Monday, November 7, 2022

Malwarebytes Newsletter

How to delete your email and phone number from Facebook.

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 08 November 2022, 0352 UTC.  Content provided by email subscription to "Malwarebytes Newsletter."

Source:  https://mail.google.com/mail/u/0/?ogbl#inbox/FMfcgzGqRQHbrHmLQnxxxjWGzsVTfqbb

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).


Malwarebytes noreply@e.malwarebytes.com Unsubscribe

12:57 PM (4 hours ago)
to me
Malwarebytes
View in browserView in browser
Malwarebytes Newsletter
BIG NEWS
fruit
How to delete your email and phone number from Facebook
If any of your friends have ever uploaded their contact list to Facebook then Meta probably has your phone number, even if you’ve never had an account. Here’s how to delete and block that.
Keep Reading
calculator
LinkedIn introduces new security features to combat fake accounts
After a deluge of fake or bot accounts these past few months, LinkedIn says it’s begun to roll out some new security features.
Keep Reading
Chromelogo
Raccoon Stealer admin will be extradited to the US, charged for computer crimes
Mark Sokolovsky, known online as “raccoonstealer”, was indicted by the US government for being an admin of a
malware-as-a-service provider for the Raccoon Stealer malware.
Keep Reading
podcast
A Chrome fix for an in-the-wild exploit is out—Check your version
Google has issued an update for Chrome to fix a vulnerability that is currently being exploited. Make sure you are on the most up-to-date version.
Keep Reading
FREE EMAIL SECURITY CHECK
data breach
Data breaches occur when hackers target organizations, looking to steal data they can sell on the Dark Web. Most data breaches include information like usernames, passwords and email addresses. See if your email is associated with any data breaches and learn what steps you can take if it has.
data breach
MALWAREBYTES PREMIUM
Malwarebytes offers innovative cybersecurity for your Windows, Mac, Android, Chromebook, and iOS devices.
Malwarebytes VPN Logo
Malwarebytes Premium
Protection for you, anywhere,
on any device
Learn_more
WINDOWSMACANDROIDChromeIOS
QUICK LINKS
Lock and Podcasts
Lock and Code Podcast
Our Blog
Our Blog
Cybersecurity Basics
Cybersecurity Basics
Subscribe to our Business Newsletter
Subscribe to our Business Newsletter
Share thisE-Mailtwitterfacebookinstagram
Privacy Policy  |  Terms of Service  |  Unsubscribe

The Hacker News Daily Updates

Hidden Facebook tool lets users remove their email or phone number shared by others.

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 07 November 2022, 2032 UTC.  Content supplied by email subscription to "The Hacker News Daily Updates."

Source:  https://mail.google.com/mail/u/0/?ogbl#inbox/FMfcgzGqRQHbXLbQhzSCdRdfcfPnvkTr

Please click link or scroll down to read your selections. Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

The Hacker News Daily Updates
Newsletter
cover

2022 Zscaler ThreatLabz State of Phishing Report

Phishing has long been one of the most pervasive cyberthreats, and it grows every year.

Download NowSponsored
LATEST NEWSNov 7, 2022

This Hidden Facebook Tool Lets Users Remove Their Email or Phone Number Shared by Others

Facebook appears to have silently rolled out a tool that allows users to remove their contact information, such as phone numbers and email addresses, uploaded by others. The existence of the tool, which is buried inside a Help Center page about "Friending," was first reported by Business ...

Read More
TwitterFacebookLinkedIn

Experts Find URLScan Security Scanner Inadvertently Leaks Sensitive URLs and Data

Security researchers are warning of "a trove of sensitive information" leaking through urlscan.io, a website scanner for suspicious and malicious URLs. "Sensitive URLs to shared documents, password reset pages, team invites, payment invoices and more are publicly listed and searchable," Positive ...

Read More
TwitterFacebookLinkedIn

Robin Banks Phishing Service for Cybercriminals Returns with Russian Server

A phishing-as-a-service (PhaaS) platform known as Robin Banks has relocated its attack infrastructure to DDoS-Guard, a Russian provider of bulletproof hosting services. The switch comes after "Cloudflare disassociated Robin Banks phishing infrastructure from its services, causing a multi-day ...

Read More
TwitterFacebookLinkedIn

Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer

Cybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software repository for the Python programming language, that aim to infect developers' machines with a malware called W4SP Stealer. "The main attack seems to have started around October ...

Read More
TwitterFacebookLinkedIn

Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities

Microsoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for breaching target environments. The tech giant, in its 114-page Digital Defense Report, said it has "observed a reduction in the time between the ...

Read More
TwitterFacebookLinkedIn

Researchers Detail New Malware Campaign Targeting Indian Government Employees

The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. "This group abuses Google advertisements for the purpose of malvertising to distribute backdoored versions ...

Read More
TwitterFacebookLinkedIn

Your OT Is No Longer Isolated: Act Fast to Protect It

Not too long ago, there was a clear separation between the operational technology (OT) that drives the physical functions of a company – on the factory floor, for example – and the information technology (IT) that manages a company's data to enable management and planning.  As IT assets became ...

Read More
TwitterFacebookLinkedIn

CISA Warns of Critical Vulnerabilities in 3 Industrial Control System Software

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published three Industrial Control Systems (ICS) advisories about multiple vulnerabilities in software from ETIC Telecom, Nokia, and Delta Industrial Automation. Prominent among them is a set of three flaws affecting ETIC ...

Read More
TwitterFacebookLinkedIn
cover

Zero Trust Access for Dummies. Never trust. Always verify.

Understanding the Need for Zero Trust

Download NowSponsored

Cyber War News Today.

"From trade wars to cyber wars in modern era." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are ...