25 February 2020
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ KnowBe4 At BlackHat πŸ•΄

KnowBe4 at BlackHat

πŸ“– Read

via "Dark Reading: ".
?
19:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create a Linux user that cannot log in πŸ”

For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
19:39
πŸ•΄ Report: Shadow IoT Emerging as New Enterprise Security Problem πŸ•΄

Much of the traffic egressing enterprise networks are from poorly protected Internet-connected consumer devices, a Zscaler study finds.

πŸ“– Read

via "Dark Reading: ".
?
20:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
26 February 2020
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Taking a GPS tracker off your car isn’t β€˜theft,’ court rules ⚠

This line of thinking could get absurd, Indiana's supreme court declared. How do you "steal" something if you don't know who owns it?

πŸ“– Read

via "Naked Security".
08:36
⚠ Switch to Signal for encrypted messaging, EC tells staff ⚠

Formerly preferred diplomatic app WhatsApp apparently isn't up to snuff.

πŸ“– Read

via "Naked Security".
?
10:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Stalkerware Attacks Increased 50 Percent Last Year, Report ❌

Research puts the emerging mobile threatβ€”which monitors the whereabouts and device activity of devices users as well as collects personal dataβ€”into clearer focus.

πŸ“– Read

via "Threatpost".
?
10:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ How to change Netflix region πŸ•΅


πŸ“– Read

via "VPNpro".
10:39
πŸ•΄ Cryptographers Panel Tackles Espionage, Elections & Blockchain πŸ•΄

Encryption experts gave insights into the Crypto AG revelations, delved into complexities of the "right to be forgotten," and more at RSA Conference.

πŸ“– Read

via "Dark Reading: ".
10:39
πŸ•΄ Emotet Resurfaces to Drive 145% of Threats in Q4 2019 πŸ•΄

Analysis of 92 billion rejected emails reveals a range of simple and complex attack techniques for the last quarter of 2019.

πŸ“– Read

via "Dark Reading: ".
?
11:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Unpatched Security Flaws Open Connected Vacuum to Takeover ❌

A connected, robotic vacuum cleaner has serious vulnerabilities that could allow remote hackers to view its video footage and launch denial of service attacks.

πŸ“– Read

via "Threatpost".
11:11
❌ Iranian APT Targets Govs With New Malware ❌

A new campaign is targeting governments with the ForeLord malware, which steals credentials.

πŸ“– Read

via "Threatpost".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Ways to Up Your Threat Management Game πŸ•΄

Good security programs start with a mindset that it's not about the tools, it's what you do with them. Here's how to get out of a reactive fire-drill mode with vulnerability management.

πŸ“– Read

via "Dark Reading: ".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Kr00k Wi-Fi Vulnerability Affected a Billion Devices πŸ•΄

Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.

πŸ“– Read

via "Dark Reading: ".
?
13:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ LTE vulnerability allows impersonation of other mobile devices ⚠

Researchers have found a way to impersonate mobile devices on 4G and 5G mobile networks, and are calling on operators and standards bodies to fix the flaw that caused it.

πŸ“– Read

via "Naked Security".
13:36
⚠ Apple’s iOS pasteboard leaks location data to spy apps ⚠

A developer has discovered that malicious apps could exploit the pasteboard to work out a user’s location.

πŸ“– Read

via "Naked Security".
?
14:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Open Cybersecurity Alliance Releases New Language for Security Integration πŸ•΄

OpenDXL Ontology is intended to allow security components to interoperate right out of the box.

πŸ“– Read

via "Dark Reading: ".
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hackers Cashing In On Healthcare Industry Security Weaknesses ❌

Between ransomware attacks on healthcare devices, malware-laced β€œmedical” apps, and fraud services available on the dark net, attackers are pushing the boundaries on targeting healthcare.

πŸ“– Read

via "Threatpost".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Next-Gen SOC Is On Its Way and Here's What It Should Contain πŸ•΄

The next-gen-SOC starts with the next-gen SIEM, and Jason Mical of Devo Technology and Kevin Golas from OpenText talk about what capabilities are required, including threat hunting and greater automation, and how security professionals should exploit the tools.

πŸ“– Read

via "Dark Reading: ".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Commonsense Security: Leveraging Dialogue & Collaboration for Better Decisions πŸ•΄

Sometimes, good old-fashioned tools can help an enterprise create a cost-effective risk management strategy.

