9 January 2020
?
18:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-1261

Cross-site scripting (XSS) vulnerability in cgi-bin/scrut_fa_exclusions.cgi in Plixer International Scrutinizer NetFlow and sFlow Analyzer 8.6.2.16204 and other versions before 9.0.1.19899 allows remote attackers to inject arbitrary web script or HTML via the standalone parameter.

πŸ“– Read

via "National Vulnerability Database".
18:32
ATENTIONβ€Ό New - CVE-2012-1260

Cross-site scripting (XSS) vulnerability in cgi-bin/userprefs.cgi in Plixer International Scrutinizer NetFlow & sFlow Analyzer 8.6.2.16204, and possibly other versions before 9.0.1.19899, allows remote attackers to inject arbitrary web script or HTML via the newUser parameter. NOTE: this might not be a vulnerability, since an administrator might already have the privileges to create arbitrary script.

πŸ“– Read

via "National Vulnerability Database".
18:32
ATENTIONβ€Ό New - CVE-2012-1259

Multiple SQL injection vulnerabilities in Plixer International Scrutinizer NetFlow & sFlow Analyzer 8.6.2.16204, and possibly other versions before 9.0.1.19899, allow remote attackers to execute arbitrary SQL commands via the (1) addip parameter to cgi-bin/scrut_fa_exclusions.cgi, (2) getPermissionsAndPreferences parameter to cgi-bin/login.cgi, or (3) possibly certain parameters to d4d/alarms.php as demonstrated by the search_str parameter.

πŸ“– Read

via "National Vulnerability Database".
18:32
ATENTIONβ€Ό New - CVE-2012-1258

cgi-bin/userprefs.cgi in Plixer International Scrutinizer NetFlow & sFlow Analyzer before 9.0.1.19899 does not validate user permissions, which allow remote attackers to add user accounts with administrator privileges via the newuser, pwd, and selectedUserGroup parameters.

πŸ“– Read

via "National Vulnerability Database".
18:38
πŸ” Patscan platform detects hidden weapons, chemicals and bombs πŸ”

At CES 2020, Patriot One Technologies explained its Patscan platform, which can detect hidden weapons and more without the perpetrator even knowing they've been scanned.

πŸ“– Read

via "Security on TechRepublic".
?
19:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Chinese Malware Found Preinstalled on US Government-Funded Phones πŸ•΄

Researchers found unremovable malware preinstalled in the Unimax U686CL, a budget Android device sold by Assurance Wireless.

πŸ“– Read

via "Dark Reading: ".
?
20:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-5558

Cross-site scripting (XSS) vulnerability in the Smiley module 6.x-1.x versions prior to 6.x-1.1 and Smileys module 6.x-1.x versions prior to 6.x-1.1 for Drupal allows remote authenticated users with the "administer smiley" permission to inject arbitrary web script or HTML via a smiley acronym.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-4434

fwknop before 2.0.3 allow remote authenticated users to cause a denial of service (server crash) or possibly execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-3810

Samsung Kies before 2.5.0.12094_27_11 has registry modification.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-3809

Samsung Kies before 2.5.0.12094_27_11 has arbitrary directory modification.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-3808

Samsung Kies before 2.5.0.12094_27_11 has arbitrary file modification.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-3807

Samsung Kies before 2.5.0.12094_27_11 has arbitrary file execution.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-3806

Samsung Kies before 2.5.0.12094_27_11 contains a NULL pointer dereference vulnerability which could allow remote attackers to perform a denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-3490

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-2950

Gateway Geomatics MapServer for Windows before 3.0.6 contains a Local File Include Vulnerability which allows remote attackers to execute local PHP code and obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-2931

PHP code injection in TinyWebGallery before 1.8.8 allows remote authenticated users with admin privileges to inject arbitrary code into the .htusers.php file.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-2226

Invision Power Board before 3.3.1 fails to sanitize user-supplied input which could allow remote attackers to obtain sensitive information or execute arbitrary code by uploading a malicious file.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-2142

The error function in Error.cc in poppler before 0.21.4 allows remote attackers to execute arbitrary commands via a PDF containing an escape sequence for a terminal emulator.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2012-1915

EllisLab CodeIgniter 2.1.2 allows remote attackers to bypass the xss_clean() Filter and perform XSS attacks.

πŸ“– Read

via "National Vulnerability Database".
20:32
ATENTIONβ€Ό New - CVE-2010-3282

389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.

πŸ“– Read

via "National Vulnerability Database".
?
20:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Increase Focus on North American Electric Utilities: Report πŸ•΄

Electric utilities continue to be a target of nation-state attackers, even before the latest tensions between Iran and the United States, says a critical-infrastructure security firm.

πŸ“– Read

via "Dark Reading: ".
10 January 2020
?
07:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Fake-review purge: Facebook boots 188 groups, eBay bans 140 shills ⚠

After a poke from the UK's watchdog, the companies promised to beef up filters to strain out those who write, buy and sell fluffy nonsense.

πŸ“– Read

via "Naked Security".
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware pounces on California schools, Las Vegas trounces attack ⚠

We'll have one serving of whatever Las Vegas is eating and wish Pittsburg Unified School District good luck with getting unstuck.

πŸ“– Read

via "Naked Security".
08:11
⚠ Hackers use system weakness to rattle doors on Citrix systems ⚠

Attackers are using a serious bug in Citrix products to scan the internet for weaknesses, according to experts.

πŸ“– Read

via "Naked Security".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Oil-and-Gas Specialist APT Pivots to U.S. Power Plants ❌

Researchers say that physically disruptive attacks aren't imminent, but an increased focus on U.S. electrical-grid operators doesn't bode well.

πŸ“– Read

via "Threatpost".
?
11:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Study Points to Lax Focus on Cybersecurity πŸ•΄

Despite ranking at the top of respondents' concerns, organizations still show gaps in acting on cybersecurity, Society for Information Management (SIM) report finds.

πŸ“– Read

via "Dark Reading: ".
12:08
πŸ” How cybercriminals are using Microsoft Sway to launch phishing attacks πŸ”

Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted, says security firm Avanan.

πŸ“– Read

via "Security on TechRepublic".
12:23
πŸ•΄ 5 Tips on How to Build a Strong Security Metrics Framework πŸ•΄

The carpentry maxim 'measure twice, cut once' underscores the importance of timely, accurate, and regular metrics to inform security leaders' risk decisions.

πŸ“– Read

via "Dark Reading: ".
12:24
πŸ” Friday Five: 1/10 Edition πŸ”

Possible Iranian retaliation may include cyberattacks, laboratory testing company recieves lawsuit after data breach, and another school district hit with ransomware - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
12:32
ATENTIONβ€Ό New - CVE-2011-4595

Pretty-Link WordPress plugin 1.5.2 has XSS

πŸ“– Read

via "National Vulnerability Database".
12:38
πŸ” PATSCAN platform detects hidden weapons, chemicals, and bombs πŸ”

At CES 2020, Patriot One Technologies explained its PATSCAN platform, which can detect hidden weapons and more without the perpetrator even knowing they've been scanned.

πŸ“– Read

via "Security on TechRepublic".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Indian National Pleads Guilty to Multimillion-Dollar Call Center Scam πŸ•΄

The India-based call centers scammed US victims out of millions of dollars between 2013 and 2016.

πŸ“– Read

via "Dark Reading: ".
?
14:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Is the Y2K bug alive after all? ⚠

One way to patch the millennium bug was to move it, rather than actually to fix it... are we looking at Y2.02K?

πŸ“– Read

via "Naked Security".
14:17
❌ Lifeline Assistance Phone Users Targeted with β€˜Uninstallable’ Adware ❌

A Virgin Mobile-branded phone distributed by Assurance Wireless to low-income U.S. citizens has a trojan pre-installed that can download additional malware.

πŸ“– Read

via "Threatpost".
?
14:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Webex Bug Allows Remote Code Execution ❌

Cisco patched two high-severity flaws this week, in its Webex and IOS XE Software products.

πŸ“– Read

via "Threatpost".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Unique InfoSec Metrics CISOs Should Track in 2020 πŸ•΄

You might not find these measurements on a standard cybersecurity department checklist. But they can help evaluate risks you haven't even considered yet.

πŸ“– Read

via "Dark Reading: ".
15:38
πŸ” TP-Link routers get a little safer with AI-powered security features πŸ”

The new features come from a partnership with security firm Avira, but they won't be free: They're part of a new package called HomeCare Pro.

πŸ“– Read

via "Security on TechRepublic".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How AI, ML, and automation can improve cybersecurity protection πŸ”

Read insights from industry experts on how artificial intelligence and machine learning will help prevent cybersecurity breaches.

πŸ“– Read

via "Security on TechRepublic".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-3824

In Arial Campaign Enterprise before 11.0.551, multiple pages are accessible without authentication or authorization.

πŸ“– Read

via "National Vulnerability Database".
16:32
ATENTIONβ€Ό New - CVE-2012-3823

Arial Campaign Enterprise before 11.0.551 stores passwords in clear text and these may be retrieved.

πŸ“– Read

via "National Vulnerability Database".
16:32
ATENTIONβ€Ό New - CVE-2012-3822

Arial Campaign Enterprise before 11.0.551 has unauthorized access to the User-Edit.asp page, which allows remote attackers to enumerate users' credentials.

πŸ“– Read

via "National Vulnerability Database".
?
17:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Major Brazilian Bank Tests Homomorphic Encryption on Financial Data πŸ•΄

The approach allowed researchers to use machine learning on encrypted data without first decrypting it.

πŸ“– Read

via "Dark Reading: ".
?
18:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-5020

An SQL Injection vulnerability exists in the ID parameter in Online TV Database 2011.

πŸ“– Read

via "National Vulnerability Database".
?
20:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Synopsys Buys Tinfoil πŸ•΄

Tinfoil Security's dynamic application and API security testing capabilities will be added to Synopsys Software Integrity Group.

πŸ“– Read

via "Dark Reading: ".
11 January 2020
?
04:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CES 2020 roundup: All the business tech news you need to know πŸ”

CES was more exciting than ever this year. Key topics included 5G, AI, IoT, robotics, Wi-Fi 6, edge computing, automation, blockchain, quantum computing, privacy, AR, and VR.

πŸ“– Read

via "Security on TechRepublic".
04:08
πŸ” CES 2020: Biggest tech trends spotted for business pros πŸ”

From analytics and AI to 5G and Wi-Fi 6, here's all the enterprise tech that took center stage at CES 2020.

πŸ“– Read

via "Security on TechRepublic".
?
13:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why big data may help you sleep better at night πŸ”

At CES 2020, Sleep Number debuted its latest smart beds, which feature climate-controlled technology that gathers data while you snooze.

πŸ“– Read

via "Security on TechRepublic".
?
13:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CES 2020: Why HBO wants us to think twice about data privacy in the future πŸ”

A Westworld-themed experience gave CES attendees a creepy glimpse into tech consequences of the future.

πŸ“– Read

via "Security on TechRepublic".
13 January 2020
?
07:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 19 stories of the week ⚠

From a Firefox zero-day to a military ban on TikTok - and everything in between. It's the weekly security roundup.

πŸ“– Read

via "Naked Security".
?
08:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Lawmakers look to spread COPPA out to cover kids up to 16 ⚠

If that bill passes, you can say bye-bye to YouTube, says one content creator.

πŸ“– Read

via "Naked Security".
08:20
⚠ Google urged to tame privacy-killing Android bloatware ⚠

A letter sent to the Google CEO by Privacy International claims bloatware has allowed a privacy and security hole to open almost unnoticed.

πŸ“– Read

via "Naked Security".
?
08:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Reddit bans β€˜impersonation,’ but satire and parody are still OK ⚠

Relax: Nic Cage deepfakes aren't going anywhere. It's only "maliciously misleading" impersonations that are now verboten.

πŸ“– Read

via "Naked Security".
?
09:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Snake alert! This ransomware is not a game… ⚠

Looks like the Snake ransomware was created especially for network-wide attacks.

πŸ“– Read

via "Naked Security".
?
11:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Powerful GPG collision attack spells the end for SHA-1 ⚠

New research has heightened an already urgent call to abandon SHA-1, a cryptographic algorithm still used in many popular online services.

πŸ“– Read

via "Naked Security".
?
12:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CES 2020: Biggest tech trends spotted for business pros πŸ”

From analytics and AI to 5G and Wi-Fi 6, here's all the enterprise tech that took center stage at CES 2020.

πŸ“– Read

via "Security on TechRepublic".
?
12:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Will This Be the Year of the Branded Cybercriminal? πŸ•΄

Threat actors will continue to grow enterprise-style businesses that evolve just like their legitimate counterparts.

πŸ“– Read

via "Dark Reading: ".
12:46
❌ Unpatched Citrix Flaw Now Has PoC Exploits ❌

Over 25,000 servers globally are vulnerable to the critical Citrix remote code execution vulnerability.

πŸ“– Read

via "Threatpost".
12:46
❌ β€˜Cable Haunt’ Bug Plagues Millions of Home Modems ❌

The issue lies in underlying reference software used by multiple cable-modem manufacturers to create device firmware.

πŸ“– Read

via "Threatpost".
12:52
ATENTIONβ€Ό New - CVE-2011-2670

Mozilla Firefox before 3.6 is vulnerable to XSS via the rendering of Cascading Style Sheets

πŸ“– Read

via "National Vulnerability Database".
13:04
πŸ•΄ Texas School District Loses $2.3M to Phishing Attack πŸ•΄

The Manor Independent School District is investigating a phishing email scam that led to three separate fraudulent transactions.

πŸ“– Read

via "Dark Reading: ".
?
15:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ An Identity Management Spin on Shaggy's Hit Song πŸ•΄

Wondering how this guy could be so clumsy? So is he.

πŸ“– Read

via "Dark Reading: ".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CES 2020: Why HBO wants us to think twice about data privacy πŸ”

A Westworld-themed experience gave attendees a creepy glimpse into tech consequences of the future.

πŸ“– Read

via "Security on TechRepublic".
?
17:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Virginia Introduces Privacy Law Of Its Own πŸ”

Virginia appears to be following in the footsteps of California with a new legislation, the Virginia Privacy Act, that would strengthen the data privacy rights of Virginians.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:16
❌ CES Surveillance Hype Worries Privacy Advocates ❌

CES wiz-bang surveillance tech gives privacy advocates the willies.

πŸ“– Read

via "Threatpost".
17:24
πŸ” December's Most Wanted Malware: Greta Thunberg-themed spam used to spread Emotet πŸ”

Check Point's December 2019 Index finds Emotet as lead malware for the third month in a row, spreading email spam, some which alleged support of the teen activist.

πŸ“– Read

via "Security on TechRepublic".
?
18:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Joker Android Malware Snowballs on Google Play ❌

Google has removed 17,000 Joker-infested apps from the Play store to date.

πŸ“– Read

via "Threatpost".
18:16
❌ Scammers Dupe Texas School District Out of $2.3M ❌

The wide-scale phishing scam reportedly started in early November and continued through December, before it was discovered by the Texas school district.

πŸ“– Read

via "Threatpost".
?
19:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft to Officially End Support for Windows 7, Server 2008 πŸ•΄

Windows 7 and Server 2008 will continue to work after Jan. 14, 2020, but will no longer receive security updates.

πŸ“– Read

via "Dark Reading: ".
19:11
πŸ•΄ What Questions Should I Keep in Mind to Improve My Security Metrics? πŸ•΄

If you can answer these six questions, you'll be off to a great start.

πŸ“– Read

via "Dark Reading: ".
19:11
πŸ•΄ Exploits Released for As-Yet Unpatched Critical Citrix Flaw πŸ•΄

Organizations need to apply mitigations for vulnerability in Citrix Application Delivery Controller and Citrix Gateway ASAP, security researchers say.

πŸ“– Read

via "Dark Reading: ".
19:11
πŸ•΄ Website Collecting Australian Fire Donations Hit by Magecart πŸ•΄

The attack may have compromised donors' payment information.

πŸ“– Read

via "Dark Reading: ".
14 January 2020
?
06:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What to do if you're still running Windows 7 πŸ”

Your best bet is to finish a migration to Windows 10 ASAP, but there are other options in the interim, says content delivery company Kollective.

πŸ“– Read

via "Security on TechRepublic".
?
08:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft now reviewing Skype audio in β€˜secure’ places (not China) ⚠

A former contractor in Beijing: β€œIt sounds a bit crazy now [...] that they gave me the URL, a username and password sent over email.”

πŸ“– Read

via "Naked Security".
08:23
⚠ Lottery hacker gets 9 months for his £5 cut of the loot ⚠

We don't care how little you made from your crimes, the judge said. We care that you went after an outfit that gives a ton to charities.

πŸ“– Read

via "Naked Security".
?
08:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google tests biometric authentication for Android autofill ⚠

Google is testing out a feature to make Android's built-in password manager safer.

πŸ“– Read

via "Naked Security".
08:53
⚠ β€˜Cable Haunt’ vulnerability exposes 200 million cable modem users ⚠

A fortnight in to 2020 and we have the first security flaw to be given its own name: Cable Haunt - complete with eye-catching logo.

πŸ“– Read

via "Naked Security".
?
10:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Denies FBI Request to Unlock Shooter’s iPhoneβ€”Again ❌

Refusal to unlock the phones of a Florida shooter could set up another legal battle between Apple and the Feds over data privacy in the case of criminal investigations.

πŸ“– Read

via "Threatpost".
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Keep Security on Life Support After Software End-of-Life πŸ•΄

It's the end of support this week for Windows 7 and Server 2008. But what if you truly can't migrate off software, even after security updates stop coming?

πŸ“– Read

via "Dark Reading: ".
11:41
πŸ•΄ Industrial Control System Features at Risk πŸ•΄

How some ICS product functions can be weaponized by altering their configurations.

πŸ“– Read

via "Dark Reading: ".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Processor Vulnerabilites Put Virtual Workloads at Risk πŸ•΄

Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based apps

πŸ“– Read

via "Dark Reading: ".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-5018 (koala_framework)

Koala Framework before 2011-11-21 has XSS via the request_uri parameter.

πŸ“– Read

via "National Vulnerability Database".
12:41
πŸ•΄ Dustman Attack Underscores Iran's Cyber Capabilities πŸ•΄

For nearly six months, an attack group linked to Iran reportedly had access to the network of Bahrain's national oil company, Bapco, before it executed a destructive payload.

πŸ“– Read

via "Dark Reading: ".
12:48
❌ Adobe Patches Five Critical Illustrator CC Flaws ❌

Overall Adobe patched nine flaws in Illustrator CC and Experience Manager.

πŸ“– Read

via "Threatpost".
12:53
⚠ Fleeceware is back in Google Play – massive fees for not much at all ⚠

The apps itself isn't malicious - the treachery lies in the payment model.

πŸ“– Read

via "Naked Security".
?
13:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Consumer Reports Calls for IoT Manufacturers to Raise Security Standards πŸ•΄

A letter to 25 companies says Consumer Reports will change ratings to reflect stronger security and privacy standards.

πŸ“– Read

via "Dark Reading: ".
13:18
πŸ›  Packet Fence 9.3.0 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
13:23
⚠ Windows 7 computers will no longer be patched after today ⚠

Today's the day. The balloon goes up. The ship goes down. The patches fall behind. The crooks pull ahead.

πŸ“– Read

via "Naked Security".
?
14:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Public Bug Bounty Takes Aim at Kubernetes Container Project ❌

The cloud-focused program will pay out $10,000 as its top reward.

πŸ“– Read

via "Threatpost".
?
16:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google to Nix Chrome Support for Third-Party Cookies by 2022 ❌

Google says it has a two-year timeline for phasing out support for third-party cookies in its Chrome web browser.

πŸ“– Read

via "Threatpost".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Global Predictions for Energy Cyber Resilience in 2020 πŸ•΄

How prepared is the energy sector for an escalating attack surface in the operating technology environment? Here are five trends to watch.

πŸ“– Read

via "Dark Reading: ".
16:41
πŸ•΄ Attackers Increasingly Focus on Business Disruption πŸ•΄

Network intruders are staying undetected for an average of 95 days, enabling them to target critical systems and more completely disrupt business.

πŸ“– Read

via "Dark Reading: ".
16:42
πŸ” How to protect your Windows 7 computers and data after Microsoft cuts off support πŸ”

With no bug fixes or patches available for Windows 7 after Jan. 14, Veritas CIO John Abel offers tips to safeguard the PCs in your organization.

πŸ“– Read

via "Security on TechRepublic".
16:57
πŸ” CISA Continues to Warn About Pulse Secure Attacks πŸ”

CISA, the DHS agency that oversees cybersecurity matters in the US, is urging organizations to patch Pulse Secure VPN servers in the wake of news that they're being used to spread ransomware.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google: Chrome Will Remove Third-Party Cookies and Tracking πŸ•΄

It's "not about blocking" but removing them altogether, the company said.

πŸ“– Read

via "Dark Reading: ".
17:41
πŸ•΄ 'Fancy Bear' Targets Ukrainian Oil Firm Burisma in Phishing Attack πŸ•΄

The oil & gas company is at the heart of the ongoing US presidential impeachment case.

πŸ“– Read

via "Dark Reading: ".
17:48
❌ Microsoft Patches Major Crypto Spoofing Bug ❌

January Patch Tuesday tackles 50 bugs, with eight rated critical, all as it pushes out its last regular Windows 7 patches.

πŸ“– Read

via "Threatpost".
17:48
❌ Card Skimmer Hits Australian Bushfire Donation Site ❌

Magecart groups using automated infection scans infected the site, which was running outdated Magento software.

πŸ“– Read

via "Threatpost".
?
18:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intel Fixes High-Severity Flaw in Performance Analysis Tool ❌

The flaw, in Intel VTune Profiler, could enable privilege escalation.

πŸ“– Read

via "Threatpost".
?
18:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-3203

A Code Execution vulnerability exists the attachment parameter to index.php in Jcow CMS 4.x to 4.2 and 5.2 to 5.2.

πŸ“– Read

via "National Vulnerability Database".
?
19:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Processor Vulnerabilities Put Virtual Workloads at Risk πŸ•΄

Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based apps

πŸ“– Read

via "Dark Reading: ".
?
20:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Serious Microsoft crypto vulnerability – patch right now ⚠

It's a big one. Don't wait around, get your updates right now!

πŸ“– Read

via "Naked Security".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-3202

A Cross-Site Scripting (XSS) vulnerability exists in the g parameter to index.php in Jcow CMS 4.2 and earlier.

πŸ“– Read

via "National Vulnerability Database".
20:39
ATENTIONβ€Ό New - CVE-2011-3183

A Cross-Site Scripting (XSS) vulnerability exists in the rcID parameter in Concrete CMS 5.4.1.1 and earlier.

πŸ“– Read

via "National Vulnerability Database".
20:39
ATENTIONβ€Ό New - CVE-2011-2934

A Cross Site Request Forgery (CSRF) vulnerability exists in the administrator functions in WebsiteBaker 2.8.1 and earlier due to inadequate confirmation for sensitive transactions.

πŸ“– Read

via "National Vulnerability Database".
20:39
ATENTIONβ€Ό New - CVE-2011-2933

An Arbitrary File Upload vulnerability exists in admin/media/upload.php in WebsiteBaker 2.8.1 and earlier due to a failure to restrict uploaded files with .htaccess, .php4, .php5, and .phtl extensions.

πŸ“– Read

via "National Vulnerability Database".
20:39
ATENTIONβ€Ό New - CVE-2011-2715

An SQL Injection vulnerability exists in Drupal 6.20 with Data 6.x-1.0-alpha14 due to insufficient sanitization of table names or column names.

πŸ“– Read

via "National Vulnerability Database".
20:39
ATENTIONβ€Ό New - CVE-2011-2714

A Cross-Site Scripting vulnerability exists in Drupal 6.20 with Data 6.x-1.0-alpha14 due to insufficient sanitization of table descriptions, field names, or labels before display.

πŸ“– Read

via "National Vulnerability Database".
20:39
ATENTIONβ€Ό New - CVE-2011-2706

A Cross-Site Scripting (XSS) vulnerability exists in the reorder administrator functions in sNews 1.71.

πŸ“– Read

via "National Vulnerability Database".
20:48
❌ Oracle Ties Previous All-Time Patch High with January Updates ❌

The software giant patched 300+ bugs in its quarterly update.

πŸ“– Read

via "Threatpost".
?
21:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cloud Adoption & Technology Change Create Gaps in Enterprise Security πŸ•΄

Many companies are struggling to get a handle on risk exposure because of visibility issues, Radware survey shows.

πŸ“– Read

via "Dark Reading: ".
21:41
πŸ•΄ Microsoft Patches Windows Vuln Discovered by the NSA πŸ•΄

The National Security Agency is publicly acknowledged for its finding and reporting of CVE-2020-0601, marking the start of what it says is a new approach to security.

πŸ“– Read

via "Dark Reading: ".
15 January 2020
?
08:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple says no to unlocking shooter’s phone; AG and Trump lash back ⚠

Attorney General Barr and President Trump are demanding Apple unlock the mass shooter's iPhone. Apple replies: You can't break just 1 phone.

πŸ“– Read

via "Naked Security".
08:23
⚠ Peekaboo Moments baby-recording app has a bad database booboo ⚠

No need to wait until you've gurgled out of your mother's womb to experience the joys of having your privacy breached.

πŸ“– Read

via "Naked Security".
?
08:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Oski Data-Stealing Malware Emerges to Target North America, China ❌

The malware is new and in the early stages of its development -- but packs a sophisticated punch.

πŸ“– Read

via "Threatpost".
08:53
⚠ Malicious npm package taken down after Microsoft warning ⚠

Criminals have been caught trying to sneak a malicious package on to the popular Node.js platform npm (Node Package Manager).

πŸ“– Read

via "Naked Security".
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft fixes critical bugs in CryptoAPI, RD Gateway and .NET ⚠

Here are the most serious bugs from Microsoft's Patch Tuesday - Including CryptoAPI and RCE flaws in Windows Remote Desktop Gateway.

