems into perceiving projected images as real - causing the cars to brake or veer into oncoming traffic lanes.

πŸ“– Read

via "Threatpost".
πŸ” 3D map shows how the coronavirus spread worldwide πŸ”

A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Facebook's $550M Biometric Settlement Is a Data Privacy Law Landmark πŸ”

The settlement, one of the highest in US history, is a testament to robust privacy legislation.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ AZORult Campaign Adopts Novel Triple-Encryption Technique ❌

Popular trojan is sneaking its way onto PCs via malspam campaign that uses three levels of encryption to sneak past cyber defenses.

πŸ“– Read

via "Threatpost".
πŸ•΄ Attackers Actively Targeting Flaw in Door-Access Controllers πŸ•΄

There's been a sharp increase in scans for vulnerable Nortek Linear Emerge E3 systems, SonicWall says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Find 24 'Dangerous' Android Apps with 382M Installs πŸ•΄

Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ C-Level & Studying for the CISSP πŸ•΄

One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ EKANS Ransomware Raises Industrial-Control Worries πŸ•΄

Although the ransomware is unsophisticated, the malware does show that some crypto-attackers are targeting certain industrial control products.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Bad Certificate Knocks Teams Off Line πŸ•΄

Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Bad Certificate Knocks Teams Offline πŸ•΄

Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.

πŸ“– Read

via "Dark Reading: ".