πŸ“– Read

via "Dark Reading: ".
16:39
πŸ•΄ How to Prevent an AWS Cloud Bucket Data Leak πŸ•΄

Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.

πŸ“– Read

via "Dark Reading: ".
?
16:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-17032

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:58
ATENTIONβ€Ό New - CVE-2019-17031

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:58
ATENTIONβ€Ό New - CVE-2019-17030

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:58
ATENTIONβ€Ό New - CVE-2019-17029

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:58
ATENTIONβ€Ό New - CVE-2019-17028

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:58
ATENTIONβ€Ό New - CVE-2019-17027

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
17:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Elastic Security Makes Case For Blending 'Human Element,' Election Security πŸ•΄

Nate Fick, general manager of Elastic and former CEO of Endgame, talks about the impact of AI and machine learning on security professionals, and how what technologies can be tapped to improve security in the runup to November's election.

πŸ“– Read

via "Dark Reading: ".
?
18:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” RSA: What it's like to attend the first tech conference after the coronavirus epidemic πŸ”

San Francisco is the site of the RSA 2020 conference, which took place despite cancellations from IBM, Verizon and AT&T.

πŸ“– Read

via "Security on TechRepublic".
18:39
πŸ•΄ Sophos Boosts Threat Hunting, Managed Detection and Response Capabilities πŸ•΄

JJ Thompson, senior director of managed threat response for Sophos digs deep into how organizations can start to make sense of the seemingly unlimited data that's available from endpoints, cloud, and on-premises networks. And that's a critical capability as attacker behaviors start to change.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US State Dept. Shares Insider Tips to Fight Insider Threats πŸ•΄

The insider threat is a technology, security, and personnel issue, officials said in explaining an approach that addresses all three factors.

πŸ“– Read

via "Dark Reading: ".
?
19:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Should I Answer a Nontech Exec Who Asks, 'How Secure Are We?' πŸ•΄

Consider this your opportunity to educate.

πŸ“– Read

via "Dark Reading: ".
19:42
❌ RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks ❌

When it comes to machine learning, research and cybercriminal activity is full speed ahead - but legal policy has not yet caught up.

πŸ“– Read

via "Threatpost".
?
20:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Tufin: How to Make Better Sense of the Cloud Security Equation πŸ•΄

CEO Reuven Harrison examines how cloud services have changed how enterprises manage their apps and data, and also offers some tips for security pros tasked with managing either hybrid- or multi-cloud implementations. Harrison also takes on Kubernetes and container security in this News Desk interview.

πŸ“– Read

via "Dark Reading: ".
20:19
πŸ” Digital Guardian Wins Best Data Loss Prevention (DLP) Solution at SC Awards 2020! πŸ”

We're thrilled to share that Digital Guardian won the Best Data Loss Prevention (DLP) Solution at the 2020 SC Trust Awards at RSA Conference!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
27 February 2020
?
01:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers ❌

A popular baby monitor has been found riddled with vulnerabilities that give attackers full access to personal information and sensitive video footage.

πŸ“– Read

via "Threatpost".
01:34
❌ Billions of Devices Open to Wi-Fi Eavesdropping Attacks ❌

The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.

πŸ“– Read

via "Threatpost".
?
03:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Cloud Snooper' Attack Circumvents AWS Firewall Controls πŸ•΄

Possible nation-state supply chain attack acts like a "wolf in sheep's clothing," Sophos says.

πŸ“– Read

via "Dark Reading: ".
?
03:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-12882

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
03:58
ATENTIONβ€Ό New - CVE-2018-19668

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-17963. Reason: This candidate is a reservation duplicate of CVE-2018-17963. Notes: All CVE users should reference CVE-2018-17963 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
03:58
ATENTIONβ€Ό New - CVE-2017-6371

Synchronet BBS 3.16c for Windows allows remote attackers to cause a denial of service (service crash) via a long string in the HTTP Referer header.

πŸ“– Read

via "National Vulnerability Database".
03:58
ATENTIONβ€Ό New - CVE-2017-6363

** DISPUTED ** In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'"

πŸ“– Read

via "National Vulnerability Database".
03:58
ATENTIONβ€Ό New - CVE-2017-5861

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-1000020. Reason: This candidate is a reservation duplicate of CVE-2017-1000020. Notes: All CVE users should reference CVE-2017-1000020 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
03:58
ATENTIONβ€Ό New - CVE-2015-5686

Parts of the Puppet Enterprise Console 3.x were found to be susceptible to clickjacking and CSRF (Cross-Site Request Forgery) attacks. This would allow an attacker to redirect user input to an untrusted site or hijack a user session.