πŸ“– Read

via "Naked Security".
?
11:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why corporate boards are unprepared to handle cybersecurity risks πŸ”

A new report recommends that corporate boards answer four key questions on a regular basis to guide cybersecurity governance.

πŸ“– Read

via "Security on TechRepublic".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How SD-WAN Helps Achieve Data Security and Threat Protection πŸ•΄

Enterprises currently consider the technology a best practice because of its flexibility, scalability, performance, and agility.

πŸ“– Read

via "Dark Reading: ".
12:12
πŸ” Microsoft rolls out patch for serious Windows bug highlighted by NSA πŸ”

Designed to exploit a vulnerability in Windows 10 and Windows Server 2016 and 2019, the bug could allow an attacker to remotely access and control an infected computer.

πŸ“– Read

via "Security on TechRepublic".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-1563

Joomla! before 2.5.3 allows Admin Account Creation.

πŸ“– Read

via "National Vulnerability Database".
12:39
ATENTIONβ€Ό New - CVE-2012-1562

Joomla! core before 2.5.3 allows unauthorized password change.

πŸ“– Read

via "National Vulnerability Database".
12:39
ATENTIONβ€Ό New - CVE-2012-1326

Cisco IronPort Web Security Appliance up to and including 7.5 does not validate the basic constraints of the certificate authority which could lead to MITM attacks

πŸ“– Read

via "National Vulnerability Database".
12:39
ATENTIONβ€Ό New - CVE-2012-1316

Cisco IronPort Web Security Appliance does not check for certificate revocation which could lead to MITM attacks

πŸ“– Read

via "National Vulnerability Database".
12:39
ATENTIONβ€Ό New - CVE-2012-0945

whoopsie-daisy before 0.1.26: Root user can remove arbitrary files

πŸ“– Read

via "National Vulnerability Database".
12:39
ATENTIONβ€Ό New - CVE-2012-0334

Cisco IronPort Web Security Appliance AsyncOS software prior to 7.5 has a SSL Certificate Caching vulnerability which could allow man-in-the-middle attacks

πŸ“– Read

via "National Vulnerability Database".
12:39
ATENTIONβ€Ό New - CVE-2012-0070

spamdyke prior to 4.2.1: STARTTLS reveals plaintext

πŸ“– Read

via "National Vulnerability Database".
12:39
ATENTIONβ€Ό New - CVE-2011-4907

Joomla! 1.5x through 1.5.12: Missing JEXEC Check

πŸ“– Read

via "National Vulnerability Database".
12:39
ATENTIONβ€Ό New - CVE-2011-4336

Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php.

πŸ“– Read

via "National Vulnerability Database".
12:48
❌ Trump Slams Apple for Refusing to Unlock Suspected Shooter’s iPhones ❌

Legal battle pitting Feds against the tech giant over data privacy and device security in criminal cases seems inevitable.

πŸ“– Read

via "Threatpost".
?
13:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to disconnect devices and revoke app privileges from your Firefox cloud account πŸ”

You'll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them.

πŸ“– Read

via "Security on TechRepublic".
?
14:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why Google plans to cut off support for third-party cookies in Chrome πŸ”

Google is aiming to phase out third-party cookies in Chrome in two years, but that will have to prove palatable to users, publishers, and advertisers.

πŸ“– Read

via "Security on TechRepublic".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ISACs Join Forces to Secure the Travel Industry πŸ•΄

Together, the Travel & Hospitality ISAC and the Retail & Hospitality ISAC intend to improve communications and collaboration about the evolving threat landscape.

πŸ“– Read

via "Dark Reading: ".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Comprehend the Buzz About Honeypots πŸ•΄

Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe and useful for your organization.

πŸ“– Read

via "Dark Reading: ".
15:11
πŸ•΄ New Report Spotlights Changes in Phishing Techniques πŸ•΄

Common and evolving strategies include the use of zero-font attacks, homograph attacks, and new tactics for fake attachments.

πŸ“– Read

via "Dark Reading: ".
15:18
❌ Equifax Settles Class-Action Breach Lawsuit for $380.5M ❌

Class members have until Jan. 22, next week, to claim benefits.

πŸ“– Read

via "Threatpost".
?
16:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Firewalls Aren't Going Anywhere πŸ•΄

Written off multiple times as obsolete, firewalls continue to elude demise by adding features and ensuring that VPNs keep humming.

πŸ“– Read

via "Dark Reading: ".
16:18
❌ U.N. Weathers Storm of Emotet-TrickBot Malware ❌

A concerted, targeted phishing campaign took aim at 600 different staffers and officials, using Norway as a lure.

πŸ“– Read

via "Threatpost".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-5250 (snare)

Snare for Linux before 1.7.0 has CSRF in the web interface.

πŸ“– Read

via "National Vulnerability Database".
16:39
ATENTIONβ€Ό New - CVE-2009-1120

EMC RepliStor Server Service before ESA-09-003 has a DoASOCommand Remote Code Execution Vulnerability. The flaw exists within the DoRcvRpcCall RPC function -exposed via the rep_srv.exe process- where the vulnerability is caused by an error when the rep_srv.exe handles a specially crafted packet sent by an unauthenticated attacker.

πŸ“– Read

via "National Vulnerability Database".
16:39
ATENTIONβ€Ό New - CVE-2007-4774

The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.

πŸ“– Read

via "National Vulnerability Database".
16:39
ATENTIONβ€Ό New - CVE-2007-4773

Systrace before 1.6.0 has insufficient escape policy enforcement.

πŸ“– Read

via "National Vulnerability Database".
16:39
ATENTIONβ€Ό New - CVE-2005-4891

Simple Machine Forum (SMF) versions 1.0.4 and earlier have an SQL injection vulnerability that allows remote attackers to inject arbitrary SQL statements.

πŸ“– Read

via "National Vulnerability Database".
?
16:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ex-Pharma Employees Arrested Following Data Theft in India πŸ”

The employees allegedly stole confidential information belonging to the company, including batch production control records for drug manufacturing, according to reports.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to better protect your organization's most valuable data πŸ”

Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire.

πŸ“– Read

via "Security on TechRepublic".
?
17:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Podcast: NSA Reports Major Crypto-Spoofing Bug to Microsoft ❌

Threatpost talks to Venafi about the recently-disclosed Microsoft vulnerability and whether the hype around the flaw was warranted.

πŸ“– Read

via "Threatpost".
?
18:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-5266 (securesphere_web_application_firewall)

Imperva SecureSphere Web Application Firewall (WAF) before 12-august-2010 allows SQL injection filter bypass.

πŸ“– Read

via "National Vulnerability Database".
18:41
πŸ•΄ Google Lets iPhone Users Turn Device into Security Key πŸ•΄

The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.

πŸ“– Read

via "Dark Reading: ".
18:48
❌ A Practical Guide to Zero-Trust Security ❌

There are five different pillars to implement when moving to a modern, zero-trust security model.

πŸ“– Read

via "Threatpost".
18:48
❌ Critical WordPress Bug Leaves 320,000 Sites Open to Attack ❌

Authentication bypass bugs in WordPress plugins InfiniteWP Client and WP Time Capsule leave hundreds of thousands of sites open to attack.

πŸ“– Read

via "Threatpost".
?
20:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 2017 Data Breach Will Cost Equifax at Least $1.38 Billion πŸ•΄

Company agrees to set aside a minimum of $380.5 million as breach compensation and spend another $1 billion on transforming its information security over the next five years. The 147 million US consumers affected by the breach have one week from today to file a claim.

πŸ“– Read

via "Dark Reading: ".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2009-5068

There is a file disclosure vulnerability in SMF (Simple Machines Forum) affecting versions through v2.0.3. On some configurations a SMF deployment is shared by several "co-admins" that are not trusted beyond the SMF deployment. This vulnerability allows them to read arbitrary files on the filesystem and therefore gain new privileges by reading the settings.php with the database passwords.

πŸ“– Read

via "National Vulnerability Database".
20:39
ATENTIONβ€Ό New - CVE-2009-5025

A backdoor (aka BMSA-2009-07) was found in PyForum v1.0.3 where an attacker who knows a valid user email could force a password reset on behalf of that user.

πŸ“– Read

via "National Vulnerability Database".
20:39
ATENTIONβ€Ό New - CVE-2009-3724

python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues.

πŸ“– Read

via "National Vulnerability Database".
16 January 2020
?
10:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ College students call for ban on facial recognition on campus ⚠

Fight for the Future is building on its success in pressuring concert promoters to back off of plans to use the technology at festivals.

πŸ“– Read

via "Naked Security".
?
10:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google to kill third-party Chrome cookies in two years ⚠

Google doesn't want to block third-party cookies in Chrome right now. It has promised to make them obsolete later, though. Wait - what?

πŸ“– Read

via "Naked Security".
10:53
⚠ Apps are sharing more of your data with ad industry than you may think ⚠

Apps like Grindr, Tinder and Happn are (over-)sharing data about sexuality, religion, and location with a shadowy network of data brokers. And it's not just dating apps that are doing it...

πŸ“– Read

via "Naked Security".
10:53
⚠ Update now! Popular WordPress plugins have password bypass flaws ⚠

Researchers have discovered bad authentication bypass vulnerabilities affecting two WordPress plugins which should be patched as soon as possible.

πŸ“– Read

via "Naked Security".
?
11:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜Fleeceware’ Apps Downloaded 600M Times from Google Play ❌

New research shows apps that dupe users into being charged excessively with little reward persist on the Android app store.

πŸ“– Read

via "Threatpost".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Active Directory Needs an Update: Here's Why πŸ•΄

AD is still the single point of authentication for most companies that use Windows. But it has some shortcomings that should be addressed.

πŸ“– Read

via "Dark Reading: ".
?
13:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ PoC Exploits Published For Microsoft Crypto Bug ❌

Two proof-of-concept exploits were publicly released for the major Microsoft crypto-spoofing vulnerability.

πŸ“– Read

via "Threatpost".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep23: Snake ransomware, VPN holes and phone spying – Naked Security Podcast ⚠

New episode - listen now!

πŸ“– Read

via "Naked Security".
14:02
πŸ›  Wireshark Analyzer 3.2.1 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NY Fed Reveals Implications of Cyberattack on US Financial System πŸ•΄

A "pre-mortem analysis" sheds light on the potential destruction of a cyberattack against major US banks.

πŸ“– Read

via "Dark Reading: ".
14:53
⚠ NSA and Github β€˜rickrolled’ using Windows CryptoAPI bug ⚠

We said, "Assume that someone will find out how to do it pretty soon," and that's exactly what happened.

πŸ“– Read

via "Naked Security".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISO Resigns From Pete Buttigieg Presidential Campaign πŸ•΄

The only Democratic campaign known to have a CISO loses Mick Baccio due to a "fundamental philosophical difference with campaign management."

πŸ“– Read

via "Dark Reading: ".
?
15:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to add a host to Observium πŸ”

Now that you have the Observium network monitoring platform installed, it's time to add a host.

πŸ“– Read

via "Security on TechRepublic".
15:48
❌ Satan Ransomware Reborn to Torment Businesses ❌

A hellish mix of features shows the 5ss5c ransomware to be the son of Satan.

πŸ“– Read

via "Threatpost".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-3048

Cisco Unified Personal Communicator 7.0 (1.13056) does not free allocated memory for received data and does not perform validation if memory allocation is successful, causing a remote denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
16:41
πŸ•΄ Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat πŸ•΄

Cybercriminals are evolving their tactics, and the security community anticipates voice and video fraud to play a role in one of the next big data breaches -- so start protecting your business now.

πŸ“– Read

via "Dark Reading: ".
16:42
πŸ” How a researcher exploited the Windows 10 bug patched by Microsoft πŸ”

The work by security researcher Saleem Rashid shows that the bug could be exploited in the real world to spoof security certificates on machines without Microsoft's patch.

πŸ“– Read

via "Security on TechRepublic".
16:42
πŸ” These subject lines are the most clicked for phishing πŸ”

The most successful email lures don't promise riches, but issue imminent cybersecurity warnings or urgent office messages, a report reveals.

πŸ“– Read

via "Security on TechRepublic".
?
17:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Federal Health IT Plan Prioritizes Security, Privacy πŸ”

The U.S. HHS released a draft of its federal health IT plan for 2020-2025 and health and privacy are top of mind.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Account Security Keys Launch for iPhone ❌

iPhone users can now use Bluetooth to secure their Google accounts.

πŸ“– Read

via "Threatpost".
19:31
❌ Critical Cisco Flaws Now Have PoC Exploit ❌

The flaws affect a key tool for managing its network platform and switches.

πŸ“– Read

via "Threatpost".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Attack Campaigns Suggest Emotet Threat Is Far From Over πŸ•΄

Malware described by the DHS as among the worst ever continues to evolve and grow, researchers from Cisco Talos, Cofense, and Check Point Software say.

πŸ“– Read

via "Dark Reading: ".
?
20:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses πŸ•΄

Risks of nation-state attacks go beyond Iran, and the need for awareness and security don't stop at any national border.

πŸ“– Read

via "Dark Reading: ".
17 January 2020
?
07:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ EDRi’s guidelines call for more ethical websites ⚠

Recommendations cover areas including security and privacy while listing alternatives to free online services that slurp your users' data.

πŸ“– Read

via "Naked Security".
?
08:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facial recognition is real-life β€˜Black Mirror’ stuff, Ocasio-Cortez says ⚠

"People think they're going to put on a cute filter and have puppy dog ears, and not realize that that data's being collected."

πŸ“– Read

via "Naked Security".
08:28
⚠ Google will now accept your iPhone as an authentication key ⚠

Google has updated its Smart Lock to let iOS users security-dongle-ize their iPhones.

πŸ“– Read

via "Naked Security".
?
08:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Oracle’s January 2020 update patches 334 security flaws ⚠

The January 2020 update featured a joint record of 334 patches, matching an identical number released in July 2018.

πŸ“– Read

via "Naked Security".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 1/17 Edition πŸ”

As more troops are deployed to the Middle East, the U.S. military fears OPSEC failures, an app exposed the sensitive data of babies, and a site helping Australian bushfire victims becomes a victim itself - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization and employees from conversation hijacking πŸ”

By inserting themselves into business emails among employees, cybercriminals can trick victims into wiring money or sharing payment information, says security firm Barracuda Networks.

πŸ“– Read

via "Security on TechRepublic".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ADP Users Hit with Phishing Scam Ahead of Tax Season πŸ•΄

Fraudulent emails tell recipients their W-2 forms are ready and prompt them to click malicious links.

πŸ“– Read

via "Dark Reading: ".
?
13:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Ways to Get the Most Out of a Penetration Test πŸ•΄

You'll get the best results when you're clear on what you want to accomplish from a pen test.

πŸ“– Read

via "Dark Reading: ".
?
14:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FBI Plans to Inform States of Election Breaches ❌

The agency changed its policy to provide more timely and actionable information to state and local election officials in the case of a cybersecurity breach to election infrastructure.

πŸ“– Read

via "Threatpost".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Massive Oracle Patch Reverses Company's Trend Toward Fewer Flaws πŸ•΄

Following a year that saw the fewest number of vulnerabilities reported since 2015, Oracle's latest quarterly patch fixes nearly 200 new vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
14:23
πŸ•΄ FBI Seizes Domain That Sold Info Stolen in Data Breaches πŸ•΄

The website, WeLeakData.com, claimed to have more than 12 billion records gathered from over 10,000 breaches.

πŸ“– Read

via "Dark Reading: ".
?
14:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mobile Banking Malware Up 50% in First Half of 2019 πŸ•΄

A new report from Check Point recaps the cybercrime trends, statistics, and vulnerabilities that defined the security landscape in 2019.

πŸ“– Read

via "Dark Reading: ".
14:58
⚠ 5 tips to avoid spear-phishing attacks ⚠

Our tips will help you boost your resistance to phishing, even when the crooks make a determined effort to reel you in.

πŸ“– Read

via "Naked Security".
?
15:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: PoC Exploits, Cable Haunt and Joker Malware ❌

Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.

πŸ“– Read

via "Threatpost".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why blockchain-based cybersecurity may be the answer for vulnerable IoT networks πŸ”

CES 2020: A "hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats.

πŸ“– Read

via "Security on TechRepublic".
16:01
❌ Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea? ❌

Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?

πŸ“– Read

via "Threatpost".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why baby boomers are looking to IoT and analytics to stay safe πŸ”

IoT security is becoming a top-of-mind priority in the personal care industry. Essence group believes it has the solution and had it on display at CES 2020.

πŸ“– Read

via "Security on TechRepublic".
?
18:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mobile Carrier Customer Service Ushers in SIM-Swap Fraud ❌

Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.

πŸ“– Read

via "Threatpost".
18:34
ATENTIONβ€Ό New - CVE-2007-6070

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-1382. Reason: This candidate is a reservation duplicate of CVE-2008-1382. Notes: All CVE users should reference CVE-2008-1382 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
?
19:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Feds Cut Off Access to Billions of Breached Records with Site Takedown ❌

The WeLeakInfo "data breach notification" domain is no more.

πŸ“– Read

via "Threatpost".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New JhoneRAT Malware Targets Middle East ❌

Researchers say that JhoneRAT has various anti-detection techniques - including making use of Google Drive, Google Forms and Twitter.

πŸ“– Read

via "Threatpost".
20 January 2020
?
02:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” This new startup aims to make developers love security πŸ”

Commentary: As more workloads move to the cloud, developers need help with security. Find out how the startup Cyral is helping to improve data security in the cloud.

πŸ“– Read

via "Security on TechRepublic".
?
07:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 27 stories of the week ⚠

From nasty snakes to rickrolling the NSA, get up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
08:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook and Instagram ban alleged β€˜brainwashing’ service ⚠

The Spinner personalises β€œsubconscious influencing” for a specific target.

πŸ“– Read

via "Naked Security".
?
08:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Alluc Alternatives for 2020 πŸ•΅


πŸ“– Read

via "VPNpro".
?
09:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Teen entered β€˜dark rabbit hole of suicidal content’ online ⚠

Molly Russell's grieving father has backed a psychiatrists' report, saying that tech companies must be forced to hand over anonymized data.

πŸ“– Read

via "Naked Security".
09:17
⚠ FBI to inform election officials about hacking attempts ⚠

The FBI has announced that it will tell local election officials when hackers try to infiltrate their systems.

πŸ“– Read

via "Naked Security".
?
09:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FBI seizes credentials-for-sale site WeLeakInfo.com ⚠

The FBI has seized the domain for WeLeakInfo.com, a site that sold breached data records, after a multinational effort by law enforcement.

πŸ“– Read

via "Naked Security".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Are We Secure Yet? How to Build a "Post-Breach" Culture πŸ•΄

There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.

πŸ“– Read

via "Dark Reading: ".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Maavi Fuzzing Utility πŸ› 

Maavi is a fuzzing tool that scans for vulnerabilities with obfuscated payloads. Has proxy support, records full history of actions, and has various bells and whistles.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
16:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Bill Would Aid CCPA Compliance for HIPAA Business Associates πŸ”

A new bill in California would amend the CCPA and further health data exemptions - namely data that's been de-identified in the eyes of HIPAA.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:11
πŸ•΄ Are We Secure Yet? How to Build a 'Post-Breach' Culture πŸ•΄

There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.

πŸ“– Read

via "Dark Reading: ".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to access your 2FA Docker Hub account from the command line πŸ”

With 2FA enabled on your Docker Hub account, you'll find you cannot access it with your user password from within the CLI. Jack Wallen shows you how to make this work.

πŸ“– Read

via "Security on TechRepublic".
21 January 2020
?
08:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ What do online file sharers want with 70,000 Tinder images? ⚠

A researcher has discovered thousands of Tinder users' images publicly available for free online.

πŸ“– Read

via "Naked Security".
?
09:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10581

NULL is assigned to local instance of audio device pointer after free instead of global static pointer and can lead to use after free issue in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, MDM9206, MDM9207C, MDM9607, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8998, Nicobar, QCS605, Rennell, SA6155P, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:14
ATENTIONβ€Ό New - CVE-2019-10579

Buffer over-read can occur while playing the video clip which is not standard in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, Rennell, SA6155P, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:14
ATENTIONβ€Ό New - CVE-2019-10578

Null pointer dereference can occur while parsing the clip which is nonstandard in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, Rennell, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:14
ATENTIONβ€Ό New - CVE-2019-10561

Improper initialization of local variables which are parameters to sfs api may cause invalid pointer dereference and leads to denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9206, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QM215, SDA660, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660

πŸ“– Read

via "National Vulnerability Database".
09:14
ATENTIONβ€Ό New - CVE-2019-10558

While transferring data from APPS to DSP, Out of bound in FastRPC HLOS Driver due to the data buffer which can be controlled by DSP in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCN7605, QCS605, QM215, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM6150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:14
ATENTIONβ€Ό New - CVE-2019-10548

While trying to obtain datad ipc handle during DPL initialization, Heap use-after-free issue can occur if modem SSR occurs at same time in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
09:14
ATENTIONβ€Ό New - CVE-2019-10532

Null-pointer dereference issue can occur while calculating string length when source string length is zero in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, Nicobar, QCS605, QM215, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:17
⚠ China and US top user data requests in Apple transparency report ⚠

Most of the US and China's requests had to do with investigations into fraud, suspected account access and phishing.

πŸ“– Read

via "Naked Security".
09:31
πŸ•΄ 7 Tips for Infosec Pros Considering A Lateral Career Move πŸ•΄

Looking to switch things up but not sure how to do it? Security experts share their advice for switching career paths in the industry.

πŸ“– Read

via "Dark Reading: ".
?
09:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Citrix ships patches as vulnerable servers come under attack ⚠

Citrix has issued its first set of patches fixing a nasty vulnerability that's been hanging over some of its biggest products.

πŸ“– Read

via "Naked Security".
09:59
❌ Hacker Leaks More Than 500K Telnet Credentials for IoT Devices ❌

Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.

πŸ“– Read

via "Threatpost".
10:12
πŸ•΄ Elaborate Honeypot 'Factory' Network Hit with Ransomware, RAT, and Cryptojacking πŸ•΄

A fictitious industrial company with phony employees personas, website, and PLCs sitting on a simulated factory network fooled malicious hackers - and raised alarms for at least one white-hat researcher who stumbled upon it.

πŸ“– Read

via "Dark Reading: ".
?
11:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” If you don't like your browser, why won't you change to a different one? πŸ”

Commentary: Users tend to stick with their preferred browser even when it works poorly for them.

πŸ“– Read

via "Security on TechRepublic".
11:59
πŸ” How to use a physical security key to sign into supported websites πŸ”

A security key is a good option to use for two-factor authentication when logging into certain websites.

πŸ“– Read

via "Security on TechRepublic".
11:59
πŸ” Windows 7 remains an albatross at many large organizations πŸ”

Among 60,000 large companies analyzed by security ratings company BitSight, almost 90% still have Windows 7 PCs in their environment.

πŸ“– Read

via "Security on TechRepublic".
12:11
πŸ•΄ Data Awareness Is Key to Data Security πŸ•΄

Traditional data-leak prevention is not enough for businesses facing today's dynamic threat landscape.

πŸ“– Read

via "Dark Reading: ".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Zero-Day Actively Exploited, Patch Forthcoming ❌

CVE-2020-0674 is a critical flaw for most Internet Explorer versions, allowing remote code execution and complete takeover.

πŸ“– Read

via "Threatpost".
12:29
❌ FTCODE Ransomware Now Steals Chrome, Firefox Credentials ❌

New versions of the ransomware now sniff out saved credentials for Internet Explorer, Mozilla Firefox, Mozilla Thunderbird, Google Chrome and Microsoft Outlook.

πŸ“– Read

via "Threatpost".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem πŸ•΄

We all make assumptions. They rarely turn out well. A new/old date problem offers a lesson in why that's so.

πŸ“– Read

via "Dark Reading: ".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” iOS-based devices: Zero-touch management essentials πŸ”

Managing multiple devices can be a full-time job. With a few tools in your arsenal, you can optimize mobile devices for zero-touch management.

πŸ“– Read

via "Security on TechRepublic".
13:42
πŸ•΅ Best VPN Chrome Extensions in 2020 πŸ•΅


πŸ“– Read

via "VPNpro".
?
14:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Citrix Accelerates Patch Rollout For Critical RCE Flaw ❌

Citrix has issued the first of several updates fixing a critical vulnerability in various versions of its Citrix Application Delivery Controller (ADC) and Citrix Gateway products.

πŸ“– Read

via "Threatpost".
14:36
πŸ•΄ Nearly 75% of SD-WAN Owners Lack Confidence Post-Digital Transformation πŸ•΄

More businesses think SD-WAN will reduce WAN costs, but only 37% think SD-WANs will help defend against malware and other threats.

πŸ“– Read

via "Dark Reading: ".
14:36
πŸ•΄ Ransomware Upgrades with Credential-Stealing Tricks πŸ•΄

The latest version of the FTCode ransomware can steal credentials from five popular browsers and email clients.

πŸ“– Read

via "Dark Reading: ".
14:44
ATENTIONβ€Ό New - CVE-2012-5190

Prizm Content Connect 5.1 has an Arbitrary File Upload Vulnerability

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-5282

mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled.

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-4336 (tikiwiki_cms/groupware)

Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php.

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-4322

websitebaker prior to and including 2.8.1 has an authentication error in backup module.

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-4095

Jara 1.6 has an XSS vulnerability

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-4094

Jara 1.6 has a SQL injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-2669

Mozilla Firefox prior to 3.6 has a DoS vulnerability due to an issue in the validation of certificates.

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-2668

Mozilla Firefox through 1.5.0.3 has a vulnerability in processing the content-length header

πŸ“– Read

via "National Vulnerability Database".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why corporate boards are unprepared to handle cybersecurity risks πŸ”

A new report recommends that corporate boards answer four key questions on a regular basis to guide cybersecurity governance.

