The Linux Choice 🐧
368 subscribers
708 photos
133 videos
96 files
3.91K links
T-L-C is Channel Everything you need to know about Computer Technology and Security of latest News and Hacks. Also we work on pentesting we made this page to show the skils that we and other people could.Thanks for following us.Will be posting alot. 3301
Download Telegram
What the Chinese TikTok's Data Collection
1,user data
2,location
3,contact
4,all the photo on your phone
5,what's on your clipboard
6,what app you have installed
7,browser history
8,anything that is on your phone tiktok if going to try to collect it
9,in-app data photo you post,what you like,what you comment, private massage,
Vulnerability Affecting Routers From Many Vendors Exploited Days After Disclosure
http://feedproxy.google.com/~r/securityweek/~3/UMA4BMZYmtI/vulnerability-affecting-routers-many-vendors-exploited-days-after-disclosure

Cybercriminals quickly started exploiting a vulnerability that affects routers and modems from many vendors that use the same underlying firmware.
On August 3, cybersecurity firm Tenable published a blog post describing a vulnerability affecting routers that use firmware from Arcadyan, a Taiwan-based provider of networking solutions.
read more (https://www.securityweek.com/vulnerability-affecting-routers-many-vendors-exploited-days-after-disclosure)
A Deeper Dive Into Zero-Trust and Biden's Cybersecurity Executive Order
http://feedproxy.google.com/~r/securityweek/~3/O__gkR9gTgw/deeper-dive-zero-trust-and-bidens-cybersecurity-executive-order

On May 12, 2021, President Biden signed an Executive Order (EO) on Improving the Nation’s Cybersecurity. It is a detailed overview of the Federal government’s plan to better secure America – and it calls out zero-trust as a major pillar of that process.
The Executive Order
read more (https://www.securityweek.com/deeper-dive-zero-trust-and-bidens-cybersecurity-executive-order)
Getting started with secret vaults in PowerShell
https://techgenix.com/secret-vaults-in-powershell/

Here’s how to store credentials in a secret vault and then design PowerShell scripts that can access the secrets from within the vault.
The post Getting started with secret vaults in PowerShell (https://techgenix.com/secret-vaults-in-powershell/) appeared first on TechGenix (https://techgenix.com/).
How to Train Your SOC Staff: What Works and What Doesn't
http://feedproxy.google.com/~r/securityweek/~3/UWALY-YGiKw/how-train-your-soc-staff-what-works-and-what-doesnt

We’re all familiar with the shortage of talent to staff security operations centers (SOCs), the challenge of hiring qualified cyber security professionals, and that burnout and overwork makes it impossible to keep good staff. So why not make an effort to hang on to your security analysts and make sure they stay up to the challenge? 
read more (https://www.securityweek.com/how-train-your-soc-staff-what-works-and-what-doesnt)
Cyberattacks spur flurry of July patches from Apple, Google, Linux and more
https://techgenix.com/july-patch-roundup/

As we’ve seen, Microsoft rolled out a lot of patches in July. But the big non-Microsoft vendors, including Adobe, Google, and Linux, were also busy.
The post Cyberattacks spur flurry of July patches from Apple, Google, Linux and more (https://techgenix.com/july-patch-roundup/) appeared first on TechGenix (https://techgenix.com/).