πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Critical Android flaws patched in February bulletin ⚠

Google has patched Android bugs that include a couple of critical flaws that could let hackers run their own code on the mobile operating system.

πŸ“– Read

via "Naked Security".
⚠ Facebook will let parents see kids’ chat history, peer into inbox ⚠

It's revamping Messenger Kids with new parental controls and updated information on its children’s data policy.

πŸ“– Read

via "Naked Security".
⚠ Someone else may have your videos, Google tells users ⚠

As the well-worn internet saying goes - there is no cloud, it’s just someone else’s computer.

πŸ“– Read

via "Naked Security".
πŸ” How to defend your organization against the latest malware, botnets and security exploits πŸ”

Though the fourth quarter of 2019 saw a decrease in malicious activity, threats such as the Emotet malware continued to thrive, says Nuspire.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Hiring Untapped Security Talent Can Transform the Industry πŸ•΄

Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting

πŸ“– Read

via "Dark Reading: ".
πŸ” Report: Smart bulbs have a major security problem πŸ”

Many Philips Hue smart light bulbs have a firmware flaw that leads hackers into an entire network, Check Point Research found.

πŸ“– Read

via "Security on TechRepublic".
❌ Critical Cisco β€˜CDPwn’ Flaws Break Network Segmentation ❌

Cisco has released patches to address the five vulnerabilities, which could lead to remote code-execution and denial of service.

πŸ“– Read

via "Threatpost".
❌ Critical Cisco β€˜CDPwn’ Protocol Flaws Explained: Podcast ❌

The researcher behind the five critical Cisco flaws, collectively called CDPwn, talks about why Layer 2 protocols are under-researched when it comes to security vulnerabilities.

πŸ“– Read

via "Threatpost".
❌ WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE ❌

A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2013-0507

IBM InfoSphere Information Server 8.1, 8.5, 8.7, 9.1 has a Session Fixation Vulnerability

πŸ“– Read

via "National Vulnerability Database".
⚠ PayPal SMS scams – don’t fall for them! ⚠

Text messages may be old hat - but SMS is still a handy tool for crooks out to find more about you.

πŸ“– Read

via "Naked Security".
⚠ Coronavirus β€œsafety measures” email is a phishing scam ⚠

Sadly, cybercrooks love a crisis, because it gives them a believable reason to contact you with a phishing scam. Take care out there!

πŸ“– Read

via "Naked Security".
❌ New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers ❌

Malware campaign targets global manufacturers that are still dependent on Windows 7 subsystems to run fleets of IoT endpoints.

πŸ“– Read

via "Threatpost".
πŸ•΄ Keeping Compliance Data-Centric Amid Accelerating Regulation πŸ•΄

As the regulatory landscape transforms, it's still smart to stay strategically focused on protecting your data.

πŸ“– Read

via "Dark Reading: ".
πŸ›  ISO-8385 Protocol Fuzzer πŸ› 

This python script is a fuzzer for the ISO-8385 financial protocol. It is compatible with sulley and bofuzz and is now part of the official bofuzz release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  nfstream 3.1.2 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Clam AntiVirus Toolkit 0.102.2 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” SEC Issues Cybersecurity and Resiliency Best Practices πŸ”

Data loss prevention is one of eight key practices outlined by the SEC last week to enhance cybersecurity preparedness and operational resiliency.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Tips on keeping a Google Photos-type video bug from impacting cloud-based files πŸ”

The private videos of some Google Photos users were accidentally shared with other people. Here's how to secure online files to protect them from exposure.

πŸ“– Read

via "Security on TechRepublic".
❌ CamuBot Banking Trojan Returns In Targeted Attacks ❌

The malware is back in targeted attacks against Brazilian banking customers, this time using a new technique that involves mobile app authorization.

πŸ“– Read

via "Threatpost".
πŸ•΄ What is a Privileged Access Workstation (PAW)? πŸ•΄

Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.

πŸ“– Read

via "Dark Reading: ".