πŸ“– Read

via "Security on TechRepublic".
16:35
πŸ•΄ Avoid That Billion-Dollar Fine: Blurring the Lines Between Security and Privacy πŸ•΄

While doing good for the user is the theoretical ideal, the threat of fiscal repercussions should drive organizations to take privacy seriously. That means security and data privacy teams must work more closely.

πŸ“– Read

via "Dark Reading: ".
16:44
ATENTIONβ€Ό New - CVE-2005-4891 (simple_machine_forum)

Simple Machine Forum (SMF) versions 1.0.4 and earlier have an SQL injection vulnerability that allows remote attackers to inject arbitrary SQL statements.

πŸ“– Read

via "National Vulnerability Database".
?
17:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Post-GDPR, 160,000 Data Breaches and Counting πŸ”

A new report that aggregates post-GDPR data breach statistics in Europe suggests new, higher fines are to come in 2020.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  WebSploit Framework 4.0.1 πŸ› 

WebSploit is an advanced man-in-the-middle framework.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
17:37
πŸ›  SolarWindows MSP n-Central Information Disclosure πŸ› 

This application, known as the SolarWinds n-Central Dumpster Diver, utilizes the nCentral agent dot net libraries to simulate the agent registration and pull the agent/appliance configuration settings. This information can contain plain text active directory domain credentials. This was reported to SolarWinds PSIRT(psirt@solarwinds.com) on 10/10/2019. In most cases the agent download URL is not secured allowing anyone without authorization and known customer id to download the agent software. Once you have a customer id you can self register and pull the config. Application will test availability of customer id via agent download URL. If successful it will then pull the config. We do not attempt to just pull the config because timing out on the operation takes to long. Removing the initial check, could produce more results as the agent download could be being blocked where as agent communication would not be. Harmony is only used to block the nCentral libraries from saving and creating a config directory that is not needed.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
17:37
πŸ›  Zed Attack Proxy 2.9.0 Cross Platform Package πŸ› 

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
18:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ China-Based Cyber Espionage Group Reportedly Behind Breach at Mitsubishi Electric πŸ•΄

Personal data on over 8,100 individuals and confidential business information likely exposed in June 2019 incident.

πŸ“– Read

via "Dark Reading: ".
18:33
πŸ•΄ FireEye Buys Cloudvisory πŸ•΄

The purchase is intended to bring new cloud capabilities to the FireEye Helix security platform.

πŸ“– Read

via "Dark Reading: ".
18:33
πŸ•΄ New Ransomware Tactic Shows How Windows EFS Can Aid Attackers πŸ•΄

Researchers have discovered how ransomware can take advantage of the Windows Encrypting File System, prompting security vendors to release patches.

πŸ“– Read

via "Dark Reading: ".
?
19:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft, DHS Warn of Zero-Day Attack Targeting IE Users πŸ•΄

Software firm is "aware of limited targeted attacks" exploiting a scripting issue vulnerability in Internet Explorer 9, 10, and 11 that previously has not been disclosed.

πŸ“– Read

via "Dark Reading: ".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 16Shop Phishing Gang Goes After PayPal Users ❌

A sophisticated malware-as-a-service phishing kit includes full customer service and anti-detection technologies.

πŸ“– Read

via "Threatpost".
?
20:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Bug bounties won't make you rich (but you should participate anyway) πŸ”

Commentary: There's a lot of hype about bug bounties, but here's some truth.

πŸ“– Read

via "Security on TechRepublic".
22 January 2020
?
07:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Nobody boogies quite like you ⚠

Our unique dancing style can be used by a machine-learning model to ID us, regardless of musical genre. Unless it's Metal. We all headbang.

πŸ“– Read

via "Naked Security".
?
08:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Regus spills data of 900 staff on Trello board set to β€˜public’ ⚠

Another company has ended up accidentally spilling sensitive data from business collaboration tool Trello.

πŸ“– Read

via "Naked Security".
08:17
⚠ NIST’s new privacy rules – what you need to know ⚠

How do you ensure you're compliant with privacy regulations? NIST has released a Privacy Framework to help you get your house in order.

πŸ“– Read

via "Naked Security".
?
08:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ubisoft sues DDoS-for-hire operators for ruining game play ⚠

The network of sites and services run by the alleged operators target the Rainbow Six Siege game, selling attacks to cheating players.

πŸ“– Read

via "Naked Security".
08:59
❌ PoC Exploits Do More Good Than Harm: Threatpost Poll ❌

More than half of security experts think that the good outweighs the bad when it comes to proof-of-concept exploits, according to a recent Threatpost poll.

πŸ“– Read

via "Threatpost".
?
10:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Muhstik Botnet Attacks Target Tomato Routers ❌

Palo Alto Networks’ Unit 42 researchers observed a variant of the wormlike botnet that adds scanner technology to brute-force Web authentication.

πŸ“– Read

via "Threatpost".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Lessons Learned from 'The Rise of Skywalker' πŸ•΄

They're especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords.

πŸ“– Read

via "Dark Reading: ".
?
12:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ ProtonVPN goes open-source πŸ•΅


πŸ“– Read

via "VPNpro".
12:44
ATENTIONβ€Ό New - CVE-2011-4943

ImpressPages CMS v1.0.12 has Unspecified Remote Code Execution (fixed in v1.0.13)

πŸ“– Read

via "National Vulnerability Database".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Email malware targets U.S. senator and military πŸ”

The cybercriminals behind the powerful banking malware have turned their attention to government targets like Sen. Cory Booker.

πŸ“– Read

via "Security on TechRepublic".
12:59
❌ Microsoft Leaves 250M Customer Service Records Open to the Web ❌

The trove of information is potentially a scammer's bonanza.

πŸ“– Read

via "Threatpost".
12:59
❌ sLoad Malware Revamped as Powerful β€˜StarsLord’ Loader ❌

The newest version of the sLoad malware dropper comes equipped with infection tracking capabilities and an anti-analysis trick.

πŸ“– Read

via "Threatpost".
?
13:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Logwatch 7.5.3 πŸ› 

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Startup Privafy Raises $22M with New Approach to Network Security πŸ•΄

The company today disclosed an approach to data security designed to protect against modern threats at a lower cost than complex network tools.

πŸ“– Read

via "Dark Reading: ".
?
14:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-3610

A Cross-site Scripting (XSS) vulnerability exists in the Serendipity freetag plugin before 3.30 in the tagcloud parameter to plugins/serendipity_event_freetag/tagcloud.swf.

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-3595

Multiple Cross-site Scripting (XSS) vulnerabilities exist in Joomla! through 1.7.0 in index.php in the search word, extension, asset, and author parameters.

πŸ“– Read

via "National Vulnerability Database".
14:44
ATENTIONβ€Ό New - CVE-2011-3582

A Cross-site Request Forgery (CSRF) vulnerability exists in Advanced Electron Forums (AEF) through 1.0.9 due to inadequate confirmation for sensitive transactions in the administrator functions.

πŸ“– Read

via "National Vulnerability Database".
14:47
⚠ Big Microsoft data breach – 250 million records exposed ⚠

Microsoft has today announced a data breach that affected one of its customer databases.

πŸ“– Read

via "Naked Security".
14:59
πŸ” Analysts question whether FBI election cybersecurity changes are robust enough πŸ”

New guidelines show how the agency will coordinate with state officials in the event of a cyberattack on election infrastructure.

πŸ“– Read

via "Security on TechRepublic".
?
15:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'We Only Have Two of the Blinky Boxes Left to Go' πŸ•΄

Exactly who is king of the castle here?

πŸ“– Read

via "Dark Reading: ".
?
16:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why DPOs and CISOs Must Work Closely Together πŸ•΄

Recent data protection laws mean that the data protection officer and CISO must work in tandem to make sure users' data is protected.

πŸ“– Read

via "Dark Reading: ".
?
16:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Configuration Error Reveals 250 Million Microsoft Support Records πŸ•΄

Some the records, found on five identically configured servers, might have contained data in clear text.

πŸ“– Read

via "Dark Reading: ".
16:35
πŸ” NIST Issues Version 1.0 of Privacy Framework πŸ”

NIST released new guidance last week, its Privacy Framework, that can be used by organizations as a risk management tool, to answer questions about its privacy posture, or establish its own program.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:44
ATENTIONβ€Ό New - CVE-2011-3621

A reverse proxy issue exists in FluxBB before 1.4.7 when FORUM_BEHIND_REVERSE_PROXY is enabled.

πŸ“– Read

via "National Vulnerability Database".
16:44
ATENTIONβ€Ό New - CVE-2011-3614

An Access Control vulnerability exists in the Facebook, Twitter, and Embedded plugins in Vanilla Forums before 2.0.17.9.

πŸ“– Read

via "National Vulnerability Database".
16:44
ATENTIONβ€Ό New - CVE-2011-3613

An issue exists in Vanilla Forums before 2.0.17.9 due to the way cookies are handled.

πŸ“– Read

via "National Vulnerability Database".
16:44
ATENTIONβ€Ό New - CVE-2011-3612

Cross-Site Request Forgery (CSRF) vulnerability exists in panel.php in UseBB before 1.0.12.

πŸ“– Read

via "National Vulnerability Database".
16:44
ATENTIONβ€Ό New - CVE-2011-3611

A File Inclusion vulnerability exists in act parameter to admin.php in UseBB before 1.0.12.

πŸ“– Read

via "National Vulnerability Database".
?
17:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Eight Flaws in MSP Software Highlight Potential Ransomware Vector πŸ•΄

An attack chain of vulnerabilities in ConnectWise's software for MSPs has similarities to some of the details of the August attack on Texas local and state agencies.

πŸ“– Read

via "Dark Reading: ".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 3 biggest threats cybersecurity professionals are facing in 2020 πŸ”

Organizations are moving toward next-generation cybersecurity solutions this year, but security fragmentation is a looming threat.

πŸ“– Read

via "Security on TechRepublic".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to disconnect devices and revoke app privileges from your Firefox cloud account πŸ”

You'll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them.

πŸ“– Read

via "Security on TechRepublic".
?
18:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-3622

A Cross-Site Scripting (XSS) vulnerability exists in the admin login screen in Phorum before 5.2.18.

πŸ“– Read

via "National Vulnerability Database".
?
19:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ To Avoid Disruption, Ransomware Victims Continue to Pay Up πŸ•΄

For all the cautions against doing so, one-third of organizations in a Proofpoint survey said they paid their attackers after getting infected with ransomware.

πŸ“– Read

via "Dark Reading: ".
19:49
❌ Vivin Nets Thousands of Dollars Using Cryptomining Malware ❌

A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn't going away anytime soon.

πŸ“– Read

via "Threatpost".
?
20:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ For Mismanaged SOCs, The Price Is Not Right πŸ•΄

New research finds security operations centers suffer high turnover and yield mediocre results for the investment they require.

πŸ“– Read

via "Dark Reading: ".
?
21:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Pwn2Own Miami Contestants Haul in $180K for Hacking ICS Equipment ❌

The competition targets the systems that run critical infrastructure and more.

πŸ“– Read

via "Threatpost".
23 January 2020
?
02:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization against targeted phishing attacks πŸ”

Companies should realize that any user could be a target and use threat data to build a security awareness training program, says Proofpoint.

πŸ“– Read

via "Security on TechRepublic".
?
07:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FBI issues warning about lucrative fake job scams ⚠

What’s the difference between a real job and a fake one found on the internet? The fake ones are suspiciously easy to get interviews for.

πŸ“– Read

via "Naked Security".
07:55
⚠ Sonos’s tone-deaf legacy product policy angers customers ⚠

Stopping software updates for legacy kit is nothing new, but it's the way the company has done it that has Sonos customers' hackles up.

πŸ“– Read

via "Naked Security".
?
08:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple allegedly made nice with FBI by dropping iCloud encryption plan ⚠

Sources told Reuters that Apple may have been convinced by arguments made during the legal fight over cracking the San Bernardino iPhone.

πŸ“– Read

via "Naked Security".
?
08:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ UN report alleges that Saudi crown prince hacked Jeff Bezos’s phone ⚠

Digital forensic evidence points to the phone's massive, months-long data egress having likely been triggered by Pegasus mobile spyware.

πŸ“– Read

via "Naked Security".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google: Flaws in Apple’s Private-Browsing Technology Allow for Third-Party Tracking ❌

New research outlines vulnerabilities in Safari’s Intelligent Tracking Protection that can reveal user browsing behavior to third parties.

πŸ“– Read

via "Threatpost".
?
10:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Looking for silver linings in the CVE-2020-0601 crypto vulnerability ⚠

Is there some good news hidden in the story of the CVE-2020-0601 crypto vulnerability?

πŸ“– Read

via "Naked Security".
?
12:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Weathering the Privacy Storm from GDPR to CCPA & PDPA πŸ•΄

A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.

πŸ“– Read

via "Dark Reading: ".
12:19
πŸ•΄ Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says πŸ•΄

Attackers 'weaponized' Active Directory to spread the ransomware.

πŸ“– Read

via "Dark Reading: ".
?
13:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Warns of Critical Network Security Tool Flaw ❌

The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls.

πŸ“– Read

via "Threatpost".
13:22
πŸ” Why many small and midsized businesses remain vulnerable to cyberattack πŸ”

Budget limitations and a lack of knowledge or training are two major factors hurting many SMBs, according to a survey from Untangle.

πŸ“– Read

via "Security on TechRepublic".
13:37
πŸ›  Falco 0.19.0 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-3295

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:42
ATENTIONβ€Ό New - CVE-2008-7314

mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname.

πŸ“– Read

via "National Vulnerability Database".
14:42
ATENTIONβ€Ό New - CVE-2007-6758

Server-side request forgery (SSRF) vulnerability in feed-proxy.php in extjs 5.0.0.

πŸ“– Read

via "National Vulnerability Database".
?
15:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Severe Vulnerabilities Discovered in GE Medical Devices πŸ•΄

CISA has released an advisory for six high-severity CVEs for GE Carescape patient monitors, Apex Pro, and Clinical Information Center systems.

πŸ“– Read

via "Dark Reading: ".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Deconstructing Web Cache Deception Attacks: They're Bad; Now What? πŸ•΄

Expect cache attacks to get worse before they get better. The problem is that we don't yet have a good solution.

πŸ“– Read

via "Dark Reading: ".
16:19
❌ Shlayer, No. 1 Threat for Mac, Targets YouTube, Wikipedia ❌

The malware uses thousands of partner websites to spread malvertising code.

πŸ“– Read

via "Threatpost".
16:19
❌ U.S. Gov Agency Targeted With Malware-Laced Emails ❌

The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.

πŸ“– Read

via "Threatpost".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CISA Warns of Uptick in Emotet Malware πŸ”

CISA is spreading new guidance to ensure admins can properly defend against Emotet malware attacks, which the agency claims are on the rise.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical, Unpatched β€˜MDhex’ Bugs Threaten Hospital Devices ❌

The Feds have warned on six vulnerabilities in GE medical equipment that could affect patient monitor alarms and more.

πŸ“– Read

via "Threatpost".
?
17:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NSA Offers Guidance on Mitigating Cloud Flaws πŸ•΄

A new document separates cloud vulnerabilities into four classes and offers mitigations to help businesses protect cloud resources.

πŸ“– Read

via "Dark Reading: ".
?
18:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DHS Warns of Increasing Emotet Risk πŸ•΄

Emotet is considered one of the most damaging banking Trojans, primarily through its ability to carry other malware into an organization.

πŸ“– Read

via "Dark Reading: ".
18:22
πŸ” 5G promises faster speeds and greater security risks πŸ”

TechRepublic's Karen Roby talks with Radware exec Mike O'Malley about the growing security risks that accompany 5G for providers, smart cities, and the enterprise

πŸ“– Read

via "Security on TechRepublic".
?
18:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5G promises faster speeds and greater security risks πŸ”

TechRepublic's Karen Roby talks with Radware exec Mike O'Malley about the growing security risks that accompany 5G for providers, smart cities, and the enterprise.

πŸ“– Read

via "Security on TechRepublic".
18:52
πŸ” How to protect previous Firefox tabs from being hijacked πŸ”

Learn how to secure Firefox tabs from mischief with the Don't Touch My Tabs add-on.

πŸ“– Read

via "Security on TechRepublic".
?
21:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Annoying MacOS Threat That Won't Go Away πŸ•΄

In two years, the adware-dropping Shlayer Trojan has spread to infect one in 10 MacOS systems, Kaspersky says.

πŸ“– Read

via "Dark Reading: ".
24 January 2020
?
07:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Privacy watchdog throws wider net to protect children online ⚠

A new, comprehensive code will compel online services to put children's health and safety before data-collecting profits.

πŸ“– Read

via "Naked Security".
?
08:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ 9th Methbot suspect arrested in massive clickfraud ring ⚠

How Sergey Denisoff described his early ad-buying ventures: buying BS popup traffic and reselling it to buyers demanding BS traffic.

πŸ“– Read

via "Naked Security".
?
08:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Protestors petition equity firm over .org buyout ⚠

The street outside ICAAN's offices in Playa Vista, California, is likely a little more crowded than normal.

πŸ“– Read

via "Naked Security".
?
11:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Fake Smart Factory Honeypot Highlights New Attack Threats ❌

The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems.

πŸ“– Read

via "Threatpost".
11:49
πŸ•΄ Online Employment Scams on the Rise, Says FBI πŸ•΄

Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.

πŸ“– Read

via "Dark Reading: ".
?
12:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Resume Basics for a Budding Cybersecurity Career πŸ•΄

You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.

πŸ“– Read

via "Dark Reading: ".
?
12:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Atlas VPN Review πŸ•΅


πŸ“– Read

via "VPNpro".
?
13:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to set up secure credential storage for Docker πŸ”

Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.

πŸ“– Read

via "Security on TechRepublic".
13:52
πŸ” How to add a host to Observium πŸ”

Now that you have the Observium network monitoring platform installed, it's time to add a host.

πŸ“– Read

via "Security on TechRepublic".
13:55
⚠ Google finds privacy holes in Safari’s ITP anti-tracking system ⚠

Apple’s much-vaunted Intelligent Tracking Prevention (ITP) could leave users exposed to a raft of privacy issues, including - ironically - being tracked.

πŸ“– Read

via "Naked Security".
?
14:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  TestSSL 3.0 πŸ› 

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Bill Proposes NSA Surveillance Reforms ❌

The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.

πŸ“– Read

via "Threatpost".
?
15:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hackers targeting Arabic-speaking countries with malicious Microsoft Office documents πŸ”

Cybercriminals created a homemade RAT that uses multiple cloud services and targets countries like Saudi Arabia, Iraq, Egypt, Libya, Algeria, and Morocco.

πŸ“– Read

via "Security on TechRepublic".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 1/24 Edition πŸ”

Job performance details of over 900 employees left exposed online, a new ransomware family targets Windows 10 users, and more - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:49
❌ Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings ❌

The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.

πŸ“– Read

via "Threatpost".
?
18:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'CardPlanet' Operator Pleads Guilty in Federal Court πŸ•΄

Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.

πŸ“– Read

via "Dark Reading: ".
?
18:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates ❌

Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.

πŸ“– Read

via "Threatpost".
18:49
πŸ•΄ 7 Steps to IoT Security in 2020 πŸ•΄

There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.

πŸ“– Read

via "Dark Reading: ".
18:49
πŸ•΄ New Social Engineering Event to Train Business Pros on Human Hacking πŸ•΄

The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior.

πŸ“– Read

via "Dark Reading: ".
25 January 2020
?
14:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Lulzbuster 1.0.0 πŸ› 

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
27 January 2020
?
06:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ RusVPN Review πŸ•΅


πŸ“– Read

via "VPNpro".
?
07:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 21 stories of the week ⚠

From a big Microsoft data breach to the seizing of a stolen-creds site by the FBI - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ New York wants to ban taxpayer-funded ransomware payments ⚠

One of the proposed bills would set up a $5m fund to help small towns upgrade their systems and bolster their security.

πŸ“– Read

via "Naked Security".
?
10:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Instagram CEO’s homes were targetted by SWATters ⚠

Instagram CEO Adam Mosseri's houses were surrounded by SWAT teams after hoax phone calls claimed hostages were being held there.

πŸ“– Read

via "Naked Security".
?
10:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Tinder to get panic button, catfish-fighting facial recognition ⚠

It's both a genius move to protect from assault and fraud and a personal data grab.

πŸ“– Read

via "Naked Security".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mandatory IoT Security in the Offing with U.K. Proposal ❌

The new U.K. law mandates that manufacturers apply several security controls to their connected devices.

πŸ“– Read

via "Threatpost".
11:33
⚠ Cardplanet mastermind pleads guilty to credit card fraud ⚠

Cardplanet offered refunds on invalid card data, along with a card checking service that ensured a stolen card was still valid.

πŸ“– Read

via "Naked Security".
?
12:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Get the Most Out of Your Security Metrics πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
13:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What's your organization's cybersecurity strategy? πŸ”

Take this quick, multiple choice survey and tell us about your company's cybersecurity strategies for the upcoming year.

πŸ“– Read

via "Security on TechRepublic".
13:54
πŸ•΄ Greater Focus on Privacy Pays Off for Firms πŸ•΄

Privacy-mature companies complete sales more quickly, have fewer and less serious breaches, and recover from incidents faster, according to Cisco's annual survey.

πŸ“– Read

via "Dark Reading: ".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-4558

Tiki 8.2 and earlier allows remote administrators to execute arbitrary PHP code via crafted input to the regexres and regex parameters.

πŸ“– Read

via "National Vulnerability Database".
14:34
ATENTIONβ€Ό New - CVE-2006-7246

NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.

πŸ“– Read

via "National Vulnerability Database".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ N.Y. Could Ban Cities from Paying Ransomware Attackers ❌

State senators have issued proposals they say would encourage municipalities to upgrade their cyber-postures.

πŸ“– Read

via "Threatpost".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Insider Leaked 1.2K Patient Records for 20 Months πŸ”

The employee accessed information, including names, addresses, and social security numbers, from Feb. 2017 to Oct. 2019.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:18
❌ As Necurs Botnet Falls from Grace, Emotet Rises ❌

Researchers wonder if a recent "amateur spam" campaign by the once-prevalant malware distribution botnet is a sign of trojans looking to other infection paths.

πŸ“– Read

via "Threatpost".
?
18:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google, Mozilla Ban Hundreds of Browser Extensions in Chrome, Firefox ❌

After discovering a wide pattern of potentially malicious behavior in browser extensions, the two search giants are cracking down.

πŸ“– Read

via "Threatpost".
?
19:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect previous Firefox tabs from being hijacked πŸ”

Learn how to secure Firefox tabs from mischief with the Don't Touch My Tabs add-on.

πŸ“– Read

via "Security on TechRepublic".
19:19
πŸ” Risk managers: Here are the must-have skills for 2020 πŸ”

The risk management field is growing more challenging as threats evolve. How will these changing threats affect your organization in 2020?

πŸ“– Read

via "Security on TechRepublic".
?
20:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Aircrack-ng Wireless Network Tools 1.6 πŸ› 

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
20:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Average Ransomware Payments More Than Doubled in Q4 2019 πŸ•΄

Ransomware attackers collected an average of around $84,000 from victim organizations, up from $41,000 in Q3 of 2018, Coveware says.

πŸ“– Read

via "Dark Reading: ".
28 January 2020
?
05:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Okta ranks the most popular and fastest-growing apps in the enterprise πŸ”

Okta's annual study shows companies investing in apps and tools focused on security, data, and app development; favorites include GitHub and Zoom.

πŸ“– Read

via "Security on TechRepublic".
?
08:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Mozilla bans Firefox extensions for executing remote code ⚠

Mozilla’s policy is unambiguous - add-ons must be self-contained and not load remote code, which opens up the user to all sorts of risks.

πŸ“– Read

via "Naked Security".
08:03
⚠ Cisco patches bugs in security admin center and Webex ⚠

Cisco has patched bugs in Webex and in Firepower Management Centre, the device that controls its security products.

πŸ“– Read

via "Naked Security".
08:03
⚠ Facial recognition firm sued for scraping 3 billion faceprints ⚠

A potential class action says Clearview AI is breaking biometrics privacy law by ransacking social media so police can match photos with IDs.

πŸ“– Read

via "Naked Security".
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ States sue over rules that allow release of 3D-printed gun blueprints ⚠

The government has flip-flopped, most recently proposing rules that would transfer regulation out of the hands of the State Department.

πŸ“– Read

via "Naked Security".
?
09:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zoom Fixes Flaw Opening Meetings to Hackers ❌

Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting.

πŸ“– Read

via "Threatpost".
09:25
❌ LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks ❌

New research from IOActive has found that β€œblindly” trusting the encryption of the widely adopted device protocol can lead to DDoS, sending of false data and other cyber attacks.

πŸ“– Read

via "Threatpost".
?
09:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Zoom Bug Prompts Security Fix, Platform Changes πŸ•΄

A newly discovered Zoom vulnerability would have enabled an attacker to join active meetings and access audio, video, and documents shared.

πŸ“– Read

via "Dark Reading: ".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MTTD and MTTR: Two Metrics to Improve Your Cybersecurity ❌

While there are dozens of metrics available to determine success, there are two key cybersecurity performance indicators every organization should monitor.

πŸ“– Read

via "Threatpost".
?
11:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to set up secure credential storage for Docker πŸ”

Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.

πŸ“– Read

via "Security on TechRepublic".
?
14:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ 5 ways to be a bit safer this Data Privacy Day ⚠

Here are 5 things you can start doing today for your own and for everyone else's online good!

πŸ“– Read

via "Naked Security".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Security admins checklist: 10 tasks to perform every year πŸ”

Here are 10 important tasks security administrators should perform to keep devices protected and secure.

πŸ“– Read

via "Security on TechRepublic".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-3614 (vanilla)

An Access Control vulnerability exists in the Facebook, Twitter, and Embedded plugins in Vanilla Forums before 2.0.17.9.