πŸ“– Read

via "National Vulnerability Database".
?
08:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook bans coronavirus β€˜miracle cure’ ads ⚠

Facebook, like other platforms, has seen fake news, mass-buying of face masks, and misinformation about bleach being a cure for COVID-19.

πŸ“– Read

via "Naked Security".
?
08:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why city and state governments may be unprepared for ransomware attacks πŸ”

Despite the rise in ransomware, a lack of prevention training and stagnant security budgets are putting local governments at risk, according to IBM Security.

πŸ“– Read

via "Security on TechRepublic".
08:36
⚠ Chrome 80 encryption change blocks AZORult password stealer ⚠

Evidence is emerging that a change made to Chrome 80 might have disrupted the popular data and user profile stealing malware AZORult.

πŸ“– Read

via "Naked Security".
08:36
⚠ Brave beats other browsers in privacy study ⚠

Users looking for a privacy-focused browser might want to consider Brave first, according to a study published this week.

πŸ“– Read

via "Naked Security".
?
10:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep28: Stalkerware, when cybercrooks return, and phishing gone wild – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ IoT Insecurity: When Your Vacuum Turns on You ❌

From vacuum cleaners to baby monitors, the IoT landscape continues to be plagued by concerning security issues that lead to privacy threats.

πŸ“– Read

via "Threatpost".
12:06
⚠ Slickwraps data breach earns scorn for all ⚠

The breach earned derision from both the hacker and observers after another hacker exploited the company's vulnerable setup.

πŸ“– Read

via "Naked Security".
12:09
πŸ•΄ What Your Company Needs to Know About Hardware Supply Chain Security πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How cybercriminals target organizations with new and old security threats πŸ”

Spam, ransomware, and malware continue to haunt organizations, but bad actors are also cooking up new spins on these tried-and-true methods, according to security company Fortinet.

πŸ“– Read

via "Security on TechRepublic".
12:28
πŸ” UK company takes retro approach to security πŸ”

Garrison wants to move security away from software and into hardware

πŸ“– Read

via "Security on TechRepublic".
12:36
⚠ How one man could have flooded your phone with Microsoft spam ⚠

What a difference one tiny little character can make to a phone number.

πŸ“– Read

via "Naked Security".
?
12:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cloud misconfigurations are a new risk for the enterprise πŸ”

Cybersecurity is an imperfect science, similar to infectious disease control, according to McAfee CTO.

πŸ“– Read

via "Security on TechRepublic".
?
15:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Intel Analyzes Vulns Reported in its Products Last Year πŸ•΄

A new Intel report looks at the more than 250 CVEs affecting Intel products in 2019.

πŸ“– Read

via "Dark Reading: ".
?
15:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to make high security standards a competitive advantage πŸ”

Security firm specializes in secure cloud architecture and penetration testing.

πŸ“– Read

via "Security on TechRepublic".
15:58
πŸ” RSA Red Team exercise highlights election threats from deepfakes and fake news πŸ”

In a RSA 2020 simulation, the Red Team compromised email accounts, created deepfake videos and spread disinformation on Election Day in Adversaria.

πŸ“– Read

via "Security on TechRepublic".
15:58
πŸ” Egress mail security platform aims to stop insider breaches πŸ”

Machine learning creates a profile of expected email contacts and turns on a stop sign when new people pop up.

πŸ“– Read

via "Security on TechRepublic".
16:09
πŸ•΄ How We Enabled Ransomware to Become a Multibillion-Dollar Industry πŸ•΄

As an industry, we must move beyond one-dimensional approaches to assessing ransomware exposures. Asking these four questions will help.

πŸ“– Read

via "Dark Reading: ".
?
16:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-16900

Incorrect Access Control in Hunesion i-oneNet 3.0.6042.1200 allows the local user to access other user's information which is unauthorized via brute force.

πŸ“– Read

via "National Vulnerability Database".
16:28
ATENTIONβ€Ό New - CVE-2015-2992

Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
17:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Intangibles of CCPA 2.0 Loom Over RSA Privacy Talks πŸ”

Th California Consumer Privacy Act is nebulous as it is. Potential changes to the state's privacy laws, slated for later this year, could cloud things further.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:28
πŸ” After DISA breach, experts say US agencies must stop lateral movement of hackers πŸ”

Attackers shouldn't have been able to remove sensitive data like Social Security numbers from military networks, according to cybersecurity experts.

