πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” California AG Issues Revised CCPA Draft Rules πŸ”

On Friday, with just under five months to go until CCPA is enforced, California's Attorney General released a modified version of draft regulations for implementing the law.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Active PayPal Phishing Scam Targets SSNs, Passport Photos ❌

Phishing emails have been uncovered that request a full rundown of personal data - even asking for photos of passports.

πŸ“– Read

via "Threatpost".
❌ BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver ❌

The RobbinHood ransomware is using a deprecated Gigabyte driver as the tip of the spear for taking out antivirus products.

πŸ“– Read

via "Threatpost".
πŸ•΄ Israel's Entire Voter Registry Exposed in Massive Incident πŸ•΄

Personal details of nearly 6.5 million Israelis were out in the open after the entire registry was uploaded to an notably insecure app.

πŸ“– Read

via "Dark Reading: ".
πŸ” Kubernetes rollouts: 5 security best practices πŸ”

If you don't follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Some Democrats Lead Trump in Campaign Domain-Security Efforts πŸ•΄

Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How North Korea's Senior Leaders Harness the Internet πŸ•΄

Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2011-1596

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
⚠ Facebook’s Twitter and Instagram accounts hijacked ⚠

In full glare of the world, Facebook admins have found themselves in an unseemly struggle to wrestle back control of the company’s Twitter accounts.

πŸ“– Read

via "Naked Security".
πŸ” IBM X-Force Threat Index finds Google, Apple, Amazon are most often spoofed πŸ”

Attacks on industrial control systems are up and code for banking trojans and ransomware is evolving the fastest.

πŸ“– Read

via "Security on TechRepublic".
⚠ Officials raise alarm about Chinese hacking ⚠

Officials pointed to ongoing threats against US institutions, painting a dire picture of hacking efforts to support Chinese economic goals.

πŸ“– Read

via "Naked Security".
⚠ Freedom Hosting owner pleads guilty to distributing child abuse images ⚠

Eric Eoin Marques has pleaded guilty to running what was once believed to be the largest child abuse hosting provider on the dark web.

πŸ“– Read

via "Naked Security".
❌ Dell Patches SupportAssist Flaw That Allows Arbitrary Code Execution ❌

The uncontrolled search path vulnerability allows a local user to use DLLs to escalate privileges and affects Windows PCs.

πŸ“– Read

via "Threatpost".
πŸ” PayPal tops the list of most impersonated brand in phishing attacks πŸ”

Facebook impersonations came in second place among phishing campaigns, followed by Microsoft, said email security firm Vade Secure.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Security and disaster recovery are priorities when choosing data center provider πŸ”

Security and compliance are key factors to consider when outsourcing your data center, according to a report from data center provider US Signal.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 51% say automation will result in job loss for IT security pros πŸ”

Security automation will reshape hiring trends in both the US and the UK, according to a new report.

πŸ“– Read

via "Security on TechRepublic".
⚠ 5 tips for businesses on Safer Internet Day ⚠

Safer Internet Day - here's how to make your business better at cybersecurity, no matter how safe you are already!

πŸ“– Read

via "Naked Security".
⚠ 5 tips for you and your family on Safer Internet Day ⚠

Why not make Safer Internet Day the excuse you need to do all those cybersecurity tweaks you've been putting off?

πŸ“– Read

via "Naked Security".
πŸ•΄ Keeping a Strong Security Metrics Framework Strong πŸ•΄

Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage πŸ•΄

Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.

πŸ“– Read

via "Dark Reading: ".
πŸ›  GRR 3.4.0.4 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".