πŸ“– Read

via "National Vulnerability Database".
14:34
ATENTIONβ€Ό New - CVE-2011-3613 (vanilla)

An issue exists in Vanilla Forums before 2.0.17.9 due to the way cookies are handled.

πŸ“– Read

via "National Vulnerability Database".
?
15:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” C-suite unprepared for NotPetya and other extinction-level cyberattacks πŸ”

Many executives either don't know what their company's cyber defense is, lack budget, or spend too much time analyzing rather than taking action.

πŸ“– Read

via "Security on TechRepublic".
15:28
❌ Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners ❌

The Amazon-owned video doorbell uses third-party trackers to serve up rich data to marketers without meaningfully notifying users.

πŸ“– Read

via "Threatpost".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CCPA: Cut From the Same Cloth as PCI DSS πŸ•΄

Finally, some good news about CCPA: If you've built your security infrastructure to PCI DSS standards, you may be already covered by California's new data protection rules

πŸ“– Read

via "Dark Reading: ".
?
16:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Intel Previews Newest 'Zombieload' Patch πŸ•΄

Intel has promised a third patch to remediate the Zombieload speculative execution vulnerability.

πŸ“– Read

via "Dark Reading: ".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ex-Worker Stole 'Crown Jewels' Before Leaving Company πŸ”

In a criminal trial, prosecutors for the now defunct fitness tracking company Jawbone are alleging the ex-employee stole studies the company considered its β€œcrown jewels" before joining Fitbit.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:24
πŸ•΄ Russian Brothers Sentenced to 12 Years for Fraud and Identity Theft πŸ•΄

The pair, based in Fort Lauderdale, Fla., were running a sophisticated credit card fraud factory.

πŸ“– Read

via "Dark Reading: ".
?
17:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Do I Get My Team Started with Container Security and Kubernetes? πŸ•΄

Begin with one application, then give your tech team some time to learn.

πŸ“– Read

via "Dark Reading: ".
?
18:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Trolls-For-Hire Pave Way For Sophisticated Social Media Hacks ❌

Threat actors leveraging social media for hacks and misinformation are growing more coordinated.

πŸ“– Read

via "Threatpost".
?
20:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New β€˜CacheOut’ Attack Targets Intel CPUs ❌

Researchers have release a new proof-of-concept attack targeting a new Intel Speculative-type bug called CacheOut present in most Intel CPUs.

πŸ“– Read

via "Threatpost".
?
21:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Understand What You Believe': Fmr. FBI Agent Unpacks Information Threats πŸ•΄

In the past few years, social media has transformed from a communications gold mine to a minefield of disinformation campaigns.

πŸ“– Read

via "Dark Reading: ".
?
21:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise πŸ•΄

The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.

πŸ“– Read

via "Dark Reading: ".
?
22:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NFL, Multiple NFL Teams' Twitter Accounts Hacked and Hijacked πŸ•΄

Hackers claiming to be from the hacktivist group OurMine temporarily took over Twitter accounts of the NFL and several teams in the league.

πŸ“– Read

via "Dark Reading: ".
29 January 2020
?
08:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ 15 NFL teams’ Twitter hijacked in lead-up to the Super Bowl ⚠

"We are here to show people that everything is hackable," says hacking group OurMine, back to spread its unwelcome spiel on hacked accounts.

πŸ“– Read

via "Naked Security".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Wawa Breach May Have Affected More Than 30 Million Customers ❌

Hefty collection of U.S. and international payment cards from the incident revealed in December found up for sale on dark-web marketplace Joker’s Stash.

πŸ“– Read

via "Threatpost".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Fraud spike prompts Chrome developer lock-out ⚠

Google Chrome extension developers have been left high and dry for weeks as the company struggles to cope with a spike in fraud on the Chrome Web Store.

πŸ“– Read

via "Naked Security".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Let’s make ransomware MORE illegal, says Maryland ⚠

… with a clumsily worded proposed bill that wouldn't protect researchers.

πŸ“– Read

via "Naked Security".
?
11:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Companies Should Care about Data Privacy Day πŸ•΄

Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.

πŸ“– Read

via "Dark Reading: ".
11:25
πŸ•΄ Why Threat Hunting Is Not for Everyone πŸ•΄

Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.

πŸ“– Read

via "Dark Reading: ".
11:39
πŸ” Cyberattacks against endpoints rising, reaching $9 million per attack in 2019 πŸ”

Attacks against endpoints have become more costly, up more than $2 million since 2018.

πŸ“– Read

via "Security on TechRepublic".
?
11:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Threat Hunting Is Not for Everyone πŸ•΄

Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.

πŸ“– Read

via "Dark Reading: ".
11:57
⚠ Anatomy of a β€œfree” gift – how online surveys can harm your digital health ⚠

Just how much will that Β£1000 "free" gift card cost? We took a look so you don't have to...

πŸ“– Read

via "Naked Security".
?
12:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Intel promises fix after researchers reveal β€˜CacheOut’ CPU flaws ⚠

Forget the infamous Meltdown and Spectre chip flaws from 2018, the problem that’s tying down Intel’s patching team these days is a more recent class of side channel vulnerabilities known collectively as ZombieLoad.

πŸ“– Read

via "Naked Security".
12:25
πŸ•΄ Businesses Improve Their Data Security, But Privacy - Not So Much πŸ•΄

While the California Consumer Privacy Act will force companies to provide a modicum of meaningful privacy, World Privacy Day still mainly celebrates data security.

πŸ“– Read

via "Dark Reading: ".
12:25
πŸ•΄ Securing Containers with Zero Trust πŸ•΄

A software identity-based approach should become a standard security measure for protecting workloads in all enterprise networks.

πŸ“– Read

via "Dark Reading: ".
12:37
❌ Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats ❌

Maya Horowitz with Check Point Research discussed recently-disclosed Zoom vulnerabilities that could have opened up web conferencing meetings to hackers.

πŸ“– Read

via "Threatpost".
12:37
❌ Critical Flaws in Magento e-Commerce Platform Allow Code-Execution ❌

Admins are encouraged to update their websites to stave off attacks from Magecart card-skimmers and others.

πŸ“– Read

via "Threatpost".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Pilfered Wawa Payment Card Data Now for Sale on Dark Web πŸ•΄

The Joker's Stash underground marketplace is offering stolen payment card data from Wawa's recently disclosed data breach.

πŸ“– Read

via "Dark Reading: ".
?
14:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-5776

Dokeos 2.1.1 has multiple XSS issues involving "extra_" parameters in main/auth/profile.php.

πŸ“– Read

via "National Vulnerability Database".
14:38
ATENTIONβ€Ό New - CVE-2012-4383

contao prior to 2.11.4 has a sql injection vulnerability

πŸ“– Read

via "National Vulnerability Database".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple patches critical bugs on iPhone and Mac – update now! ⚠

Get them now before the crooks figure out what to do with the holes.

πŸ“– Read

via "Naked Security".
?
15:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 Things Application Security Champions Need to Succeed πŸ•΄

Common elements to highly effective security champion programs that take DevSecOps to the next level

πŸ“– Read

via "Dark Reading: ".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise πŸ•΄

The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.

πŸ“– Read

via "Dark Reading: ".
16:09
πŸ” Data Privacy: Top trends to watch in 2020 πŸ”

Data privacy is an increasing concern for companies and individuals. Learn more about what's on the landscape for 2020.

πŸ“– Read

via "Security on TechRepublic".
?
16:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 Things Application Security Champions Need to Succeed πŸ•΄

Common elements to highly effective security champion programs that take DevSecOps to the next level.

πŸ“– Read

via "Dark Reading: ".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Snack Bar Exec Mailed Trade Secrets To Himself πŸ”

Hershey is suing a former exec who it claims took valuable trade secrets before leaving his job for a snack bar maker.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:07
❌ Google Sets Record High in Bug-Bounty Payouts ❌

After a year of big changes, white hats reaped more from Google's programs than ever before.

πŸ“– Read

via "Threatpost".
?
17:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Snowflake is the Linux SSH GUI you didn't know you needed πŸ”

Is a Linux SSH GUI in your future? Jack Wallen believes once you try Snowflake, there's no going back.

πŸ“– Read

via "Security on TechRepublic".
17:39
πŸ” Snowflake is the Linux SSH GUI you didn't know you needed πŸ”

Is a Linux SSH GUI in your future? Jack Wallen believes once you try Snowflake, there's no going back.

πŸ“– Read

via "Security on TechRepublic".
17:39
πŸ” How to enable facial recognition in the BitWarden mobile password manager πŸ”

The latest version of the BitWarden Android client supports facial recognition. Find out how to enable it.

πŸ“– Read

via "Security on TechRepublic".
17:39
πŸ” How to enable facial recognition in the BitWarden mobile password manager πŸ”

The latest version of the BitWarden Android client supports facial recognition. Find out how to enable it.

πŸ“– Read

via "Security on TechRepublic".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-5698 (babygekko)

BabyGekko before 1.2.4 has SQL injection.

πŸ“– Read

via "National Vulnerability Database".
?
19:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Inside the Check Point Research Team's Investigation Process πŸ•΄

The team sheds light on how their organization works and what they're watching in the threat landscape.

πŸ“– Read

via "Dark Reading: ".
19:25
πŸ•΄ Criminals Hide Malware Behind Grammy-Winning Cover πŸ•΄

Songs by Ariana Grande, Taylor Swift, and Post Malone are the most popular places.

πŸ“– Read

via "Dark Reading: ".
19:37
❌ Apple Security Updates Tackle iOS Device Tracking ❌

Apple’s iOS 13.3.1 update includes a host of security patches and a way to turn off U1 Ultra Wideband tracking.

πŸ“– Read

via "Threatpost".
?
21:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Number of Botnet Command & Control Servers Soared in 2019 πŸ•΄

Servers worldwide that were used to control malware-infected systems jumped more than 71% compared to 2018, Spamhaus says.

πŸ“– Read

via "Dark Reading: ".
21:25
πŸ•΄ Aftermath of a Major ICS Hacking Contest πŸ•΄

Pwn2Own Miami could help spur more research on and attention to the security of industrial control system products, experts say.

πŸ“– Read

via "Dark Reading: ".
30 January 2020
?
08:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Dell, HP Memory-Access Bugs Open Attacker Path to Kernel Privileges ❌

The manufacturers have issued BIOS updates to address the issues, but researchers warn DMA attacks are likely possible against a range of laptops and desktops.

πŸ“– Read

via "Threatpost".
?
08:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Government spyware company spied on hundreds of innocent people ⚠

eSurv execs have been charged with fraud, unauthorized access to a computer system, illicit interception and illicit data processing.

πŸ“– Read

via "Naked Security".
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook to Pay $550M to Settle Class Action Case Over Facial Recognition ❌

The settlement in a case over the social network’s Tag Suggestions feature is the latest financial blow the company has taken over its handling of user privacy.

πŸ“– Read

via "Threatpost".
?
10:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Employers can’t force you to get microchipped, Indiana reps say ⚠

The US state wants to make sure employers don't "overstep their bounds" by imposing mandatory employee microchipping.

πŸ“– Read

via "Naked Security".
?
13:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Snack Bar Exec Emailed Trade Secrets To Himself πŸ”

Hershey is suing a former exec who it claims took valuable trade secrets before leaving his job for a snack bar maker.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
13:07
❌ U.N. Hack Stemmed From Microsoft SharePoint Flaw ❌

Reportedly, the bug wasn't patched, leading to a data breach in July.

πŸ“– Read

via "Threatpost".
13:18
⚠ Facebook knows a lot about your online habits – here’s how to stop it ⚠

Facebook's new Off-Facebook Activity feature is part of the company's effort to appear more privacy-friendly to its users.

πŸ“– Read

via "Naked Security".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Election Security 2020: How We Should Allocate $425M in Funding πŸ•΄

Too many states and municipalities still rely on aging systems; it's time they upped their game and treated election technology like they would any other security project.

πŸ“– Read

via "Dark Reading: ".
?
14:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Trello exposed! Search turns up huge trove of private data ⚠

A surprising number of users seem to be setting Trello boards, and their often highly sensitive content, to β€˜public’.

πŸ“– Read

via "Naked Security".
14:21
⚠ S2 Ep24: Tinder, angry customers and weleakinfo takedown – Naked Security Podcast ⚠

New episode available now.

πŸ“– Read

via "Naked Security".
14:25
πŸ•΄ Enterprise Hardware Still Vulnerable to Memory Lane Attacks πŸ•΄

Most laptops, workstations, and servers are still vulnerable to physical attacks via direct memory access, despite mitigations often being available, report says.

πŸ“– Read

via "Dark Reading: ".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Patches Two High-Severity Bugs in its Small Business Switch Lineup ❌

Vulnerabilities allow unauthenticated remote attackers to access sensitive device information and launch denial of service attacks.

πŸ“– Read

via "Threatpost".
15:07
❌ Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication ❌

The recently disclosed Jeff Bezos phone hack and other incidents show that mobile devices are being increasingly targeted by sophisticated nation-state attackers.

πŸ“– Read

via "Threatpost".
?
15:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ United Nations Data Breach Started with Microsoft SharePoint Bug πŸ•΄

A remote code execution flaw enabled a breach of UN offices in Geneva and Vienna, as well as the Office of the High Commissioner for Human Rights.

πŸ“– Read

via "Dark Reading: ".
15:37
❌ Coronavirus Campaigns Spread Emotet, Malware ❌

The ongoing global spread of the disease precipitates malware infections.

πŸ“– Read

via "Threatpost".
?
16:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Report Claims Servers at United Nations Hacked πŸ”

The U.N. confirmed the incident but there are conflicting reports whether or not data was exfiltrated as a result.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Secure Your IoT Ecosystem in the Age of 5G πŸ•΄

For businesses planning to adopt 5G, the sheer number of IoT devices creates a much larger attack surface.

πŸ“– Read

via "Dark Reading: ".
16:39
πŸ” 97 of the world's 100 largest airports have massive cybersecurity risks πŸ”

An investigation of airport cybersecurity found glaring gaps in security for web and mobile applications, misconfigured public clouds, Dark Web exposure and code repositories leaks.

πŸ“– Read

via "Security on TechRepublic".
?
17:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ I'm an SMB. What Should I Watch for When Choosing Security Vendors and Their Products? πŸ•΄

SMBs need action, not just insight.

πŸ“– Read

via "Dark Reading: ".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ I'm an SMB. What Should I Watch for When Choosing Security Vendors? πŸ•΄

SMBs need action, not just insight.

πŸ“– Read

via "Dark Reading: ".
18:09
πŸ” Top 10 tech policy trends to watch in 2020 πŸ”

Given the tech industry's poor track record of protecting users data and controlling its environmental impact, regulators around the globe are stepping into the void.

πŸ“– Read

via "Security on TechRepublic".
?
19:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 200K WordPress Sites Vulnerable to Plugin Flaw ❌

Developers behind WordPress plugin Code Snippets have issued a patch for the high-severity flaw.

πŸ“– Read

via "Threatpost".
?
19:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How To Keep Your Privacy and Data Secure While Working With a Remote Team πŸ•΄

Implementing basic strategies can ensure your remote team's work will be secure, data will be protected, and you'll be far less exposed to security risks.

πŸ“– Read

via "Dark Reading: ".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners πŸ•΄

Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money - and cred with major criminal syndicates.

πŸ“– Read

via "Dark Reading: ".
19:55
πŸ•΄ Android Malware for Mobile Ad Fraud Spiked Sharply in 2019 πŸ•΄

Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says.

πŸ“– Read

via "Dark Reading: ".
19:55
πŸ•΄ Two Vulnerabilities Found in Microsoft Azure Infrastructure πŸ•΄

Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.

πŸ“– Read

via "Dark Reading: ".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How organizations should handle data breaches πŸ”

How an organization handles a breach can be just as critical as protecting against one, according to Security.org.

πŸ“– Read

via "Security on TechRepublic".
31 January 2020
?
06:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ How to watch BritBox outside the US, UK & Canada πŸ•΅


πŸ“– Read

via "VPNpro".
?
07:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook to pay $550m to settle face-tagging suit ⚠

A class-action lawsuit against Facebook for the use of its tag suggestions feature looks like it's finally done churning through the courts.

πŸ“– Read

via "Naked Security".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program ❌

Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.

πŸ“– Read

via "Threatpost".
09:19
⚠ Financial tech firms disagree on ban of customer data screen-scraping ⚠

They use it to offer things like budgeting apps. It puts passwords and privacy at risk, but some say they can't afford to build APIs instead.

πŸ“– Read

via "Naked Security".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US Interior Dept extends drone grounding over foreign hacking fears ⚠

The DOI has doubled down on a previous order, keeping the agency’s drones grounded for another 30 days for a more in-depth security review.

πŸ“– Read

via "Naked Security".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ UN hacked via unpatched SharePoint server ⚠

UN staffers: the "entire domain" was probably compromised by an attacker who was lurking on the UN's networks.

πŸ“– Read

via "Naked Security".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sodinokibi Ransomware Group Sponsors Hacking Contest ❌

Larger winnings for underground skills competitions are attracting sophisticated crime groups.

πŸ“– Read

via "Threatpost".
?
12:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Embracing a Prevention Mindset to Protect Critical Infrastructure πŸ•΄



πŸ“– Read

via "Dark Reading: ".
12:39
πŸ” How to avoid the mistakes made in the UN data breach πŸ”

Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.

πŸ“– Read

via "Security on TechRepublic".
?
12:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Lulzbuster 1.1.0 πŸ› 

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:54
πŸ›  TOR Virtual Network Tunneling Tool 0.4.2.6 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:54
πŸ›  Faraday 3.10.2 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zero Day Initiative Bug Hunters Rake in $1.5M in 2019 ❌

Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.

πŸ“– Read

via "Threatpost".
?
14:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to change iOS 13 settings for better security πŸ”

Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings.

πŸ“– Read

via "Security on TechRepublic".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Serious Security – How β€˜special case’ code blew a hole in OpenSMTPD ⚠

Patch now before you receive a message that's more than just bad news!

πŸ“– Read

via "Naked Security".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ AppSec Concerns Drove 61% of Businesses to Change Applications πŸ•΄

According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.

πŸ“– Read

via "Dark Reading: ".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 1/31 Edition πŸ”

The state of New York may ban ransomware payments, NFL Twitter accounts get hacked, and Facebook releases a new data privacy tool for users - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:38
ATENTIONβ€Ό New - CVE-2011-4117

The Batch::BatchRun module 1.03 for Perl does not properly handle temporary files.

πŸ“– Read

via "National Vulnerability Database".
16:38
ATENTIONβ€Ό New - CVE-2011-4116

_is_safe in the File::Temp module for Perl does not properly handle symlinks.

πŸ“– Read

via "National Vulnerability Database".
16:38
ATENTIONβ€Ό New - CVE-2011-4115

Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.

πŸ“– Read

via "National Vulnerability Database".
16:38
ATENTIONβ€Ό New - CVE-2011-4088

ABRT might allow attackers to obtain sensitive information from crash reports.

πŸ“– Read

via "National Vulnerability Database".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ashley Madison Breach Returns with Extortion Campaign πŸ•΄

The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach.

πŸ“– Read

via "Dark Reading: ".
18:07
❌ Iranian Hackers Target U.S. Gov. Vendor With Malware ❌

APT34 has been spotted in a malware campaign targeting customers and employees of a company that works closely with U.S. federal agencies, and state and local governments.

πŸ“– Read

via "Threatpost".
?
18:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'George' the Most Popular Password That's a Name πŸ•΄

A new study of stolen passwords reflects the consequences of password overload.

πŸ“– Read

via "Dark Reading: ".
18:25
πŸ•΄ What It's Like to Be a CISO: Check Point Security Leader Weighs In πŸ•΄

Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ashley Madison breach victims have more to worry about πŸ”

Five-year old data from the site's breach is at the center of a new cryptocurrency ransom campaign, and it may be the beginning of a new trend.

πŸ“– Read

via "Security on TechRepublic".
?
19:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Evil Corp Returns With New Malware Infection Tactic ❌

Researchers have observed the cybercrime group back in action, now using a new tactic for distributing malware.

πŸ“– Read

via "Threatpost".
19:37
❌ Advanced Obfuscation Marks Widespread Info-Stealing Campaign ❌

Agent Tesla and LokiBot are common payloads in the botnet-driven spam effort.

πŸ“– Read

via "Threatpost".
1 February 2020
?
01:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Super Bowl 54: How 5G will help keep fans safe at the game πŸ”

High-tech security features will help keep 49ers and Chiefs fans safe during Super Bowl weekend in Miami.

πŸ“– Read

via "Security on TechRepublic".
?
17:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hackers using coronavirus scare to spread Emotet malware in Japan πŸ”

Cybercriminals are using global fears about the virus to spread the Emotet trojan.

πŸ“– Read

via "Security on TechRepublic".
3 February 2020
?
07:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 25 stories of the week ⚠

From exposing private data on Trello to critical iPhone bugs - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
08:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google launches open-source security key project, OpenSK ⚠

OpenSK is a piece of firmware that you can install on a USB dongle of your own, turning it into a usable FIDO or U2F key.

πŸ“– Read

via "Naked Security".
?
08:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Fraudsters posed as art dealer, bilked museum for millions ⚠

Scammers got away with a $3.1m BEC heist, art dealer and museum blame each other, and ownership of a valuable landscape is up in the air.

πŸ“– Read

via "Naked Security".
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ This Chinese company is secretly behind 24 popular apps seeking dangerous permissions πŸ•΅


πŸ“– Read

via "VPNpro".
09:31
❌ TrickBot Switches to a New Windows 10 UAC Bypass to Evade Detection ❌

The tricky trojan evolves yet again, remaining one of the most advanced vehicles for delivering malware.

πŸ“– Read

via "Threatpost".
?
09:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FTC warns VoIP providers that help robocallers: we can and will sue ⚠

It put 19 internet-calling companies on notice that helping illegal robocalls is illegal. It has sued before, and it can do it again.

πŸ“– Read

via "Naked Security".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple proposes simple security upgrade for SMS 2FA codes ⚠

Apple thinks it's come up with a simple way to make SMS two-factor authentication (2FA) one-time codes less susceptible to phishing attacks.

πŸ“– Read

via "Naked Security".
?
12:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Device-Aware 2FA Can Defeat Social Engineering Attacks πŸ•΄

While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why.

πŸ“– Read

via "Dark Reading: ".
?
13:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ashley Madison Breach Extortion Scam Targets Hundreds ❌

A new extortion attack has targeted hundreds of users affected by the Ashley Madison breach over the past week.

πŸ“– Read

via "Threatpost".
?
14:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.2 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
14:16
πŸ” Phishing tournament finds employees falling prey to malicious emails πŸ”

The Gone Phishing Tournament tested how susceptible people are to opening fraudulent emails and entering their login information.

πŸ“– Read

via "Security on TechRepublic".
?
15:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Enterprises Are Developing and Maintaining Secure Applications πŸ•΄

The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.

πŸ“– Read

via "Dark Reading: ".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Coronavirus Phishing Attack Infects US, UK Inboxes πŸ•΄

Cybercriminals capitalize on fears of a global health emergency with phishing emails claiming to offer advice for protecting against coronavirus.

πŸ“– Read

via "Dark Reading: ".
?
17:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tesla Autopilot Duped By β€˜Phantom’ Images ❌

Researchers were able to fool popular autopilot systems into perceiving projected images as real - causing the cars to brake or veer into oncoming traffic lanes.

πŸ“– Read

via "Threatpost".
17:16
πŸ” 3D map shows how the coronavirus spread worldwide πŸ”

A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.

πŸ“– Read

via "Security on TechRepublic".
?
17:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Facebook's $550M Biometric Settlement Is a Data Privacy Law Landmark πŸ”

The settlement, one of the highest in US history, is a testament to robust privacy legislation.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ AZORult Campaign Adopts Novel Triple-Encryption Technique ❌

Popular trojan is sneaking its way onto PCs via malspam campaign that uses three levels of encryption to sneak past cyber defenses.

πŸ“– Read

via "Threatpost".
?
19:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Actively Targeting Flaw in Door-Access Controllers πŸ•΄

There's been a sharp increase in scans for vulnerable Nortek Linear Emerge E3 systems, SonicWall says.

πŸ“– Read

via "Dark Reading: ".
19:02
πŸ•΄ Researchers Find 24 'Dangerous' Android Apps with 382M Installs πŸ•΄

Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps.

πŸ“– Read

via "Dark Reading: ".
?
19:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ C-Level & Studying for the CISSP πŸ•΄

One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took.

πŸ“– Read

via "Dark Reading: ".
?
20:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ EKANS Ransomware Raises Industrial-Control Worries πŸ•΄

Although the ransomware is unsophisticated, the malware does show that some crypto-attackers are targeting certain industrial control products.

πŸ“– Read

via "Dark Reading: ".
?
20:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Bad Certificate Knocks Teams Off Line πŸ•΄

Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.

πŸ“– Read

via "Dark Reading: ".
?
23:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Bad Certificate Knocks Teams Offline πŸ•΄

Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.

πŸ“– Read

via "Dark Reading: ".
4 February 2020
?
06:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Surfshark Free Trial πŸ•΅


πŸ“– Read

via "VPNpro".
?
08:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google’s Super Bowl ad will make you cry. Or wince. ⚠

Google's Super Bowl ad featured an elderly man's voice as he asked Google Assistant to help him remember details about his late wife.

πŸ“– Read

via "Naked Security".
?
08:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Twitter gave access to student’s account to his college ⚠

Twitter admitted it broke the rules when it handed over control of the student's account to college administrators.

πŸ“– Read

via "Naked Security".
?
10:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ NIST tests methods of recovering data from smashed smartphones ⚠

Criminals have found to their cost that reducing a device to a pile of rubble means nothing if the internal chips are still in working order.