πŸ“– Read

via "Security on TechRepublic".
?
18:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Open Cybersecurity Alliance looks for new members and new projects at RSA 2020 πŸ”

New standards project aims to make it easy to integrate multiple security tools.

πŸ“– Read

via "Security on TechRepublic".
19:09
πŸ•΄ Tense Talk About Supply Chain Risk Yields Few Answers πŸ•΄

RSA panelists locked horns over whether the ban preventing US government agencies from doing business with Huawei is unfairly singling out the Chinese telecom giant.

πŸ“– Read

via "Dark Reading: ".
19:11
❌ RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity ❌

CEO Mary T. Barra addressed the high stakes in rolling out self-driving cars and biometric-enhanced vehicles, where one cyber-event could derail plans for emerging automotive technologies.

πŸ“– Read

via "Threatpost".
?
20:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Government Employees Unprepared for Ransomware πŸ•΄

Data shows 73% are concerned about municipal ransomware threats but only 38% are trained on preventing these attacks.

πŸ“– Read

via "Dark Reading: ".
?
20:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-8878

Information disclosure in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to acquire information on internal network devices' hostnames and MAC addresses by reading the custom_id variable on the blocking.asp page.

πŸ“– Read

via "National Vulnerability Database".
20:28
ATENTIONβ€Ό New - CVE-2018-8877

Information disclosure in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to acquire information on internal network IP address ranges by reading the new_lan_ip variable on the error_page.htm page.

πŸ“– Read

via "National Vulnerability Database".
20:38
❌ Google’s War on Android App Permissions, 60 Percent Successful ❌

An automated Google warning to Android app developers regarding mobile app permissions has cut the number of requests in half.

πŸ“– Read

via "Threatpost".
?
22:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Clearview AI Customers Exposed in Data Breach πŸ•΄

Customers for the controversial facial recognition company were detailed in a log file leaked to news organizations.

πŸ“– Read

via "Dark Reading: ".
28 February 2020
?
05:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  I2P 0.9.45 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
05:22
πŸ›  Samhain File Integrity Checker 4.4.1 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
05:22
πŸ›  Zeek 3.1.0 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
05:22
πŸ›  Wireshark Analyzer 3.2.2 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
07:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google has right to censor conservative nonprofit on YouTube ⚠

It's not a "state actor", so isn't subject to 1st Amendment scrutiny and can censor PragerU's videos on abortion, gun rights and terrorism.

πŸ“– Read

via "Naked Security".
?
08:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox rolling out DNS-over-HTTPS privacy by default in the US ⚠

Mozilla has said it plans to make a privacy technology called DNS-over-HTTPS (DoH) the default setting for US users of Firefox within weeks.

πŸ“– Read

via "Naked Security".
?
09:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware wipes evidence, lets suspected drug dealers walk free ⚠

Six alleged drug criminals will go free thanks to a ransomware attack on a small Florida city, it was revealed this month.

πŸ“– Read

via "Naked Security".
09:21
⚠ Clearview AI loses entire database of faceprint-buying clients to hackers ⚠

Time to worry about how well the facial recognition startup protects its 3b+ database of faceprints scraped from our social media accounts?

πŸ“– Read

via "Naked Security".
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ How to unblock social media in Turkey with a VPN πŸ•΅


πŸ“– Read

via "VPNpro".
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Educating Educators: Microsoft's Tips for Security Awareness Training πŸ•΄

Microsoft's director of security education and awareness shares his approach to helping train employees in defensive practices.

πŸ“– Read

via "Dark Reading: ".
?
10:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Patrick Wardle: Apple Devices Hit With Recycled macOS Malware ❌

Patrick Wardle talks about the biggest threats he's seeing impacting Apple devices.

πŸ“– Read

via "Threatpost".
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ RSAC 2020: Ransomware a β€˜National Crisis,’ CISA Says, Ramps ICS Focus ❌

The federal agency plans a slew of initiatives to address industrial control security this year.

πŸ“– Read

via "Threatpost".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Reducing Risk with Data Minimization πŸ•΄

Putting your company on a data diet that reduces the amount of the sensitive data you store or use is a smart way to achieve compliance with GDPR and CCPA.