πŸ“– Read

via "Naked Security".
?
11:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 4 key trends to hit the cybersecurity industry in 2020 πŸ”

Get ready for consolidation risk, microbreaches, and other cybersecurity hazards, warn experts from Mimecast, the Cyber Resilience Think Tank.

πŸ“– Read

via "Security on TechRepublic".
11:49
❌ Twitter API Abused to Uncover User Identities ❌

State-sponsored actors may have been behind the social media abuse, said Twitter.

πŸ“– Read

via "Threatpost".
?
12:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What WON'T Happen in Cybersecurity in 2020 πŸ•΄

Predictions are a dime a dozen. Here are six trends that you won't be hearing about anytime soon.

πŸ“– Read

via "Dark Reading: ".
12:35
ATENTIONβ€Ό New - CVE-2012-5686

ZPanel 10.0.1 has insufficient entropy for its password reset process.

πŸ“– Read

via "National Vulnerability Database".
12:35
ATENTIONβ€Ό New - CVE-2012-5618

Ushahidi before 2.6.1 has insufficient entropy for forgot-password tokens.

πŸ“– Read

via "National Vulnerability Database".
12:35
ATENTIONβ€Ό New - CVE-2011-4937

Joomla! 1.7.1 has core information disclosure due to inadequate error checking.

πŸ“– Read

via "National Vulnerability Database".
12:35
ATENTIONβ€Ό New - CVE-2011-4912

Joomla! com_mailto 1.5.x through 1.5.13 has an automated mail timeout bypass.

πŸ“– Read

via "National Vulnerability Database".
12:35
ATENTIONβ€Ό New - CVE-2011-3629

Joomla! core 1.7.1 allows information disclosure due to weak encryption

πŸ“– Read

via "National Vulnerability Database".
12:49
πŸ•΄ Kubernetes Shows Built-in Weakness πŸ•΄

A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.

πŸ“– Read

via "Dark Reading: ".
?
13:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Twitter Suspends Fake Accounts Abusing Feature that Matches Phone Numbers and Users πŸ•΄

The company believes state-sponsored actors may also be involved.

πŸ“– Read

via "Dark Reading: ".
?
14:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Ways SMBs Can Secure Their Websites πŸ•΄

Here's what small and midsize businesses should consider when they decide it's time to up their website security.

πŸ“– Read

via "Dark Reading: ".
?
15:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Medtronic Patches Implanted Device, CareLink Programmer Bugs ❌

The medical device giant has issued fixes for bugs first disclosed in 2018 and 2019.

πŸ“– Read

via "Threatpost".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Two Critical Android Bugs Get Patched in February Update ❌

As part of its February bug fixes, Google is patching a critical severity remote code execution vulnerability and an information disclosure bug.

πŸ“– Read

via "Threatpost".
16:20
πŸ•΄ Ransomware Attacks: Why It Should Be Illegal to Pay the Ransom πŸ•΄

For cities, states and towns, paying up is short-sighted and only makes the problem worse.

πŸ“– Read

via "Dark Reading: ".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” HHS Issues Coronavirus HIPAA Guidance πŸ”

In the healthcare sector, concerns about the spreading coronavirus outbreak have reignited the discussion around HIPAA, protected health information, and when it's legal for healthcare providers to disclose patient records.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:46
πŸ” Why many security pros lack confidence in their implementation of Zero Trust πŸ”

Almost half of security professionals don't know where or how to use Zero Trust policies in a hybrid IT environment, says a survey commissioned by security provider Pulse Secure.

πŸ“– Read

via "Security on TechRepublic".
?
17:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to sign up for Firefox breach alerts πŸ”

Mozilla offers users a service that will send alerts for account breaches associated with email addresses. Find out how to use Firefox Monitor.

πŸ“– Read

via "Security on TechRepublic".
17:16
πŸ” How to sign up for Firefox breach alerts πŸ”

Mozilla offers users a service that will send alerts for account breaches associated with email addresses. Find out how to use Firefox Monitor.

πŸ“– Read

via "Security on TechRepublic".
?
17:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Untested app and no training for volunteers are fatal in Iowa caucus πŸ”

HR experts and tech leaders say organizations that skip training during a tech transition almost always pay a high price.

πŸ“– Read

via "Security on TechRepublic".
?
19:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware Attack Hinders Toll Group Operations ❌

Customers took to Twitter to air their grievances after some of the transportation giant's operations were downed.

πŸ“– Read

via "Threatpost".
19:27
πŸ•΄ Microsoft DART Finds Web Shell Threat on the Rise πŸ•΄

Various APT groups are successfully using Web shell attacks on a more frequent basis.

πŸ“– Read

via "Dark Reading: ".
?
20:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Community Housing Nonprofit Hit with $1.2M Loss in BEC Scam ❌

Red Kite said that domain-spoofing and convincing scam emails claiming to be from suppliers were the cause.

πŸ“– Read

via "Threatpost".
20:23
πŸ•΄ SharePoint Bug Proves Popular Weapon for Nation-State Attacks πŸ•΄

Thousands of servers could be exposed to SharePoint vulnerability CVE-2019-0604, recently used in cyberattacks against Middle East government targets.

πŸ“– Read

via "Dark Reading: ".
?
21:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 of the 10 Most Exploited Bugs Last Year Involved Microsoft Products πŸ•΄

Six of them were the same as from the previous year, according to new Recorded Future analysis.

πŸ“– Read

via "Dark Reading: ".
?
22:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Companies Pursue Zero Trust, but Implementers Are Hesitant πŸ•΄

Almost three-quarters of enterprises plan to have a zero-trust access model by the end of the year, but nearly half of cybersecurity professionals lack the knowledge to implement the right technologies, experts say.

πŸ“– Read

via "Dark Reading: ".
5 February 2020
?
05:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why certain companies are more heavily targeted by DDoS attacks πŸ”

Most of the targets in 2019 were in the gaming and gambling industries, says security company Imperva.

πŸ“– Read

via "Security on TechRepublic".
?
08:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization from infrastructure as code security risks πŸ”

Infrastructure as code offers advantages in automating your data center management but also carries certain risks, says Unit 42, the global threat intelligence team at Palo Alto Networks.

πŸ“– Read

via "Security on TechRepublic".
08:19
❌ Gamaredon APT Improves Toolset to Target Ukraine Government, Military ❌

The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets. Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […]

πŸ“– Read

via "Threatpost".
?
08:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Twitter admits to raid on users’ phone numbers ⚠

It relates to Twitter’s contact upload feature, which allows users to find others via contact info such as email or phone number.

πŸ“– Read

via "Naked Security".
?
09:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Critical Android flaws patched in February bulletin ⚠

Google has patched Android bugs that include a couple of critical flaws that could let hackers run their own code on the mobile operating system.

πŸ“– Read

via "Naked Security".
09:10
⚠ Facebook will let parents see kids’ chat history, peer into inbox ⚠

It's revamping Messenger Kids with new parental controls and updated information on its children’s data policy.

πŸ“– Read

via "Naked Security".
09:10
⚠ Someone else may have your videos, Google tells users ⚠

As the well-worn internet saying goes - there is no cloud, it’s just someone else’s computer.

πŸ“– Read

via "Naked Security".
09:16
πŸ” How to defend your organization against the latest malware, botnets and security exploits πŸ”

Though the fourth quarter of 2019 saw a decrease in malicious activity, threats such as the Emotet malware continued to thrive, says Nuspire.

πŸ“– Read

via "Security on TechRepublic".
?
12:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hiring Untapped Security Talent Can Transform the Industry πŸ•΄

Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting

πŸ“– Read

via "Dark Reading: ".
?
13:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Report: Smart bulbs have a major security problem πŸ”

Many Philips Hue smart light bulbs have a firmware flaw that leads hackers into an entire network, Check Point Research found.

πŸ“– Read

via "Security on TechRepublic".
13:19
❌ Critical Cisco β€˜CDPwn’ Flaws Break Network Segmentation ❌

Cisco has released patches to address the five vulnerabilities, which could lead to remote code-execution and denial of service.

πŸ“– Read

via "Threatpost".
13:19
❌ Critical Cisco β€˜CDPwn’ Protocol Flaws Explained: Podcast ❌

The researcher behind the five critical Cisco flaws, collectively called CDPwn, talks about why Layer 2 protocols are under-researched when it comes to security vulnerabilities.

πŸ“– Read

via "Threatpost".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE ❌

A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages.

πŸ“– Read

via "Threatpost".
?
14:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-0507

IBM InfoSphere Information Server 8.1, 8.5, 8.7, 9.1 has a Session Fixation Vulnerability

πŸ“– Read

via "National Vulnerability Database".
14:40
⚠ PayPal SMS scams – don’t fall for them! ⚠

Text messages may be old hat - but SMS is still a handy tool for crooks out to find more about you.

πŸ“– Read

via "Naked Security".
?
15:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Coronavirus β€œsafety measures” email is a phishing scam ⚠

Sadly, cybercrooks love a crisis, because it gives them a believable reason to contact you with a phishing scam. Take care out there!

πŸ“– Read

via "Naked Security".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers ❌

Malware campaign targets global manufacturers that are still dependent on Windows 7 subsystems to run fleets of IoT endpoints.

πŸ“– Read

via "Threatpost".
16:20
πŸ•΄ Keeping Compliance Data-Centric Amid Accelerating Regulation πŸ•΄

As the regulatory landscape transforms, it's still smart to stay strategically focused on protecting your data.

πŸ“– Read

via "Dark Reading: ".
16:32
πŸ›  ISO-8385 Protocol Fuzzer πŸ› 

This python script is a fuzzer for the ISO-8385 financial protocol. It is compatible with sulley and bofuzz and is now part of the official bofuzz release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
16:32
πŸ›  nfstream 3.1.2 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
16:32
πŸ›  Clam AntiVirus Toolkit 0.102.2 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
17:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” SEC Issues Cybersecurity and Resiliency Best Practices πŸ”

Data loss prevention is one of eight key practices outlined by the SEC last week to enhance cybersecurity preparedness and operational resiliency.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:16
πŸ” Tips on keeping a Google Photos-type video bug from impacting cloud-based files πŸ”

The private videos of some Google Photos users were accidentally shared with other people. Here's how to secure online files to protect them from exposure.

πŸ“– Read

via "Security on TechRepublic".
?
17:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ CamuBot Banking Trojan Returns In Targeted Attacks ❌

The malware is back in targeted attacks against Brazilian banking customers, this time using a new technique that involves mobile app authorization.

πŸ“– Read

via "Threatpost".
17:51
πŸ•΄ What is a Privileged Access Workstation (PAW)? πŸ•΄

Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.

πŸ“– Read

via "Dark Reading: ".
17:51
πŸ•΄ Emotet Preps for Tax Season with New Phishing Campaign πŸ•΄

Malicious emails in a new attack campaign contain links and attachments claiming to lead victims to W-9 forms.

πŸ“– Read

via "Dark Reading: ".
?
18:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-0220

Apple Bonjour before 2011 allows a crash via a crafted multicast DNS packet.

πŸ“– Read

via "National Vulnerability Database".
18:35
ATENTIONβ€Ό New - CVE-2010-5304

A NULL pointer dereference flaw was found in the way LibVNCServer before 0.9.9 handled certain ClientCutText message. A remote attacker could use this flaw to crash the VNC server by sending a specially crafted ClientCutText message from a VNC client.

πŸ“– Read

via "National Vulnerability Database".
18:35
ATENTIONβ€Ό New - CVE-2010-4815

Coppermine gallery before 1.4.26 has an input validation vulnerability that allows for code execution.

πŸ“– Read

via "National Vulnerability Database".
18:35
ATENTIONβ€Ό New - CVE-2010-4662

PmWiki before 2.2.21 has XSS.

πŸ“– Read

via "National Vulnerability Database".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ IoT Malware Campaign Infects Global Manufacturing Sites πŸ•΄

The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.

πŸ“– Read

via "Dark Reading: ".
19:53
πŸ•΄ Department of Energy Adds Attivo Decoys for Critical Infrastructure Security πŸ•΄

The decoys and lures will help redirect attacks away from devices that can't be protected through traditional means.

πŸ“– Read

via "Dark Reading: ".
?
20:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-1151

Joomla! 1.6.0 is vulnerable to SQL Injection via the filter_order and filer_order_Dir parameters.

πŸ“– Read

via "National Vulnerability Database".
20:35
ATENTIONβ€Ό New - CVE-2011-1150

bbPress through 1.0.2 has XSS in /bb-login.php url via the re parameter.

πŸ“– Read

via "National Vulnerability Database".
20:35
ATENTIONβ€Ό New - CVE-2011-1069

PHPShop through 0.8.1 has XSS.

πŸ“– Read

via "National Vulnerability Database".
20:35
ATENTIONβ€Ό New - CVE-2011-1009

Vanilla Forums 2.0.17.1 through 2.0.17.5 has XSS in /vanilla/index.php via the p parameter.

πŸ“– Read

via "National Vulnerability Database".
20:35
ATENTIONβ€Ό New - CVE-2011-0525

Batavi before 1.0 has CSRF.

πŸ“– Read

via "National Vulnerability Database".
?
21:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Majority of Network, App-Layer DDoS Attacks in 2019 Were Small πŸ•΄

Attacks turned to cheaper, shorter attacks to try and disrupt targets, Imperva analysis shows.

πŸ“– Read

via "Dark Reading: ".
?
22:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Vixie: The Unintended Consequences of Internet Privacy Efforts πŸ•΄

Paul Vixie says emerging encryption protocols for endpoints could 'break' security in enterprise - and even home - networks.

πŸ“– Read

via "Dark Reading: ".
?
23:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-1597

OpenVAS Manager v2.0.3 allows plugin remote code execution.

πŸ“– Read

via "National Vulnerability Database".
23:05
ATENTIONβ€Ό New - CVE-2011-1517

SAP NetWeaver 7.0 allows Remote Code Execution and Denial of Service caused by an error in the DiagTraceHex() function. By sending a specially-crafted packet, an attacker could exploit this vulnerability to cause the application to crash.

πŸ“– Read

via "National Vulnerability Database".
6 February 2020
?
08:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Android pulls 24 β€˜dangerous’ malware-filled apps from Play Store ⚠

The malware-infected apps used to harvest data and sign users up to premium services have been downloaded more than 382 million times.

πŸ“– Read

via "Naked Security".
?
09:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Dropbox Passes $1M Milestone for Bug-Bounty Payouts ❌

The file-sharing service also disclosed details of past notable bugs for the first time.

πŸ“– Read

via "Threatpost".
09:19
❌ Charming Kitten Uses Fake Interview Requests to Target Public Figures ❌

APT group poses as a former Wall Street Journal journalist to launch phishing campaigns and steal victim email account details.

πŸ“– Read

via "Threatpost".
?
09:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google’s Chrome 80 clamps down on cookies and notification spam ⚠

Version 80 of the Chrome browser is out with some new features designed to save your security and your sanity.

πŸ“– Read

via "Naked Security".
?
10:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ RSAC Sets Finalists for Innovation Sandbox πŸ•΄

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.

πŸ“– Read

via "Dark Reading: ".
?
11:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Twitter bans deepfakes, but only those β€˜likely to cause harm’ ⚠

Twitter isn't interested in how the β€œsynthetic or manipulated” media is created, but if it has the potential to cause harm it'll be removed.

πŸ“– Read

via "Naked Security".
11:16
πŸ” IoT is a gold mine for hackers using fileless malware for cyberattacks πŸ”

Data exposure is one of the biggest threats from attacks on IoT devices. A new report recommends a shift to perimeter-less security strategies.

πŸ“– Read

via "Security on TechRepublic".
?
12:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Can We Make Election Technology Secure? πŸ•΄

In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.

πŸ“– Read

via "Dark Reading: ".
12:35
ATENTIONβ€Ό New - CVE-2012-2593

Cross-site scripting (XSS) vulnerability in the administrative interface in Atmail Webmail Server 6.4 allows remote attackers to inject arbitrary web script or HTML via the Date field of an email.

πŸ“– Read

via "National Vulnerability Database".
12:35
ATENTIONβ€Ό New - CVE-2010-3917

Google Chrome before 3.0 does not properly handle XML documents, which allows remote attackers to obtain sensitive information via a crafted web site.

πŸ“– Read

via "National Vulnerability Database".
12:40
⚠ Update now – WhatsApp flaw gave attackers access to local files ⚠

The flaw affecting WhatsApp's desktop client when it's paired with the iPhone app allowed attackers access to local file systems.

πŸ“– Read

via "Naked Security".
12:49
πŸ•΄ RSAC Sets Finalists for Innovation Sandbox πŸ•΄

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.

πŸ“– Read

via "Dark Reading: ".
?
13:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep25: You’ve seen WHAT on public Trello boards? – Naked Security Podcast ⚠

New episode available now.

πŸ“– Read

via "Naked Security".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Beware of malware disguised as Oscar-nominated movies including Joker and Parasite πŸ”

Joker was the hottest film among cybercriminals with 304 malicious files named after Batman's arch-nemesis, says security firm Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
13:49
❌ The RSAC 2020 Trend Report ❌

What’s trending in cybersecurity? This year’s session submissions tell us.

πŸ“– Read

via "Threatpost".
?
14:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Invisible Pixel Patterns Can Communicate Data Covertly πŸ•΄

University researchers show that changing the brightness of monitor pixels can communicates data from air-gapped systems in a way not visible to human eyes.

πŸ“– Read

via "Dark Reading: ".
?
14:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why shortcuts lead to failure: Lessons from app disaster in Iowa πŸ”

Quality control and standard software dev process could have prevented extended delays in reporting the results of the 2020 Iowa Caucus.

πŸ“– Read

via "Security on TechRepublic".
14:48
πŸ•΄ A Matter of Trust πŸ•΄

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.

πŸ“– Read

via "Dark Reading: ".
?
15:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ U.S. Finance Sector Hit with Targeted Backdoor Campaign ❌

The powerful Minebridge backdoor gives cyberattackers full run of a victim's machine.

πŸ“– Read

via "Threatpost".
15:19
❌ Metamorfo Returns with Keylogger Trick to Target Financial Firms ❌

The malware uses a tactic to force victims to retype passwords into their systems - which it tracks via a keylogger.

πŸ“– Read

via "Threatpost".
?
15:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Facebook Tops Imitated Brands as Attackers Target Tech πŸ•΄

Brand impersonators favor Facebook, Yahoo, Network, and PayPal in phishing attempts to steal credentials from victims.

πŸ“– Read

via "Dark Reading: ".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” The postmortem: Shadow took lots of shortcuts with Iowa 2020 caucus app πŸ”

Extreme delays in reporting results shows "move fast and break things" is the wrong approach for election infrastructure, developers and business leaders say.

πŸ“– Read

via "Security on TechRepublic".
16:20
πŸ•΄ Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras πŸ•΄

Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.

πŸ“– Read

via "Dark Reading: ".
16:20
πŸ•΄ Forescout Acquired by Private Equity Team πŸ•΄

The deal, valued at $1.9 billion, is expected to close next quarter.

πŸ“– Read

via "Dark Reading: ".
?
16:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-6340

An Authentication vulnerability exists in NETGEAR WGR614 v7 and v9 due to a hardcoded credential used for serial programming, a related issue to CVE-2006-1002.

πŸ“– Read

via "National Vulnerability Database".
16:35
ATENTIONβ€Ό New - CVE-2012-6309

A vulnerability exists in Arctic Torrent 1.4 via unspecified vectors in .torrent file handling, which could let a malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
16:35
ATENTIONβ€Ό New - CVE-2012-6307

A vulnerability exists in JPEGsnoop 1.5.2 due to an unspecified issue in JPEG file handling, which could let a malicious user execute arbitrary code

πŸ“– Read

via "National Vulnerability Database".
16:35
ATENTIONβ€Ό New - CVE-2012-6306

A vulnerability exists in HCView (aka Hardcoreview) 1.4 due to a write access violation with a GIF file.

πŸ“– Read

via "National Vulnerability Database".
16:35
ATENTIONβ€Ό New - CVE-2012-6297

Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
?
17:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Phishing Personified πŸ•΄

What makes these scams so completely obvious in the physical form?

πŸ“– Read

via "Dark Reading: ".
?
18:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 90% of CISOs Would Cut Pay for Better Work-Life Balance πŸ•΄

Businesses receive $30,000 of 'free' CISO time as security leaders report job-related stress taking a toll on their health and relationships.

πŸ“– Read

via "Dark Reading: ".
18:58
πŸ•΄ Researchers Reveal How Smart Lightbulbs Can Be Hacked to Attack πŸ•΄

New exploit builds on previous research involving Philips Hue Smart Bulbs.

πŸ“– Read

via "Dark Reading: ".
?
19:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to use 7zip to encrypt files πŸ”

If you need strong command line encryption on Linux, look no further than 7zip.

πŸ“– Read

via "Security on TechRepublic".
?
20:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Irish Data Protection Puts Google on Notice for Data Privacy - Again πŸ”

Ireland's Data Protection Commission has announced that it's looking into Google yet again - this time for the way it processes user location data and transparency.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
7 February 2020
?
08:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magecart Gang Attacks Olympic Ticket Reseller and Survival Food Sites ❌

A recent slew of skimming attacks have been linked back to Magecart Group 12.

πŸ“– Read

via "Threatpost".
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cybercrooks busted for multimillion-dollar identity fraud ⚠

Organizations were attacked for employees' data, including names, addresses and birthdates used to set up hundreds of bank accounts.

πŸ“– Read

via "Naked Security".
08:33
⚠ Wacom driver caught monitoring third-party software use ⚠

Graphics tablet company Wacom can collect data unconnected to its products, such as which applications users open on their computers.

πŸ“– Read

via "Naked Security".
08:33
⚠ Facebook, Google, YouTube order Clearview to stop scraping faceprints ⚠

It's my First Amendment right to scrape publicly available face images, its CEO says. Besides, we're just doing what Google Search does.

πŸ“– Read

via "Naked Security".
?
09:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers transmit data covertly by altering screen brightness ⚠

Researchers have retrieved data from a disconnected computer by altering its LCD's pixel density just enough for a camera to pick it up.

πŸ“– Read

via "Naked Security".
?
10:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 2/7 Edition πŸ”

Ransomware takes a dangerous turn, a flaw in the Android Twitter app is exploited, and more - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Phishing Campaign Targets 250 Android Apps with Anubis Malware ❌

New attacks discovered by Cofense can perform keylogging, steal data and completely hijack a mobile device.

πŸ“– Read

via "Threatpost".
12:17
πŸ•΄ 5 Measures to Harden Election Technology πŸ•΄

Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.

πŸ“– Read

via "Dark Reading: ".
?
12:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-1567

LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate.

πŸ“– Read

via "National Vulnerability Database".
12:33
ATENTIONβ€Ό New - CVE-2012-1566

LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintNanny.

πŸ“– Read

via "National Vulnerability Database".
12:42
❌ Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs ❌

RCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven't yet patched CVE-2019-19781.

πŸ“– Read

via "Threatpost".
?
13:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  UFONet 1.4 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
13:40
πŸ” How Shadow IT could put your organization at risk πŸ”

Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.

πŸ“– Read

via "Security on TechRepublic".
?
14:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Robbin Hood – the ransomware that brings its own bug ⚠

When you need a vulnerability to exploit, but there isn't one... why not simply bring your own, along with your malware?

πŸ“– Read

via "Naked Security".
14:12
❌ Google Chrome To Bar HTTP File Downloads ❌

File downloads like images or executables may not be delivered over HTTPS - even if they are available from an HTTPS website.

πŸ“– Read

via "Threatpost".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-4658

statusnet through 2010 allows attackers to spoof syslog messages via newline injection attacks.

πŸ“– Read

via "National Vulnerability Database".
14:33
ATENTIONβ€Ό New - CVE-2008-3793

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3792. Reason: This candidate is a duplicate of CVE-2008-3792. Notes: All CVE users should reference CVE-2008-3792 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
14:47
πŸ•΄ From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide πŸ•΄

Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.

πŸ“– Read

via "Dark Reading: ".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Poll: A Matter of Trust πŸ•΄

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.

πŸ“– Read

via "Dark Reading: ".
?
16:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hackers imitating CDC, WHO with coronavirus phishing emails πŸ”

Cybercriminals are now using fears over the outbreak to steal email credentials, security officials say.

πŸ“– Read

via "Security on TechRepublic".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ RobbinHood Kills Security Processes Before Dropping Ransomware πŸ•΄

Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.

πŸ“– Read

via "Dark Reading: ".
?
17:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to use 7zip to encrypt files πŸ”

If you need strong command line encryption on Linux, look no further than 7zip.

πŸ“– Read

via "Security on TechRepublic".
17:17
πŸ•΄ CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten' πŸ•΄

Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.

πŸ“– Read

via "Dark Reading: ".
?
17:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed ❌

The flaw was recently patched in Android's February Security Bulletin.

πŸ“– Read

via "Threatpost".
?
18:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Takeout Serves Up Video Files to Strangers πŸ•΄

A limited number of user videos were shared with others in a five-day incident from November.

πŸ“– Read

via "Dark Reading: ".
?
19:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Wacom Tablet Data Exfiltration Raises Security Concerns ❌

Wacom stated that its data collection is done only in aggregate -- but that doesn't fix the issues, according to security experts.

πŸ“– Read

via "Threatpost".
?
20:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-1086

Cross-site scripting (XSS) vulnerability in admin/system.html in Openfiler 2.3 allows remote attackers to inject arbitrary web script or HTML via the device parameter.

πŸ“– Read

via "National Vulnerability Database".
20:33
ATENTIONβ€Ό New - CVE-2011-1085

CSRF vulnerability in Smoothwall Express 3.

πŸ“– Read

via "National Vulnerability Database".
20:33
ATENTIONβ€Ό New - CVE-2011-1084

A cross-site scripting (XSS) vulnerability in Smoothwall Express 3.

πŸ“– Read

via "National Vulnerability Database".
8 February 2020
?
03:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” The most overhyped, and most significant, tech trends of 2020 πŸ”

A survey of IT professionals finds AR and 5G bust for 2020, machine learning and DevOps on top.

πŸ“– Read

via "Security on TechRepublic".
03:40
πŸ” How to protect your privacy on an iOS device πŸ”

Learn how to keep your iOS devices--and your data--secure with these iOS 13 privacy settings and Apple resources.

πŸ“– Read

via "Security on TechRepublic".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-3642

Cross-site scripting (XSS) vulnerability in Flowplayer Flash 3.2.7 through 3.2.16, as used in the News system (news) extension for TYPO3 and Mahara, allows remote attackers to inject arbitrary web script or HTML via the plugin configuration directive in a reference to an external domain plugin.

πŸ“– Read

via "National Vulnerability Database".
?
16:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-4381

MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
16:33
ATENTIONβ€Ό New - CVE-2012-4029

Cross-site scripting (XSS) vulnerability in main/dropbox/index.php in Chamilo LMS before 1.8.8.6 allows remote attackers to inject arbitrary web script or HTML via the category_name parameter in an addsentcategory action.

πŸ“– Read

via "National Vulnerability Database".
10 February 2020
?
07:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 23 stories of the week ⚠

From Google's OpenSK project to Apple's SMS 2FA proposal, and everything in between. Get up to date with the hot stories of the last week.

πŸ“– Read

via "Naked Security".
?
08:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Frustrated author cybersquats novelist’s website ⚠

If you visit the website of renowned Canadian novelist Patrick deWitt today, you'll see a surprising message. "THIS IS NOT PATRICK DEWITT", it says.

πŸ“– Read

via "Naked Security".
08:26
⚠ FBI director warns of sustained Russian disinformation threat ⚠

Russia is still using social media in a sustained campaign to dabble in US affairs, according to FBI director Chris Wray.

πŸ“– Read

via "Naked Security".
?
08:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook encrypted messaging will β€˜create hiding places for child abuse’ ⚠

Child safety groups penned an open letter to Facebook, urging a delay on encrypted messaging until sufficient safeguards are in place.

πŸ“– Read

via "Naked Security".
?
09:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google Chrome to start blocking downloads served via HTTP ⚠

Google has announced a timetable for phasing out insecure file downloads in the Chrome browser starting with desktop version 81 due next month.

πŸ“– Read

via "Naked Security".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Day in the Life of a Bot πŸ•΄

A typical workday for a bot, from its own point of view.

πŸ“– Read

via "Dark Reading: ".
?
13:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Emotet Now Hacks Nearby Wi-Fi Networks to Spread Like a Worm ❌

The new tactic used by Emotet allows the malware to infect nearby insecure Wi-Fi networks - and their devices - via brute force loops.

πŸ“– Read

via "Threatpost".
?
13:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Docker Registries Expose Hundreds of Orgs to Malware, Data Theft ❌

Misconfigured Docker registries could leak confidential data, lead to a full-scale compromise and interrupt the business operations.”

πŸ“– Read

via "Threatpost".
?
13:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Factors That Raise The Stakes For IoT Security πŸ•΄

Developments that exacerbate the risk and complicate making Internet of Things devices more secure.

πŸ“– Read

via "Dark Reading: ".
?
14:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Unlocked S3 Bucket Lets 36,077 Prison Files Escape πŸ•΄

The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states' correctional facilities.

πŸ“– Read

via "Dark Reading: ".
14:37
ATENTIONβ€Ό New - CVE-2012-5828

BlackBerry PlayBook before 2.1 has an Information Disclosure Vulnerability via a Web browser component error

πŸ“– Read

via "National Vulnerability Database".
14:37
ATENTIONβ€Ό New - CVE-2012-2204

InfoSphere Guardium aix_ktap module: DoS

πŸ“– Read

via "National Vulnerability Database".
14:37
ATENTIONβ€Ό New - CVE-2012-1994

HP Systems Insight Manager before 7.0 allows a remote user on adjacent network to access information

πŸ“– Read

via "National Vulnerability Database".
14:40
❌ Equifax Breach: Four Members of Chinese Military Charged with Hacking ❌

Feds have charged four members of the Chinese People’s Liberation Army (PLA) in connection with the infamous 2017 Equifax breach.

πŸ“– Read

via "Threatpost".
14:47
πŸ” Global shipping industry attacked by coronavirus-themed malware πŸ”

Hackers are using malicious emails about the coronavirus to trick people with a malware called AZORult.

πŸ“– Read

via "Security on TechRepublic".
14:58
πŸ•΄ Unlocked S3 Bucket Lets 36,077 Jail Files Escape πŸ•΄

The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states' correctional facilities.

πŸ“– Read

via "Dark Reading: ".
?
15:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 13 tips to avoid Valentine's Day online romance scams πŸ”

Scammers use dating sites to try to build relationships with people to get money or personal information. Here are 13 tips to protect yourself.

πŸ“– Read

via "Security on TechRepublic".
?
16:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How some presidential campaigns use DMARC to protect their domains from being spoofed πŸ”

DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.

πŸ“– Read

via "Security on TechRepublic".
16:28
πŸ•΄ China's Military Behind 2017 Equifax Breach: DoJ πŸ•΄

Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.

πŸ“– Read

via "Dark Reading: ".
?
16:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” California AG Issues Revised CCPA Draft Rules πŸ”

On Friday, with just under five months to go until CCPA is enforced, California's Attorney General released a modified version of draft regulations for implementing the law.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Active PayPal Phishing Scam Targets SSNs, Passport Photos ❌

Phishing emails have been uncovered that request a full rundown of personal data - even asking for photos of passports.

πŸ“– Read

via "Threatpost".
18:10
❌ BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver ❌

The RobbinHood ransomware is using a deprecated Gigabyte driver as the tip of the spear for taking out antivirus products.

πŸ“– Read

via "Threatpost".
?
18:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Israel's Entire Voter Registry Exposed in Massive Incident πŸ•΄

Personal details of nearly 6.5 million Israelis were out in the open after the entire registry was uploaded to an notably insecure app.

πŸ“– Read

via "Dark Reading: ".
?
19:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Kubernetes rollouts: 5 security best practices πŸ”

If you don't follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk.

πŸ“– Read

via "Security on TechRepublic".
?
19:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Some Democrats Lead Trump in Campaign Domain-Security Efforts πŸ•΄

Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.

πŸ“– Read

via "Dark Reading: ".
19:58
πŸ•΄ How North Korea's Senior Leaders Harness the Internet πŸ•΄

Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions.

πŸ“– Read

via "Dark Reading: ".
?
20:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-1596

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
11 February 2020
?
08:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook’s Twitter and Instagram accounts hijacked ⚠

In full glare of the world, Facebook admins have found themselves in an unseemly struggle to wrestle back control of the company’s Twitter accounts.

πŸ“– Read

via "Naked Security".
?
08:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” IBM X-Force Threat Index finds Google, Apple, Amazon are most often spoofed πŸ”

Attacks on industrial control systems are up and code for banking trojans and ransomware is evolving the fastest.

πŸ“– Read

via "Security on TechRepublic".
08:56
⚠ Officials raise alarm about Chinese hacking ⚠

Officials pointed to ongoing threats against US institutions, painting a dire picture of hacking efforts to support Chinese economic goals.

πŸ“– Read

via "Naked Security".
08:56
⚠ Freedom Hosting owner pleads guilty to distributing child abuse images ⚠

Eric Eoin Marques has pleaded guilty to running what was once believed to be the largest child abuse hosting provider on the dark web.

πŸ“– Read

via "Naked Security".
?
09:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Dell Patches SupportAssist Flaw That Allows Arbitrary Code Execution ❌

The uncontrolled search path vulnerability allows a local user to use DLLs to escalate privileges and affects Windows PCs.

πŸ“– Read

via "Threatpost".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” PayPal tops the list of most impersonated brand in phishing attacks πŸ”

Facebook impersonations came in second place among phishing campaigns, followed by Microsoft, said email security firm Vade Secure.

πŸ“– Read

via "Security on TechRepublic".
?
11:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Security and disaster recovery are priorities when choosing data center provider πŸ”

Security and compliance are key factors to consider when outsourcing your data center, according to a report from data center provider US Signal.

πŸ“– Read

via "Security on TechRepublic".
11:17
πŸ” 51% say automation will result in job loss for IT security pros πŸ”

Security automation will reshape hiring trends in both the US and the UK, according to a new report.

πŸ“– Read

via "Security on TechRepublic".
11:26
⚠ 5 tips for businesses on Safer Internet Day ⚠

Safer Internet Day - here's how to make your business better at cybersecurity, no matter how safe you are already!

πŸ“– Read

via "Naked Security".
11:26
⚠ 5 tips for you and your family on Safer Internet Day ⚠

Why not make Safer Internet Day the excuse you need to do all those cybersecurity tweaks you've been putting off?

πŸ“– Read

via "Naked Security".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Keeping a Strong Security Metrics Framework Strong πŸ•΄

Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.

πŸ“– Read

via "Dark Reading: ".
?
12:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage πŸ•΄

Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.

πŸ“– Read

via "Dark Reading: ".
13:12
πŸ›  GRR 3.4.0.4 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Adobe Addresses Critical Flash, Framemaker Flaws ❌

Overall, Adobe patched flaws tied to 42 CVEs as part of its regularly scheduled updates.

πŸ“– Read

via "Threatpost".
13:47
πŸ” How to gain more control over DNS with NextDNS: 5 steps πŸ”

As an alternative to an on-site DNS server, this cloud-hosted DNS service lets you block, filter, and analyze activity across your network and devices.

πŸ“– Read

via "Security on TechRepublic".
13:58
πŸ•΄ What Are Some Foundational Ways to Protect My Global Supply Chain? πŸ•΄

Assessing supply chains is one of the more challenging third-party risk management endeavors organizations can take on.

πŸ“– Read

via "Dark Reading: ".
13:58
πŸ•΄ Macs See More Adware, Unwanted Apps Than PCs πŸ•΄

The latest data from Malwarebytes show the average Mac sees almost twice as many bad apps as Windows systems, but actual malware continues to be scarce.

πŸ“– Read

via "Dark Reading: ".
?
14:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits πŸ•΄

Infection vectors were evenly divided among phishing, vulnerability exploitation, and unauthorized credential use in 2019.

πŸ“– Read

via "Dark Reading: ".
?
16:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Estée Lauder Exposes 440M Records, with Email Addresses, Network Info ❌

Middleware data was exposed, which can create a secondary path for malware through which applications and data can be compromised.

πŸ“– Read

via "Threatpost".
?
16:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Ransomware Will Soon Target the Cloud πŸ•΄

As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.

πŸ“– Read

via "Dark Reading: ".
16:37
ATENTIONβ€Ό New - CVE-2012-4519

Zenphoto before 1.4.3.4 admin-news-articles.php date parameter XSS.

πŸ“– Read

via "National Vulnerability Database".
?
17:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intel Patches High-Severity Flaw in Security Engine ❌

The high-severity vulnerability could enable denial of service, privilege escalation and information disclosure.

πŸ“– Read

via "Threatpost".
17:25
πŸ” U.S. Indicts Four Chinese Military Members for Equifax Hack πŸ”

In charging four Chinese nationals with 2017's Equifax hack this week, the DOJ also said intellectual property - Equifax's own trade secrets - were stolen as part of the hack.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Patches Exploited Internet Explorer Flaw πŸ•΄

This month's Patch Tuesday brings fixes for 99 CVEs, including one IE flaw seen exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
18:37
ATENTIONβ€Ό New - CVE-2012-2517

Cross-site scripting (XSS) vulnerability in PrestaShop before 1.4.9 allows remote attackers to inject arbitrary web script or HTML via the index of the product[] parameter to ajax.php.

πŸ“– Read

via "National Vulnerability Database".
18:37
ATENTIONβ€Ό New - CVE-2012-2452

Multiple cross-site scripting (XSS) vulnerabilities in pragmaMx 1.x before 1.12.2 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter to modules.php or (2) img_url to includes/wysiwyg/spaw/editor/plugins/imgpopup/img_popup.php.

πŸ“– Read

via "National Vulnerability Database".
18:37
ATENTIONβ€Ό New - CVE-2012-2216

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6720 and CVE-2012-6721. Reason: this candidate was intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2012-6720 and CVE-2012-6721 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
18:37
ATENTIONβ€Ό New - CVE-2012-1124

SQL injection vulnerability in search.php in phxEventManager 2.0 beta 5 allows remote attackers to execute arbitrary SQL commands via the search_terms parameter.

πŸ“– Read

via "National Vulnerability Database".
18:37
ATENTIONβ€Ό New - CVE-2009-4067

Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.

πŸ“– Read

via "National Vulnerability Database".
?
19:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches ❌

There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update.

πŸ“– Read

via "Threatpost".
?
19:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Healthcare Ransomware Damage Passes $157M Since 2016 πŸ•΄

Researchers found the total cost far exceeded the amount of ransom paid to attackers.

πŸ“– Read

via "Dark Reading: ".
?
20:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-4938

Multiple cross-site scripting (XSS) vulnerabilities in Ariadne 2.7.6 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO parameter to (1) index.php and (2) loader.php.

πŸ“– Read

via "National Vulnerability Database".
12 February 2020
?
07:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Data about inmates and jail staff spilled by leaky prison app ⚠

A web-mapping project came across detainees' prescriptions and other PII that could be used by identity thieves to victimize prisoners.

πŸ“– Read

via "Naked Security".
?
07:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cloud computing security: These two Microsoft tools can help you battle shadow IT πŸ”

Finding what cloud services employees are using is only half the battle: integrating Microsoft Cloud App Security and Defender Advanced Threat Protection means you can track, block or audit cloud app usage.

πŸ“– Read

via "Security on TechRepublic".
?
08:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US charges four Chinese military members with Equifax hack ⚠

The indictment suggests the hack was part of a series of major data thefts organized by Chinese military and intelligence agencies.

πŸ“– Read

via "Naked Security".
?
11:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware ❌

Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work.

πŸ“– Read

via "Threatpost".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Katie Moussouris: The Bug Bounty Conflict of Interest ❌

Kate Moussouris sounds off on the challenges behind creating successful bug bounty programs.

πŸ“– Read

via "Threatpost".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Common Errors That Allow Attackers to Go Undetected πŸ•΄

Make these mistakes and invaders might linger in your systems for years.

πŸ“– Read

via "Dark Reading: ".
12:28
πŸ•΄ Chaos May Be the Key to Quantum-Proof Encryption πŸ•΄

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy.

πŸ“– Read

via "Dark Reading: ".
12:37
ATENTIONβ€Ό New - CVE-2012-0810

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.

πŸ“– Read

via "National Vulnerability Database".
12:37
ATENTIONβ€Ό New - CVE-2009-5140

The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

πŸ“– Read

via "National Vulnerability Database".
12:37
ATENTIONβ€Ό New - CVE-2009-5139

The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

πŸ“– Read

via "National Vulnerability Database".
?
13:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Mozilla issues final warning to websites using TLS 1.0 ⚠

From March, the Firefox, Chrome, Safari and Edge browsers will show warnings when users visit websites that only support TLS versions 1.0 or 1.1.

πŸ“– Read

via "Naked Security".
13:28
πŸ•΄ Chaos & Order: The Keys to Quantum-Proof Encryption πŸ•΄

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up.

πŸ“– Read

via "Dark Reading: ".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Data breaches up 17% in 2019 over previous year πŸ”

The Identity Theft Recource Center warns that businesses of all sizes should be vigilant about data security.

πŸ“– Read

via "Security on TechRepublic".
13:58
πŸ•΄ What Are Some Basic Ways to Protect My Global Supply Chain? πŸ•΄

Assessing supply chains is one of the more challenging third-party risk management endeavors organizations can take on.

πŸ“– Read

via "Dark Reading: ".
13:58
πŸ•΄ 5G Adoption Should Change How Organizations Approach Security πŸ•΄

With 5G adoption, businesses will be able to power more IoT devices and perform tasks more quickly, but there will be security ramifications.

πŸ“– Read

via "Dark Reading: ".
?
16:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ SoundCloud Tackles DoS, Account Takeover Issues ❌

Among other issues, the music platform didn't limit the number of login attempts someone could make.

πŸ“– Read

via "Threatpost".
16:12
πŸ›  NTCrackPipe 2.0 πŸ› 

NTCrackPipe is a basic local Windows account cracking tool.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
16:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Stop Defending Everything πŸ•΄

Instead, try prioritizing with the aid of a thorough asset inventory.

πŸ“– Read

via "Dark Reading: ".
16:37
ATENTIONβ€Ό New - CVE-2012-0951

A Memory Corruption Vulnerability exists in NVIDIA Graphics Drivers 29549 due to an unknown function in the file proc/driver/nvidia/registry.

πŸ“– Read

via "National Vulnerability Database".
16:37
ATENTIONβ€Ό New - CVE-2011-4661

A memory leak vulnerability exists in Cisco IOS before 15.2(1)T due to a memory leak in the HTTP PROXY Server process (aka CSCtu52820), when configured with Cisco ISR Web Security with Cisco ScanSafe and User Authenticaiton NTLM configured.

πŸ“– Read

via "National Vulnerability Database".
16:40
❌ Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs ❌

The release of Firefox 73 fixed high-severity memory safety bugs that could cause arbitrary code execution and missing bounds check that could enable memory corruption.

πŸ“– Read

via "Threatpost".
16:55
πŸ” U.S. Counterintelligence Center Pledges to Focus on Supply Chains, Democracy πŸ”

The National Counterintelligence and Security Center said this week it plans to double down on securing critical infrastructure, supply chain, the economy, democratic institutions, and cyber/technical operations.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-4338

Shaman 1.0.9: Users can add the line askforpwd=false to his shaman.conf file, without entering the root password in shaman. The next time shaman is run, root privileges are granted despite the fact that the user never entered the root password.

πŸ“– Read

via "National Vulnerability Database".
18:37
ATENTIONβ€Ό New - CVE-2011-3901

Android SQLite Journal before 4.0.1 has an information disclosure vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:37
ATENTIONβ€Ό New - CVE-2011-3336

regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.

πŸ“– Read

via "National Vulnerability Database".
18:37
ATENTIONβ€Ό New - CVE-2011-2499

Mambo CMS through 4.6.5 has multiple XSS.

πŸ“– Read

via "National Vulnerability Database".
18:37
ATENTIONβ€Ό New - CVE-2011-2343

The Bluetooth stack in Android before 2.3.6 allows a physically proximate attacker to obtain contact information via an AT phonebook transfer.

πŸ“– Read

via "National Vulnerability Database".
?
19:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI: Business Email Compromise Cost Businesses $1.7B in 2019 πŸ•΄

BEC attacks comprised nearly half of cybercrime losses last year, which totaled $3.5 billion overall as Internet-enabled crimes ramped up.

πŸ“– Read

via "Dark Reading: ".
?
19:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Avast Under Investigation by Czech Privacy Agency πŸ•΄

The software security maker is suspected of selling data about more than 100 million users to companies including Google, Microsoft, and Home Depot.

πŸ“– Read

via "Dark Reading: ".
?
20:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2011-4908

TinyBrowser plugin for Joomla! before 1.5.13 allows arbitrary file upload via upload.php.

πŸ“– Read

via "National Vulnerability Database".
20:37
ATENTIONβ€Ό New - CVE-2011-4906

Tiny browser in TinyMCE 3.0 editor in Joomla! before 1.5.13 allows file upload and arbitrary PHP code execution.

πŸ“– Read

via "National Vulnerability Database".
?
21:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Third-Party Breaches - and the Number of Records Exposed - Increased Sharply in 2019 πŸ•΄

Each breach exposed an average of 13 million records, Risk Based Security found.

πŸ“– Read

via "Dark Reading: ".
13 February 2020
?
08:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google to force Nest users to turn on 2FA ⚠

Nest users who aren't using 2FA or a Google account will be required to take an extra step by verifying their identity via email.

πŸ“– Read

via "Naked Security".
?
09:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google: Efforts Against Bad Android Apps on Play Store Are Working ❌

The tech giant acknowledged some achievements in efforts to bolster mobile app security but recognized more needs to be done.

πŸ“– Read

via "Threatpost".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FBI: Cybercrime tore a $3.5b hole in victims’ pockets last year ⚠

The FBI's Internet Crime Report shows that business email comprise is the biggest money-maker for cybercriminals.

πŸ“– Read

via "Naked Security".
10:08
⚠ IE zero day and heap of RDP flaws fixed in February Patch Tuesday ⚠

Microsoft has finally patched the Internet Explorer (IE) zero-day flaw the company said in January was being used in β€œlimited targeted attacks”.

πŸ“– Read

via "Naked Security".
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Dell fixes privilege elevation bug in support software ⚠

Users of Dell SupportAssist should patch their software immediately to fix a software bug that could lead to arbitrary code execution.

πŸ“– Read

via "Naked Security".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox six-weekly security fixes are out – get them now! ⚠

No zero-day bugs, so by updating promptly you are keeping ahead of the crooks, not merely catching up!

πŸ“– Read

via "Naked Security".
11:47
πŸ” Why password management is critical to mitigating data breaches πŸ”

The Identity Theft Resource Center warns that businesses of all sizes should be vigilant about data security. The COO offers advice about passwords, cloud security, and patch management.

πŸ“– Read

via "Security on TechRepublic".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Puerto Rico Gov Hit By $2.6M Phishing Scam ❌

A recent phishing scam targeted Puerto Rico’s Industrial Development Company.

πŸ“– Read

via "Threatpost".
12:08
⚠ S2 Ep26: Robbin Hood ransomware, Twitter parodies and SMS 2FA WHAT? – Naked Security Podcast ⚠

Listen now!

πŸ“– Read

via "Naked Security".
12:12
πŸ•΄ Forget Hacks... Ransomware, Phishing Are Election Year's Real Threats πŸ•΄

As we gear up for the voting season, let's put aside any links between foreign interference and voting machine security and focus on the actual risks threatening election security.

πŸ“– Read

via "Dark Reading: ".
?
13:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Suricata IDPE 5.0.2 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Chinese cyber criminals are getting more organized and dangerous πŸ”

Hackers are adopting organized crime tactics to make billions from victims all over the globe.

πŸ“– Read

via "Security on TechRepublic".
13:29
πŸ” Only 17% of global organizations are considered cyber resilience "leaders" πŸ”

New Accenture study says organizations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.

πŸ“– Read

via "Security on TechRepublic".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Bill Would Create Federal Data Protection Agency πŸ”

New legislation, introduced today, would give the agency authority to enforce data practices, launch investigations, and issue subpoenas.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
14:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Privacy Experts Skeptical of Proposed Data Protection Agency ❌

A new Data Protection Agency would overhaul federal regulation efforts around data privacy - but experts are skeptical that the U.S. government can get it right.

πŸ“– Read

via "Threatpost".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Report: 9 times out of 10, hackers can attack website visitors πŸ”

A Positive Technologies study finds 82% of web application vulnerabilities lie in the source code.

πŸ“– Read

via "Security on TechRepublic".
15:12
πŸ•΄ Apps Remain Favorite Mobile Attack Vector πŸ•΄

Mobile apps are used in nearly 80% of attacks targeting mobile devices, followed by network and operating system attacks.

πŸ“– Read

via "Dark Reading: ".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Key components of the CEO's agenda for the digital enterprise πŸ”

CEOs are generally from a finance/business track, rather than a technology one--why their traditional agenda and practices must change.

πŸ“– Read

via "Security on TechRepublic".
16:12
πŸ•΄ Small Business Security: 5 Tips on How and Where to Start πŸ•΄

There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better.

πŸ“– Read

via "Dark Reading: ".
16:12
πŸ•΄ 7 Tax Season Security Tips πŸ•΄

Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.

πŸ“– Read

via "Dark Reading: ".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” IoT device security: 5 tips for enterprises πŸ”

There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them.

πŸ“– Read

via "Security on TechRepublic".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-1903

XSS in Telligent Community 5.6.583.20496 via a flash file and related to the allowScriptAccess parameter.

πŸ“– Read

via "National Vulnerability Database".
16:49
ATENTIONβ€Ό New - CVE-2012-1500

Stored XSS vulnerability in UpdateFieldJson.jspa in JIRA 4.4.3 and GreenHopper before 5.9.8 allows an attacker to inject arbitrary script code.

πŸ“– Read

via "National Vulnerability Database".
?
17:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical WordPress Plugin Bug Afflicts 700K Sites ❌

Researchers are urging users of the GDPR Cookie Consent WordPress plugin to update as soon as possible.

πŸ“– Read

via "Threatpost".
17:42
πŸ•΄ Huawei Charged with RICO Violations in Federal Court πŸ•΄

A new set of indictments adds conspiracy to violate RICO statutes to a list of existing charges against the Chinese telecommunications giant.

πŸ“– Read

via "Dark Reading: ".
?
18:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Babel of IoT Authentication Poses Security Challenges πŸ•΄

With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.

πŸ“– Read

via "Dark Reading: ".
?
18:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-5623

Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.

πŸ“– Read

via "National Vulnerability Database".
?
19:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems πŸ•΄

The new threat model hones in on ML security at the design state.

πŸ“– Read

via "Dark Reading: ".
19:12
πŸ•΄ DDoS Attacks Nearly Double Between Q4 2018 and Q4 2019 πŸ•΄

Peer-to-peer botnets, TCP reflection attacks, and increased activity on Sundays are three DDoS attack trends from last quarter.

πŸ“– Read

via "Dark Reading: ".
?
20:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Man tries to sell Jimmy Wales on blockchain for Wikipedia's security problems--Wales doesn't buy it πŸ”

Commentary: It takes hubris to tell Jimmy Wales, the founder of Wikipedia, how to store data.

πŸ“– Read

via "Security on TechRepublic".
?
21:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec πŸ•΄

What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?

πŸ“– Read

via "Dark Reading: ".
14 February 2020
?
08:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Corp.com is up for sale – check your Active Directory settings! ⚠

An old, dormant domain is going on sale - and the results could be catastrophic for enterprises with common Active Directory misconfigurations.

πŸ“– Read

via "Naked Security".
?
08:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Self-driving car dataset missing labels for pedestrians, cyclists ⚠

Udacity Dataset 2, used to train thousands of engineers, contained thousands of unlabeled vehicles and hundreds of unlabeled pedestrians.

πŸ“– Read

via "Naked Security".
08:38
⚠ Facebook ices in-app dating in EU after questions from regulator ⚠

The app's rollout in the EU has been delayed until Facebook can show privacy regulators its data protection workings.

πŸ“– Read

via "Naked Security".
?
09:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Suspect who refused to decrypt hard drives released after four years ⚠

The US Court of Appeals ruled that he couldn't continue to be held for refusing to give up his passcodes.

πŸ“– Read

via "Naked Security".
09:38
⚠ Cookie-nabbing app could have served users side helping of XSS ⚠

A popular GDPR compliance WordPress plugin vendor has patched a flaw that rendered both site visitors and admins vulnerable to XSS attacks.

πŸ“– Read

via "Naked Security".
?
10:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say ❌

Flaws in the blockchain app some states plan to use in the 2020 election allow bad actors to alter or cancel someone’s vote or expose their private info.

πŸ“– Read

via "Threatpost".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The 5 Love Languages of Cybersecurity πŸ•΄

When it comes to building buy-in from the business, all cybersecurity needs is love -- especially when it comes to communication.

πŸ“– Read

via "Dark Reading: ".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Android facial recognition is more secure than you think πŸ”

After running real-world tests of Android's facial recognition on a Pixel 4, Jack Wallen shares his theory of why some people are so concerned about facial recognition.

πŸ“– Read

via "Security on TechRepublic".
12:35
πŸ›  EnumJavaLibs Java Classpath Enumerator πŸ› 

EnumJavaLibs is a tool that can be used to discover which libraries are loaded (i.e. available on the classpath) by a remote Java application when it supports deserialization.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How banks can protect their customers from coronavirus-themed phishing emails πŸ”

The coronavirus, which has already led to the deaths of more than 1,000 people, is a topic that scammers are corrupting for their own purposes.

πŸ“– Read

via "Security on TechRepublic".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack ❌

Top stories of this week include a new Emotet Wi-Fi hack and Robbinhood ransomware operators using a "bring your own bug" technique.

πŸ“– Read

via "Threatpost".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybercriminals flooding web with coronavirus-themed spam and malware πŸ”

Hackers have expanded their exploitation of the outbreak fears with hundreds of scams and operations.

πŸ“– Read

via "Security on TechRepublic".
15:06
❌ SMS Phishing Campaign Targets Mobile Bank App Users in North America ❌

Customers of RBC, HSBC, TD, Meridian, BNC and Chase are targeted in latest attack.

πŸ“– Read

via "Threatpost".
15:08
⚠ Bluetooth bugs – researchers find 10 β€œSweyntooth” security holes ⚠

More trouble in the Internet of Things - Bluetooth firmware code in many devices is found to have numerous bugs.

πŸ“– Read

via "Naked Security".
15:12
πŸ•΄ DHS Warns of Cyber Heartbreak πŸ•΄

Fraudulent dating and relationship apps and websites raise the risks for those seeking online romance on Valentine's Day.

πŸ“– Read

via "Dark Reading: ".
?
15:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ovum to Expand Cybersecurity Research Under New Omdia Group πŸ•΄

Informa Tech combines Ovum, Heavy Reading, Tractica, and IHS Markit research.

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ” Friday Five: 2/14 Edition πŸ”

A voting app ignites a security debate, the US brings new charges against Huawei, and how the DPO and CISO complement each other - catch up on the week's news with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple iPhone Users Targeted with Bogus Dating App for Valentine’s Day ❌

The scam uses a range of themes, including tech-support scares and slot machines.

πŸ“– Read

via "Threatpost".
?
16:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Palm Beach Elections Office Hit with Ransomware Pre-2016 Election πŸ•΄

Palm Beach County's elections supervisor does not believe the attack is linked to Russian hacking attempts targeting Florida.

πŸ“– Read

via "Dark Reading: ".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Voatz defends blockchain solution for its voting via app πŸ”

The for-profit company wants to make absentee voting easier for members of the military, people with disabilities, and older adults, but its biggest test included only 15,000 voters.

πŸ“– Read

via "Security on TechRepublic".
17:59
πŸ” MIT finds massive security flaws with blockchain voting app πŸ”

Researchers say hackers can alter, stop, or expose how an individual user has voted through the Voatz app.

πŸ“– Read

via "Security on TechRepublic".
18:06
❌ 500 Malicious Chrome Extensions Impact Millions of Users ❌

The malicious Chrome extensions were secretly collecting users' browser data and redirecting them to malware-laced websites.

πŸ“– Read

via "Threatpost".
18:06
❌ Huawei Controversy Highlights 5G Security Implications ❌

Security experts say that 5G supply chain concerns should be taken seriously – whether it’s in the context of Huawei or not.

πŸ“– Read

via "Threatpost".
?
19:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Phishing Campaign Targets Mobile Banking Users πŸ•΄

Consumers in dozens of countries were targeted, Lookout says.

πŸ“– Read

via "Dark Reading: ".
15 February 2020
?
09:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Martin and Dorothie Hellman on Love, Crypto & Saving the World πŸ•΄

Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.

πŸ“– Read

via "Dark Reading: ".
17 February 2020
?
08:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 24 stories of the week ⚠

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
09:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Police bust alleged operator of Bitcoin mixing service Helix ⚠

The Ohio man is charged with running a Bitcoin mixer to launder over $300mβ€”now worth $3.6bβ€”on behalf of Dark Net crooks trying to hide out.

πŸ“– Read

via "Naked Security".
09:18
⚠ Senator calls for dedicated US data protection agency ⚠

The US needs a data protection agency of its own, and Kirsten Gillibrand wants to be the one that makes it happen.

πŸ“– Read

via "Naked Security".
09:18
⚠ Google forced to reveal anonymous reviewer’s details ⚠

A court has forced Google to reveal the details of an anonymous poster who published an unpalatable review of a dentist.

πŸ“– Read

via "Naked Security".
09:18
⚠ Google pulls 500 malicious Chrome extensions after researcher tip-off ⚠

Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising.

πŸ“– Read

via "Naked Security".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-3738

A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
14:37
πŸ” How to report a phishing or spam email to Microsoft πŸ”

Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters.

πŸ“– Read

via "Security on TechRepublic".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  OpenSSH 8.2p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-3722

A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c.

πŸ“– Read

via "National Vulnerability Database".
?
20:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-2412

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4531. Reason: This candidate is a duplicate of CVE-2012-4531. Notes: All CVE users should reference CVE-2012-4531 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
18 February 2020
?
08:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs ❌

A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.

πŸ“– Read

via "Threatpost".
?
08:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Sensitive plastic surgery images exposed online ⚠

Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.

πŸ“– Read

via "Naked Security".
08:18
⚠ IOTA shuts down network temporarily to fight wallet hacker ⚠

Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.

πŸ“– Read

via "Naked Security".
?
08:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ AI filter launched to block Twitter cyberflashing ⚠

A small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers.

πŸ“– Read

via "Naked Security".
08:48
⚠ Council returns to using pen and paper after cyberattack ⚠

Ten days after a suspected ransomware attack, residents of the English borough of Redcar and Cleveland must be starting to wonder when their Council’s IT systems will return.

πŸ“– Read

via "Naked Security".
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Python, microservices, and more tech trends for 2020, according to O'Reilly πŸ”

Interest in Kubernetes is increasing, and DevOps is losing steam, based on O'Reilly survey findings.

πŸ“– Read

via "Security on TechRepublic".
09:42
πŸ•΅ How to watch Six Nations 2020 Rugby live online πŸ•΅


πŸ“– Read

via "VPNpro".
?
10:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hacker Scheme Threatens AdSense Customers with Account Suspension ❌

Scam threatens to flood sites using Google’s banner-ad program with bot and junk traffic if owners don’t pay $5K in bitcoin.

πŸ“– Read

via "Threatpost".
10:43
πŸ•΄ 8 Things Users Do That Make Security Pros Miserable πŸ•΄

When a user interacts with an enterprise system the result can be productivity or disaster. Here are 8 opportunities for the disaster side to win out over the productive.

πŸ“– Read

via "Dark Reading: ".
10:43
πŸ•΄ Staircase to the Cloud: Dark Reading Caption Contest Winners πŸ•΄

A humorous nod to the lack of gender equity in cybersecurity hiring was our judges' unanimous choice. And the winners are ...

πŸ“– Read

via "Dark Reading: ".
10:43
πŸ•΄ The Roads to Riches πŸ•΄

You could be making millions in just two years!

πŸ“– Read

via "Dark Reading: ".
10:48
⚠ Malware and HTTPS – a growing love affair ⚠

HTTPS web encryption - blessing or curse? A new SophosLabs report looks at how much the crooks love TLS.

πŸ“– Read

via "Naked Security".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Road(s) to Riches πŸ•΄

You could be making millions in just two years!

πŸ“– Read

via "Dark Reading: ".
?
11:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Firmware Weaknesses Can Turn Computer Subsystems into Trojans πŸ•΄

Network cards, video cameras, and graphics adapters are a few of the subsystems whose lack of security could allow attackers to turn them into spy implants.

πŸ“– Read

via "Dark Reading: ".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Mac attacks on the rise πŸ”

Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report.

πŸ“– Read

via "Security on TechRepublic".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Lulzbuster 1.2.0 πŸ› 

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:28
πŸ›  OpenDNSSEC 2.1.6 πŸ› 

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:36
ATENTIONβ€Ό New - CVE-2013-5594

Mozilla Firefox before 25 allows modification of anonymous content of pluginProblem.xml binding

πŸ“– Read

via "National Vulnerability Database".
12:36
ATENTIONβ€Ό New - CVE-2013-4454

WordPress Portable phpMyAdmin Plugin 1.4.1 has Multiple Security Bypass Vulnerabilities

πŸ“– Read

via "National Vulnerability Database".
?
13:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 1.7M Nedbank Customers Affected via Third-Party Breach πŸ•΄

A vulnerability in the network of marketing contractor Computer Facilities led to a breach at the South African bank.

πŸ“– Read

via "Dark Reading: ".
?
14:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Active Exploits Hit Vulnerable WordPress ThemeGrill Plugin ❌

Websites using a vulnerable version of the WordPress plugin, ThemeGrill Demo Importer, are being targeted by attackers.

πŸ“– Read

via "Threatpost".
14:36
ATENTIONβ€Ό New - CVE-2013-4227

Cross-site request forgery (CSRF) vulnerability in the persona_xsrf_token function in persona.module in the Mozilla Persona module 7.x-1.x before 7.x-1.11 for Drupal allows remote attackers to hijack the authentication of aribitrary users via a security token that is not a string data type.

πŸ“– Read

via "National Vulnerability Database".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyber Fitness Takes More Than a Gym Membership & a Crash Diet πŸ•΄

Make cybersecurity your top priority, moving away from addressing individual problems with Band-Aids and toward attaining a long-term cyber-fitness plan.

πŸ“– Read

via "Dark Reading: ".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-6295

PrestaShop 1.5.5 vulnerable to privilege escalation via a Salesman account via upload module

πŸ“– Read

via "National Vulnerability Database".
16:36
ATENTIONβ€Ό New - CVE-2013-3323

A Privilege Escalation Vulnerability exists in IBM Maximo Asset Management 7.5, 7.1, and 6.2, when WebSeal with Basic Authentication is used, due to a failure to invalidate the authentication session, which could let a malicious user obtain unauthorized access.

πŸ“– Read

via "National Vulnerability Database".
16:36
ATENTIONβ€Ό New - CVE-2013-2679

Multiple cross-site scripting (XSS) vulnerabilities in Cisco Linksys E4200 router with firmware 1.0.05 build 7 allow remote attackers to inject arbitrary web script or HTML via the (1) log_type, (2) ping_ip, (3) ping_size, (4) submit_type, or (5) traceroute_ip parameter to apply.cgi or (6) new_workgroup or (7) submit_button parameter to storage/apply.cgi.

πŸ“– Read

via "National Vulnerability Database".
16:36
ATENTIONβ€Ό New - CVE-2012-0718

IBM Tivoli Endpoint Manager 8 does not set the HttpOnly flag on cookies.

πŸ“– Read

via "National Vulnerability Database".
16:36
ATENTIONβ€Ό New - CVE-2009-5146

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:37
πŸ” Is your firmware vulnerable to attack? A report says it might be πŸ”

Unsigned firmware in WiFi adapters, USB hubs, trackpads, and other devices can be compromised by hackers, says enterprise firmware security company Eclypsium in a new report.

πŸ“– Read

via "Security on TechRepublic".
16:43
πŸ•΄ Lumu to Emerge from Stealth at RSAC πŸ•΄

The new company will focus on giving customers earlier indications of network and server compromise.

πŸ“– Read

via "Dark Reading: ".
?
17:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Iran-Backed APTs Collaborate on 3-Year β€˜Fox Kitten’ Global Spy Campaign ❌

APT34/OilRig and APT33/Elfin have established a highly developed and persistent infrastructure that could be converted to distribute destructive wiper malware.

πŸ“– Read

via "Threatpost".
17:07
πŸ” Finally, the world is getting concerned about data privacy πŸ”

Consumers and employees are finally becoming more sensitive to the privacy of their data. As technology leaders it's worth getting ahead of this trend.

πŸ“– Read

via "Security on TechRepublic".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ring Mandates 2FA After Rash of Hacks ❌

Ring outlined new security and data privacy measures, Tuesday, following backlash of the connected doorbell in the past year.

πŸ“– Read

via "Threatpost".
?
17:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Washington Privacy Act Clears Senate πŸ”

Like other recent state data privacy laws, new legislation in Washington would require businesses to establish, implement, and maintain reasonable administrative, technical, and physical data security practices.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-4228

The OG access fields (visibility fields) implementation in Organic Groups (OG) module 7.x-2.x before 7.x-2.3 for Drupal does not properly restrict access to private groups, which allows remote authenticated users to guess node IDs, subscribe to, and read the content of arbitrary private groups via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
18:36
ATENTIONβ€Ό New - CVE-2013-4226

The Authenticated User Page Caching (Authcache) module 7.x-1.x before 7.x-1.5 for Drupal does not properly restrict access to cached pages, which allows remote attackers with the same role-combination as the superuser to obtain sensitive information via the cached pages of the superuser.

πŸ“– Read

via "National Vulnerability Database".
18:43
πŸ•΄ Dell Sells RSA to Private Equity Firm for $2.1B πŸ•΄

Deal with private equity entity Symphony Technology Group revealed one week before the security industry's RSA Conference in San Francisco.

πŸ“– Read

via "Dark Reading: ".
?
19:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter ❌

OurMine took over the Spanish powerhouse soccer team's Twitter account.

πŸ“– Read

via "Threatpost".
?
21:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Trouble with Free and Open Source Software πŸ•΄

Insecure developer accounts, legacy software, and nonstandard naming schemes are major problems, Linux Foundation and Harvard study concludes.

πŸ“– Read

via "Dark Reading: ".
19 February 2020
?
03:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-0749

A vulnerability in Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected software. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information.

πŸ“– Read

via "National Vulnerability Database".
03:52
ATENTIONβ€Ό New - CVE-2011-2054

A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
08:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ OpenSSH eases admin hassles with FIDO U2F token support ⚠

OpenSSH version 8.2 is out and the big news is that the world’s most popular remote management software now supports authentication using any FIDO (Fast Identity Online) U2F hardware token.

πŸ“– Read

via "Naked Security".
?
08:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WordPress plugin hole could have allowed attackers to wipe websites ⚠

A WordPress plugin with over 100,000 active installations had a bug that could have allowed unauthorised attackers to wipe its users' blogs clean, it emerged this week.

πŸ“– Read

via "Naked Security".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook asks to be regulated kinda like a newspaper, kinda like telco ⚠

Zuckerberg is in Brussels right in time for the European Commission's release of its manifesto on regulating AI.

πŸ“– Read

via "Naked Security".
09:07
⚠ Private photos leaked by PhotoSquared’s unsecured cloud storage ⚠

With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.

πŸ“– Read

via "Naked Security".
?
09:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Latest Tax Scams Target Apps and Tax-Prep Websites ❌

Traditional e-mail based scams are also in the mix this year, one in particular that uses the legitimate app TeamViewer to take over victims’ systems.

πŸ“– Read

via "Threatpost".
?
10:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to manage security and privacy in the new Microsoft Edge browser πŸ”

There's a new version of Microsoft Edge in town based on Chromium. Here's how to manage the browser's security and privacy settings.

πŸ“– Read

via "Security on TechRepublic".
?
11:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations ❌

Cynet Free Threat Assessment spotlights critical, exposed attack surfaces and provides actionable knowledge of attacks that are currently alive and active.

πŸ“– Read

via "Threatpost".
?
12:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Don't Let Iowa Bring Our Elections Back to the Stone Age πŸ•΄

The voting experience should be the same whether the vote is in person, by mail, or over the Internet. Let's not allow one bad incident stop us from finding new ways to achieve this.

πŸ“– Read

via "Dark Reading: ".
12:37
πŸ” Coronavirus domain names are the latest hacker trick πŸ”

One site registered in Russia offers a coronavirus cure for $300.

πŸ“– Read

via "Security on TechRepublic".
12:37
πŸ” Cybercriminals get creative with tax scams ahead of April 15 πŸ”

Hackers are going after everyone this tax season, including the companies handling our most sensitive information.

πŸ“– Read

via "Security on TechRepublic".
12:37
πŸ” Insider data breach survey finds directors most likely to break company policy πŸ”

Report suggests IT leaders think breaches are inevitable and don't have adequate risk management in place.

πŸ“– Read

via "Security on TechRepublic".
12:52
ATENTIONβ€Ό New - CVE-2014-3622

Use-after-free vulnerability in the add_post_var function in the Posthandler component in PHP 5.6.x before 5.6.1 might allow remote attackers to execute arbitrary code by leveraging a third-party filter extension that accesses a certain ksep value.

πŸ“– Read

via "National Vulnerability Database".
12:52
ATENTIONβ€Ό New - CVE-2014-2727

The STARTTLS implementation in MailMarshal before 7.2 allows plaintext command injection.

πŸ“– Read

via "National Vulnerability Database".
12:52
ATENTIONβ€Ό New - CVE-2014-2228

The XStream extension in HP Fortify SCA before 2.2 RC3 allows remote attackers to execute arbitrary code via unsafe deserialization of XML messages.

πŸ“– Read

via "National Vulnerability Database".
?
13:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hamas Ensnares Israeli Soldiers with Pretty β€˜Ladies’ ❌

The third catfish attempt in three years from the Palestinian militant group adds a few technical advances to the mix.

πŸ“– Read

via "Threatpost".
13:22
❌ SMS Attack Spreads Emotet, Steals Bank Credentials ❌

A new Emotet campaign is spread via SMS messages pretending to be from banks and may have ties to the TrickBot trojan.

πŸ“– Read

via "Threatpost".
?
14:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DHS's CISA Warns of New Critical Infrastructure Ransomware Attack πŸ•΄

An attack on a natural gas compression facility sent the operations offline for two days.

πŸ“– Read

via "Dark Reading: ".
14:37
πŸ” Security holes in 2G and 3G networks will pose a risk for next several years πŸ”

Despite the growth of 5G and 4G, older network technologies beset with certain security flaws will be around for many more years, says enterprise security provider Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
?
14:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-5581

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2012-6685

Nokogiri before 1.5.4 is vulnerable to XXE attacks

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2012-6614

D-Link DSR-250N devices before 1.08B31 allow remote authenticated users to obtain "persistent root access" via the BusyBox CLI, as demonstrated by overwriting the super user password.

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2012-1932

A cross-site scripting (XSS) vulnerability in Wolf CMS 0.75 and earlier allows remote attackers to inject arbitrary web script or HTML via the setting[admin_email] parameter to admin/setting.

πŸ“– Read

via "National Vulnerability Database".
?
15:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 44% of Security Threats Start in the Cloud πŸ•΄

Amazon Web Services is a top source of cyberattacks, responsible for 94% of all Web attacks originating in the public cloud.

πŸ“– Read

via "Dark Reading: ".
?
16:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Zero-Factor Authentication: Owning Our Data πŸ•΄

Are you asking the right questions to determine how well your vendors will protect your data? Probably not.

πŸ“– Read

via "Dark Reading: ".
?
16:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-0055

OverlayFS in the Linux kernel before 3.0.0-16.28, as used in Ubuntu 10.0.4 LTS and 11.10, is missing inode security checks which could allow attackers to bypass security restrictions and perform unauthorized actions.

πŸ“– Read

via "National Vulnerability Database".
?
17:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” U.S. Warns of Ransomware Attacks Targeting Pipeline Ops πŸ”

Following an attack on a gas compression facility, CISA is urging organizations to take steps to safeguard their systems.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:52
❌ BlueKeep Flaw Plagues Outdated Connected Medical Devices ❌

More than 55 percent of medical imaging devices - including MRIs, XRays and ultrasound machines - are powered by outdated Windows versions, researchers warn.

πŸ“– Read

via "Threatpost".
?
19:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ U.S. Pipeline Disrupted by Ransomware Attack ❌

The attack took a gas compression facility offline for two days, disrupting the supply chain.

πŸ“– Read

via "Threatpost".
19:35
πŸ•΄ User Have Risky Security Habits, but Security Pros Aren't Much Better πŸ•΄

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.

πŸ“– Read

via "Dark Reading: ".
?
20:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Users Have Risky Security Habits, but Security Pros Aren't Much Better πŸ•΄

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.

πŸ“– Read

via "Dark Reading: ".
?
21:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Fool Smart Car Camera with a 2-Inch Piece of Electrical Tape πŸ•΄

McAfee researchers say they were able to get a Tesla to autonomously accelerate by tricking its camera platform into misreading a speed-limit sign.

πŸ“– Read

via "Dark Reading: ".
?
22:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-2018

Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
20 February 2020
?
02:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Data privacy: What consumers want businesses to know πŸ”

A new PwC report reveals what customers expect when it comes to expectations of privacy surrounding their data.

πŸ“– Read

via "Security on TechRepublic".
?
03:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-3484

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

πŸ“– Read

via "National Vulnerability Database".
03:52
ATENTIONβ€Ό New - CVE-2012-2629

Multiple cross-site request forgery (CSRF) and cross-site scripting (XSS) vulnerabilities in Axous 1.1.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator account via an addnew action to admin/administrators_add.php; or (2) conduct cross-site scripting (XSS) attacks via the page_title parameter to admin/content_pages_edit.php; the (3) category_name[] parameter to admin/products_category.php; the (4) site_name, (5) seo_title, or (6) meta_keywords parameter to admin/settings_siteinfo.php; the (7) company_name, (8) address1, (9) address2, (10) city, (11) state, (12) country, (13) author_first_name, (14) author_last_name, (15) author_email, (16) contact_first_name, (17) contact_last_name, (18) contact_email, (19) general_email, (20) general_phone, (21) general_fax, (22) sales_email, (23) sales_phone, (24) support_email, or (25) support_phone parameter to admin/settings_company.php; or the (26) system_email, (27) sender_name, (28) smtp_server, (29) smtp_username, (30) smtp_password, or (31) order_notice_email parameter to admin/settings_email.php.

πŸ“– Read

via "National Vulnerability Database".
03:52
ATENTIONβ€Ό New - CVE-2011-2498

The Linux kernel from v2.3.36 before v2.6.39 allows local unprivileged users to cause a denial of service (memory consumption) by triggering creation of PTE pages.

πŸ“– Read

via "National Vulnerability Database".
?
07:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ring makes 2FA mandatory to keep hackers out of your doorbell account ⚠

Amazon is following Google's lead by forcing all users to use two-factor authentication when logging into their Ring accounts.

πŸ“– Read

via "Naked Security".
?
08:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox 73.0.1 fixes crashes, blank web pages and DRM niggles ⚠

Firefox version 73 has only been out for a week but already Mozilla has had to update it to v73.0.1 to fix a range of browser problems.

πŸ“– Read

via "Naked Security".
?
08:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer ❌

This week a hacking forum posted data from the breachβ€”which included personal and contact details for celebrities, tech CEOs, government officials and employees at large tech companies.

πŸ“– Read

via "Threatpost".
?
10:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Adobe Flaws Fixed in Out-of-Band Update ❌

Two critical Adobe vulnerabilities have been fixed in Adobe After Effects and Adobe Media Encoder.

πŸ“– Read

via "Threatpost".
11:07
⚠ Nearly half of hospital Windows systems still vulnerable to RDP bugs ⚠

Almost half of connected hospital devices are still exposed to the wormable BlueKeep Windows flaw nearly a year after it was announced, according to a report released this week.

πŸ“– Read

via "Naked Security".
11:07
πŸ” Cloud misconfigurations cost companies nearly $5 trillion πŸ”

A DivvyCloud report finds 196 data breaches exposed more than 33 billion records due to environments without appropriate security.

πŸ“– Read

via "Security on TechRepublic".
?
11:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Firms Improve Threat Detection but Face Increasingly Disruptive Attacks πŸ•΄

In addition, more third parties are discovering the attacks rather than the companies themselves.

πŸ“– Read

via "Dark Reading: ".
11:35
πŸ•΄ 10 Tough Questions CEOs Are Asking CISOs πŸ•΄

CEOs today are prepared with better questions than 'Are we secure,' and chief information security officers had better be ready to answer.

πŸ“– Read

via "Dark Reading: ".
11:37
⚠ Ransomware attack forces 2-day shutdown of natural gas pipeline ⚠

The attacker(s) infected both IT and operational networks with an unspecified ransomware strain, though the facility never lost control.

πŸ“– Read

via "Naked Security".
?
12:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Strategies to Secure Cloud Operations Against Today's Cyber Threats πŸ•΄

With these fundamentals in mind, organizations can reduce their security and compliance risks as they reap the cloud's many benefits:

πŸ“– Read

via "Dark Reading: ".
?
13:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How Shadow IT could put your organization at risk πŸ”

Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.

πŸ“– Read

via "Security on TechRepublic".
13:07
πŸ” How some presidential campaigns use DMARC to protect their domains from being spoofed πŸ”

DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.

πŸ“– Read

via "Security on TechRepublic".
13:22
❌ Cybergang Favors G Suite and Physical Checks For BEC Attacks ❌

Exaggerated Lion, a newly discovered cybercrime group, uses new and unique tactics to target U.S. companies in BEC attacks.

πŸ“– Read

via "Threatpost".
13:23
πŸ€ͺπŸ’Έ SPECIAL OFFER! πŸ’ΈπŸ€ͺ

 CYBERSECURITY 2020 by WILEY 😈

β˜‘οΈ Secure yourself a new bundle of cybersecurity ebooks! Get ebooks like Cryptography Engineering: Design Principles and Practical Applications, Reversing: Secrets of Reverse Engineering, Social Engineering: The Science of Human Hacking, and more.

β–ͺ️ $959 Worth of awesome ebooks & videos β–ͺ️
▫️ Pay $1 or more ▫️
β–ͺ️ DRM-Free β–ͺ️
▫️ Multi-format ▫️
13:37
πŸ” How to use Restricted Shell to limit user access to a Linux system πŸ”

Learn how to prevent Linux users from executing certain commands and confining them to their home directory by employing rbash.

πŸ“– Read

via "Security on TechRepublic".
13:37
πŸ” 5 free security apps to keep your Mac safe πŸ”

Mac users, check out these five antivirus software options, which includes one antimalware app that is ideal for SMBs.

πŸ“– Read

via "Security on TechRepublic".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to use Restricted Shell to limit user access to a Linux system πŸ”

Learn how to prevent Linux users from executing certain commands and confining them to their home directory by employing rbash.

πŸ“– Read

via "Security on TechRepublic".
14:07
πŸ” Security platform tracks rogue wireless devices via real-time map πŸ”

New security tool from Bastille Networks can help security teams enforce no cell-phone zones.

πŸ“– Read

via "Security on TechRepublic".
?
14:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Personal Info of 10.6M MGM Resort Guests Leaked Online πŸ•΄

Data published on a hacking forum includes phone numbers and email addresses of travelers ranging from everyday tourists to celebrities and tech CEOs.

πŸ“– Read

via "Dark Reading: ".
?
14:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Cisco Bug Opens Software Licencing Manager to Remote Attack ❌

A default password would let anyone access the Cisco Smart Software Manager On-Prem Base platform, even if it's not directly connected to the internet.

πŸ“– Read

via "Threatpost".
14:52
ATENTIONβ€Ό New - CVE-2012-5366

The IPv6 implementation in Apple Mac OS X (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2012-5365

The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2012-5364

The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2012-5363

The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2011-2393.

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2012-5362

The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2010-4669.

πŸ“– Read

via "National Vulnerability Database".
?
16:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ It's Time to Break the 'Rule of Steve' πŸ•΄

Today, in a room full of cybersecurity professionals, there are still more people called Steve than there are women.

πŸ“– Read

via "Dark Reading: ".
16:39
πŸ” Join Digital Guardian at RSA Conference 2020! πŸ”

RSA 2020 is around the corner! Learn what Digital Guardian has planned at booth S935 and elsewhere for the week.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:52
ATENTIONβ€Ό New - CVE-2012-3351

Multiple cross-site scripting (XSS) vulnerabilities in LongTail Video JW Player through 5.10.2295 allow remote attackers to inject arbitrary web script or HTML via the (1) link, (2) logo.link, or (3) aboutlink parameter, or a nested URI scheme name for (4) javascript, (5) asfunction, or (6) vbscript.

πŸ“– Read

via "National Vulnerability Database".
16:52
ATENTIONβ€Ό New - CVE-2012-2599

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-3835. Reason: This issue was MERGED into CVE-2012-3835 in accordance with CVE content decisions, because it is the same type of vulnerability and affects the same versions. Notes: All CVE users should reference CVE-2012-3835 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
16:52
ATENTIONβ€Ό New - CVE-2011-4915

fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts.

πŸ“– Read

via "National Vulnerability Database".
16:52
ATENTIONβ€Ό New - CVE-2011-0699

Integer signedness error in the btrfs_ioctl_space_info function in the Linux kernel 2.6.37 allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted slot value.

πŸ“– Read

via "National Vulnerability Database".
?
17:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Damage Hit $11.5B in 2019 πŸ•΄

A new report shows the scale of ransomware's harm and the growth of that damage year-over-year -- an average of $141,000 per incident.

πŸ“– Read

via "Dark Reading: ".
?
18:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Announces General Availability of Threat Protection, Insider Risk Management πŸ•΄

Microsoft made several security announcements ahead of RSA Conference, including its decision to bring Microsoft Defender to iOS and Android.

πŸ“– Read

via "Dark Reading: ".
18:07
⚠ ISS World β€œmalware attack” leaves employees offline ⚠

A global facilities company with half-a-million staff has shuttered most of its IT systems after a malware attack.

πŸ“– Read

via "Naked Security".
?
18:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  nfstream 3.2.0 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
18:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Bans 600 Android Apps for Obnoxious Ads ❌

The Google Play apps violated the tech behemoth's disruptive advertising policies.

πŸ“– Read

via "Threatpost".
18:52
ATENTIONβ€Ό New - CVE-2012-5236

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
19:05
πŸ•΄ Popular Mobile Document-Management Apps Put Data at Risk πŸ•΄

Most iOS and Android apps that Cometdocs has published on Google and Apple app stores transmit entire documents - unencrypted.

πŸ“– Read

via "Dark Reading: ".
?
20:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
?
πŸ›‘ Cybersecurity & Privacy news πŸ›‘ 20.02.2020 13:23:44
πŸ€ͺπŸ’Έ SPECIAL OFFER! πŸ’ΈπŸ€ͺ

 CYBERSECURITY 2020 by WILEY 😈

β˜‘οΈ Secure yourself a new bundle of cybersecurity ebooks! Get ebooks like Cryptography Engineering: Design Principles and Practical Applications, Reversing: Secrets of Reverse Engineering, Social Engineering: The Science of Human Hacking, and more.

β–ͺ️ $959 Worth of awesome ebooks & videos β–ͺ️
▫️ Pay $1 or more ▫️
β–ͺ️ DRM-Free β–ͺ️
▫️ Multi-format ▫️
?
20:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” AT&T bails on RSA: How the coronavirus is disrupting tech conferences worldwide πŸ”

RSA, MWC and Facebook are the latest tech trade shows impacted by the Novel Coronavirus (COVID-19). Here's what you need to know.

πŸ“– Read

via "Security on TechRepublic".
21 February 2020
?
07:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Washington state Senate passes bill to rein in facial recognition ⚠

The bill now goes to the House, which has a stiffer competing bill pending that would call for a 3.5 year moratorium.

πŸ“– Read

via "Naked Security".
07:37
⚠ Adobe fixes critical flaws in Media Encoder and After Effects ⚠

After fixing a pile of critical security flaws as part of last week’s Patch Tuesday, Adobe has raised two more needing urgent attention.

πŸ“– Read

via "Naked Security".
?
08:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Haken Malware Family Infests Google Play Store ❌

Eight apps - mostly camera utilities and children's games - were discovered spreading a new malware strain that steals data and signs victims up for expensive premium services.

πŸ“– Read

via "Threatpost".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Data of 10.6m MGM hotel guests posted for sale on Dark Web forum ⚠

The data dump apparently included PII for Justin Bieber and Jack Dorsey.

πŸ“– Read

via "Naked Security".
?
10:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Now Merges With Dark Reading πŸ•΄

Readers of Security Now will join the Dark Reading community, gaining access to a wide range of cybersecurity content.

πŸ“– Read

via "Dark Reading: ".
10:07
⚠ US and UK call out Russian hackers for Georgia attacks ⚠

The US and UK governments have both accused Russia of launching a cyber attack against the Georgian government last year.

πŸ“– Read

via "Naked Security".
?
10:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Larry Tesler, of copy-and-paste fame, dies at 74 ⚠

Larry Tesler, the computing pioneer who insisted that user interfaces should be both comfortable *and* consistent, has died aged 74.

πŸ“– Read

via "Naked Security".
?
10:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ISS World Hit with Malware Attack that Shuts Down Global Computer Network ❌

The incident cut off access to e-mail and shared IT services across customer sites of the multinational Denmark-based facility-management firm.

πŸ“– Read

via "Threatpost".
?
11:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep27: Bluetooth holes, dodgy Chrome extensions and forgotten passwords – Naked Security Podcast ⚠

New episode - listen now!

πŸ“– Read

via "Naked Security".
?
12:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Get CISOs & Boards on the Same Page πŸ•΄

These two groups have talked past each other for years, each hobbled by their own tunnel vision and misperceptions.

πŸ“– Read

via "Dark Reading: ".
?
12:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Compliance: Veritas tool adds intelligence and analysis to data supervision πŸ”

A new release leverages machine learning to help companies reduce the search time they need to remain compliant in regulated industries.

πŸ“– Read

via "Security on TechRepublic".
?
13:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 11 things you might not know about security operations center burnout πŸ”

Managers and industry leaders are beginning to address mental health in the IT world - and here are symptoms to look for and solutions to try.

πŸ“– Read

via "Security on TechRepublic".
?
14:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Olympics Could Face Disruption from Regional Powers πŸ•΄

Destructive attacks and disinformation will likely target the Summer Olympics in Tokyo, two groups of threat experts say.

πŸ“– Read

via "Dark Reading: ".
14:05
πŸ•΄ NRC Health Ransomware Attack Prompts Patient Data Concerns πŸ•΄

The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed.

πŸ“– Read

via "Dark Reading: ".
?
14:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-4088

Kernel/Modules/AgentTicketWatcher.pm in Open Ticket Request System (OTRS) 3.0.x before 3.0.21, 3.1.x before 3.1.17, and 3.2.x before 3.2.8 does not properly restrict tickets, which allows remote attackers with a valid agent login to read restricted tickets via a crafted URL involving the ticket split mechanism.

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2013-3551

Kernel/Modules/AgentTicketPhone.pm in Open Ticket Request System (OTRS) 3.0.x before 3.0.20, 3.1.x before 3.1.16, and 3.2.x before 3.2.7, and OTRS ITSM 3.0.x before 3.0.8, 3.1.x before 3.1.9, and 3.2.x before 3.2.5 does not properly restrict tickets, which allows remote attackers with a valid agent login to read restricted tickets via a crafted URL involving the ticket split mechanism.

πŸ“– Read

via "National Vulnerability Database".
14:52
ATENTIONβ€Ό New - CVE-2012-0063

Insecure plugin update mechanism in tucan through 0.3.10 could allow remote attackers to perform man-in-the-middle attacks and execute arbitrary code ith the permissions of the user running tucan.

πŸ“– Read

via "National Vulnerability Database".
14:52
❌ Burning Man Tickets for $225? Yep, Too Good to Be True ❌

Scammers are posing as event organizers in a sophisticated fraud effort.

πŸ“– Read

via "Threatpost".
14:52
❌ RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes ❌

From data privacy to industrial IoT cybersecurity concerns, Threatpost editors discuss the top stories they expect to see at this year's RSA Conference, which kicks off next week in San Francisco.

πŸ“– Read

via "Threatpost".
15:07
⚠ The Amazon Prime phishing attack that wasn’t… ⚠

When we followed the phishing trail, we found ourselves at a web page we weren't expecting...

πŸ“– Read

via "Naked Security".
?
15:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 2/21 Edition πŸ”

Chinese hackers breach online gambling sites, CISA warns of ransomware attacks across the critical infrastructure sector, and more - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ California Man Arrested for Politically Motivated DDoS πŸ•΄

The distributed denial-of-service attacks took a congressional candidate's website offline for a total of 21 hours during the campaign for office.

πŸ“– Read

via "Dark Reading: ".
16:37
πŸ” 70% of IT leaders say security concerns restrict adoption of public cloud πŸ”

While the concerns are legitimate, Barracuda also wants IT professionals to know that practical solutions exist.

πŸ“– Read

via "Security on TechRepublic".
16:37
πŸ” 92% of Americans would delete an app that sold their personal information πŸ”

Smartphone users don't want government encryption backdoors and would rather read "terms and conditions" than watch the movie "Cats."

πŸ“– Read

via "Security on TechRepublic".
16:52
ATENTIONβ€Ό New - CVE-2013-3587

The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.

πŸ“– Read

via "National Vulnerability Database".
16:52
ATENTIONβ€Ό New - CVE-2012-6277

Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to "a number of underlying issues" in which "some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code."

πŸ“– Read

via "National Vulnerability Database".
16:52
ATENTIONβ€Ό New - CVE-2012-0844

Information-disclosure vulnerability in Netsurf through 2.8 due to a world-readable cookie jar.

πŸ“– Read

via "National Vulnerability Database".
16:52
ATENTIONβ€Ό New - CVE-2012-0828

Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).

πŸ“– Read

via "National Vulnerability Database".
?
17:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” MGM Hotel breach highlights need for sophisticated cloud security πŸ”

Cybercriminals posted the information of more than 10 million customers on a hacker forum a year after the initial attack on a cloud server.

πŸ“– Read

via "Security on TechRepublic".
17:52
❌ Active Attacks Target Popular Duplicator WordPress Plugin ❌

When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then.

πŸ“– Read

via "Threatpost".
?
18:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5 best practices for IIoT project success πŸ”

Based on years of pilot projects and proofs-of-concept, the Industrial Internet Consortium has detailed the best-practices organizations can use to ensure successful deployments.

πŸ“– Read

via "Security on TechRepublic".
18:22
❌ Lawsuit Claims Google Collects Minors’ Locations, Browsing History ❌

A new lawsuit alleges that Google’s G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.

πŸ“– Read

via "Threatpost".
?
18:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-1093

The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.

πŸ“– Read

via "National Vulnerability Database".
19:05
πŸ•΄ Emotet Malware Rears Its Ugly Head Again πŸ•΄

A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.

πŸ“– Read

via "Dark Reading: ".
22 February 2020
?
07:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ All About SASE: What It Is, Why It's Here, How to Use It πŸ•΄

Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments.

πŸ“– Read

via "Dark Reading: ".
24 February 2020
?
07:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Wapiti Web Application Vulnerability Scanner 3.0.3 πŸ› 

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
07:22
⚠ Monday review – the hot 25 stories of the week ⚠

From malware attacks to malicious browser extensions - and everything in between. It's your weekly security roundup.

πŸ“– Read

via "Naked Security".
?
08:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple chops Safari’s TLS certificate validity down to one year ⚠

From 1 September 2020, Safari will no longer trust SSL/TLS certificates with more than a year on the clock.

πŸ“– Read

via "Naked Security".
?
09:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Tips to Improve Your Employees' Mobile Security πŸ•΄

Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.

πŸ“– Read

via "Dark Reading: ".
09:24
πŸ•΅ Major vulnerabilities found in top free VPN apps on Google Play store πŸ•΅


πŸ“– Read

via "VPNpro".
?
09:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google purges 600 Android apps for β€œdisruptive” pop-up ads ⚠

These apps plunk ads in front of us when we're trying to do something else, often leading to inadvertent ad clicks and much cursing.

πŸ“– Read

via "Naked Security".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 16 best practices for improving cybersecurity πŸ”

Cisco's 2020 CISO Benchmark Study links a robust patch policy and collaboration to smaller data breaches.

πŸ“– Read

via "Security on TechRepublic".
10:17
πŸ” The good, the bad, and the scary from Experian's data breach report πŸ”

Many security teams don't update response plans on a regular basis but complying with GDPR is getting easier.

πŸ“– Read

via "Security on TechRepublic".
10:17
πŸ” Three things CISOs need to do differently in 2020 πŸ”

Security leaders need to connect their work to broader business goals and create a culture of learning to attract talent.

πŸ“– Read

via "Security on TechRepublic".
?
10:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ KidsGuard stalkerware leaks data on secretly surveilled victims ⚠

The company left a server open and unprotected, regurgitating private data slurped from thousands of surveilled people, including children.

πŸ“– Read

via "Naked Security".
11:04
❌ Data Breach Occurs at Agency in Charge of Secure White House Communications ❌

A leak at the Defense Information Systems Agency exposed personal information of government employees, including social security numbers.

πŸ“– Read

via "Threatpost".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is Cyber Insurance? πŸ”

What is cyber insurance? Get a definition, learn why it's important, how it works, best practices, and more in this week's Data Protection 101, our series on the fundamentals of information security

πŸ“– Read

via "Subscriber Blog RSS Feed ".
11:40
πŸ•΄ Latest Security News from RSAC 2020 πŸ•΄

Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2020 in San Francisco.

πŸ“– Read

via "Dark Reading: ".
?
12:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Summer Olympics is ripe for cyberattacks πŸ”

Criminals will exploit the confusion and hustle and bustle of the games to their advantage, according to security researcher.

πŸ“– Read

via "Security on TechRepublic".
?
12:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Solving the Cloud Data Security Conundrum πŸ•΄

Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.

πŸ“– Read

via "Dark Reading: ".
?
15:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Enterprise Cloud Use Continues to Outpace Security πŸ•΄

Nearly 60% of IT and security pros say deployment of business services in the cloud has rushed past their ability to secure them.

πŸ“– Read

via "Dark Reading: ".
15:10
πŸ•΄ SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps πŸ•΄

Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you.

πŸ“– Read

via "Dark Reading: ".
15:17
πŸ” Financial services companies are ahead in hybrid cloud deployments πŸ”

But 73% of financial companies are moving applications off the cloud and back on premises.

πŸ“– Read

via "Security on TechRepublic".
?
15:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Google reveals new cloud security features at RSA 2020 πŸ”

Google's reCAPTCHA Enterprise and Web Risk API get a general release; Chronicle Security gets boosts from new threat detection and timelining features.

πŸ“– Read

via "Security on TechRepublic".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-0785

Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."

πŸ“– Read

via "National Vulnerability Database".
?
17:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 3D map shows how the coronavirus is spreading worldwide πŸ”

A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.

πŸ“– Read

via "Security on TechRepublic".
?
19:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Takes Heat Over β€˜Vulnerable’ iOS Cut-and-Paste Data ❌

Software developer builds a malicious proof-of-concept iOS app that can read data temporarily saved to the device’s clipboard.

πŸ“– Read

via "Threatpost".
?
20:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
?
πŸ›‘ Cybersecurity & Privacy news πŸ›‘ 20.02.2020 13:23:44
πŸ€ͺπŸ’Έ SPECIAL OFFER! πŸ’ΈπŸ€ͺ

 CYBERSECURITY 2020 by WILEY 😈

β˜‘οΈ Secure yourself a new bundle of cybersecurity ebooks! Get ebooks like Cryptography Engineering: Design Principles and Practical Applications, Reversing: Secrets of Reverse Engineering, Social Engineering: The Science of Human Hacking, and more.

β–ͺ️ $959 Worth of awesome ebooks & videos β–ͺ️
▫️ Pay $1 or more ▫️
β–ͺ️ DRM-Free β–ͺ️
▫️ Multi-format ▫️
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security, Networking Collaboration Cuts Breach Cost πŸ•΄

CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.

πŸ“– Read

via "Dark Reading: ".
25 February 2020
?
03:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Smishing, data theft by directors, and a new mental health focus πŸ”

Security researchers and practitioners will be talking about a surge in SMS-based phishing attacks, the threat employees pose to data security, and how to improve health and wellness on security team members.

πŸ“– Read

via "Security on TechRepublic".
?
04:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Verizon: Attacks on Mobile Devices Rise πŸ•΄

Companies of all sizes are being hit by mobile attacks and feeling the effects for extended periods of time, according to the 2020 Verizon Mobile Security Index.

πŸ“– Read

via "Dark Reading: ".
04:09
πŸ•΄ Wanted: Hands-On Cybersecurity Experience πŸ•΄

Organizations lament a lack of qualified job candidates as they continue to struggle to hire and retain security teams, the new ISACA State of Cybersecurity 2020 report shows.

πŸ“– Read

via "Dark Reading: ".
?
06:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ How to watch Studio Ghibli movies on Netflix πŸ•΅


πŸ“– Read

via "VPNpro".
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google denies illegally slurping data off free student Chromebooks ⚠

Nonsense! says Google in response to a lawsuit filed by New Mexico's AG, which accuses Google of violating COPPA's child privacy laws.

πŸ“– Read

via "Naked Security".
?
09:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Smart speakers mistakenly eavesdrop up to 19 times a day ⚠

That smart home speaker isn't listening to everything you say, according to new research - but it is listening a lot more than it should.

πŸ“– Read

via "Naked Security".
?
10:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ 2020 ICC T20 World Cup live streaming: how to watch online πŸ•΅


πŸ“– Read

via "VPNpro".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ The β€œCloud Snooper” malware that sneaks into your Linux servers ⚠

Fascinating research from SophosLabs into a wolf-in-sheep's-clothing malware sample.

πŸ“– Read

via "Naked Security".
11:11
❌ Free Download: The Ultimate Security Pros’ Checklist ❌

The Ultimate Security Pros’ Checklist fully maps the core duties of common security positions, from the core technical security aspect to team management and executive reporting.

πŸ“– Read

via "Threatpost".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work ❌

The Department of Homeland Security and two U.S. military branches already had discontinued use of the app based on concerns over Chinese data-security and censorship practices.

πŸ“– Read

via "Threatpost".
12:09
πŸ•΄ McAfee Acquires Light Point for Browser Isolation Tech πŸ•΄

Company plans to integrate Light Point Security's technology into the McAfee Secure Web Gateway and its Mvision UCE platform.

πŸ“– Read

via "Dark Reading: ".
12:09
πŸ•΄ Cybersecurity Industry: It's Time to Stop the Victim Blame Game πŸ•΄

There are far more ways to be helpful than adding to the noise of what a company probably did wrong.

πŸ“– Read

via "Dark Reading: ".
12:09
πŸ•΄ Wendy Nather on How to Make Security 'Democratization' a Reality πŸ•΄

Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users, and start sharing control with them.

πŸ“– Read

via "Dark Reading: ".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” McAfee will acquire Light Point Security to help combat browser-based malware πŸ”

The acquisition will allow McAfee to integrate browser isolation technology into its Secure Web Gateway product and MVISION Unified Cloud Edge platform.

πŸ“– Read

via "Security on TechRepublic".
?
12:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Falco 0.20.0 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:44
πŸ›  WhatWeb Scanner 0.5.1 πŸ› 

WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:58
πŸ” Why 40% of privacy compliance tech will rely on AI by 2023 πŸ”

The rise of regulations like GDPR have launched personal data security into the spotlight, and artificial intelligence is here to help.

πŸ“– Read

via "Security on TechRepublic".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Digital Guardian Unveils New Managed Detection and Response Service πŸ”

Digital Guardian is pleased to share that effective today, we've launched a new Managed Detection & Response (MDR) service to better help customers secure their most sensitive data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google stops indexing WhatsApp chats; other search engines still at it ⚠

Private chat invites aren't meant to be unfindable, Facebook says, though a snippet of code eventually shielded them from Google indexing.

πŸ“– Read

via "Naked Security".
15:06
⚠ Android 11 to clamp down on background location access ⚠

Is Android finally about to get on top of the issue of apps that quietly suck up location data?

πŸ“– Read

via "Naked Security".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to hack an election without touching a voting machine πŸ”

In a RSA 2020 simulation, the Red Team compromised email accounts, deepfake videos, and disinformation on Election Day in Adversaria.

πŸ“– Read

via "Security on TechRepublic".
15:34
❌ RSAC 2020 Keynote: Changing the World’s False Perception of Cybersecurity ❌

The reality of the cybersecurity industry is starkly different than what's perceived by the rest of the world.

πŸ“– Read

via "Threatpost".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Adds More Security Features Via Chronicle Division πŸ•΄

Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform.

πŸ“– Read

via "Dark Reading: ".
16:09
πŸ•΄ Ensure Your Cloud Security Is as Modern as Your Business πŸ•΄

Take a comprehensive approach to better protect your organization. Security hygiene is a must, but also look at your risk posture through a data protection lens.

πŸ“– Read

via "Dark Reading: ".
16:13
❌ Google Patches Chrome Browser Zero-Day Bug, Under Attack ❌

Google patches zero-day bug tied to memory corruptions found inside the Chrome browser's open-source JavaScript and Web Assembly engine, called V8.

πŸ“– Read

via "Threatpost".
?
16:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” RSA president: Hackers have broken into our brains and created the wrong security story πŸ”

Security professionals need to stop being snobs to solve the talent gap and improve problem-solving skills.

πŸ“– Read

via "Security on TechRepublic".
?
18:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ RSAC 2020: Blockchain is β€˜Garbage In’, Voting Needs Paper Ballots ❌

The annual cryptographer's panel took on issues of privacy and how new crypto-technologies apply to it in today's digital world.

πŸ“– Read

via "Threatpost".
?
18:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-0565

NaCl in 2015 allowed the CLFLUSH instruction, making rowhammer attacks possible.

πŸ“– Read

via "National Vulnerability Database".
18:36
⚠ Mystery zero-day in Chrome – update now! ⚠

When a bug's a zero-day that means it's being actively exploited. So don't delay, just patch today!

πŸ“– Read

via "Naked Security".
?
18:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Bitcoin ATMs: Security, demographics, transaction fees, and other details πŸ”

Coinsource now offers ATMs that customers can use to manage their Bitcoin.

πŸ“– Read

via "Security on TechRepublic".