πŸ“– Read

via "Dark Reading: ".
?
13:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” RSA CTO outlines pitfalls to avoid when operationalizing AI πŸ”

Assembling strong data sets and developing domain expertise are more important than choosing an algorithm.

πŸ“– Read

via "Security on TechRepublic".
?
13:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ State of Cybersecurity Incident Response πŸ•΄

Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.

πŸ“– Read

via "Dark Reading: ".
13:36
πŸ” What is Data Breach Insurance? πŸ”

Learn about data breach insurance, why it's important, how it works, and what to look for in a policy in the latest Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
13:40
πŸ” GM prioritizes cybersecurity with internal training and bug bounties πŸ”

CEO Mary Barra shared the company's commitment to security at RSA 2020.

πŸ“– Read

via "Security on TechRepublic".
?
14:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Exploitation, Phishing Top Worries for Mobile Users πŸ•΄

Reports find that mobile malware appears on the decline, but the exploitation of vulnerabilities along with phishing has led to a rise in compromises, experts say.

πŸ“– Read

via "Dark Reading: ".
14:04
πŸ•΄ 6 Truths About Disinformation Campaigns πŸ•΄

Disinformation goes far beyond just influencing election outcomes. Here's what security pros need to know.

πŸ“– Read

via "Dark Reading: ".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10064

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

πŸ“– Read

via "National Vulnerability Database".
?
15:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
?
16:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Don't be like Bezos: How to keep your phone from being hacked πŸ”

Anyone can be a target of a Jeff Bezos-level data hack. Here's how to keep your phone protected.

πŸ“– Read

via "Security on TechRepublic".
16:40
πŸ” How organizations are misusing firewalls (and what IT teams should do about it) πŸ”

Firewall management doesn't mean set it and forget it. Learn tips for effective firewall configuration to protect your organization from security risks and threats.

πŸ“– Read

via "Security on TechRepublic".
?
17:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bruce Schneier Proposes β€˜Hacking Society’ for a Better Tomorrow ❌

The security industry has the perfect skillset and adversarial defense outlook to deal with some of the emerging societal issues in today's world, said security technologist Bruce Schneier.

πŸ“– Read

via "Threatpost".
?
18:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5 top 5G trends for 2020 πŸ”

This year will be a big investment year for 5G for many manufacturers and network operators. Find out what the experts predict will happen next.

πŸ“– Read

via "Security on TechRepublic".
?
18:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-15609

The kill-port-process package version < 2.2.0 is vulnerable to a Command Injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:40
πŸ” Infosys CISO: Being good at technology is no longer enough πŸ”

Vishal Salvi says investing time and developing influence are the keys to making the shift to a secure-by-design mindset.

πŸ“– Read

via "Security on TechRepublic".
18:40
πŸ” How to install and use the open source OTPClient 2FA tool on Linux πŸ”

If your desktop of choice is Linux, you don't have to be without a 2FA tool, thanks to OTPClient.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Trickbot Delivery Method Focuses on Windows 10 πŸ•΄

Researchers discover attackers abusing the latest version of the remote desktop ActiveX control class introduced for Windows 10.

πŸ“– Read

via "Dark Reading: ".
?
20:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Coronavirus: How hackers are exploiting the epidemic to steal your information πŸ”

Karen Roby interviewed a cybersecurity expert about a different threat than COVID-19 brings.

πŸ“– Read

via "Security on TechRepublic".
?
20:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10805

valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks.

πŸ“– Read

via "National Vulnerability Database".
20:33
ATENTIONβ€Ό New - CVE-2019-10804

serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.

πŸ“– Read

via "National Vulnerability Database".
20:33
ATENTIONβ€Ό New - CVE-2019-10803

push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
20:33
ATENTIONβ€Ό New - CVE-2019-10802

giting version prior to 0.0.8 allows execution of arbritary commands. The first argument "repo" of function "pull()" is executed by the package without any validation.

πŸ“– Read

via "National Vulnerability Database".
20:33
ATENTIONβ€Ό New - CVE-2019-10801

enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization.

πŸ“– Read

via "National Vulnerability Database".
20:33
ATENTIONβ€Ό New - CVE-2018-21035

In Qt through 5.14.1, the WebSocket implementation accepts up to 2GB for frames and 2GB for messages. Smaller limits cannot be configured. This makes it easier for attackers to cause a denial of service (memory consumption).

πŸ“– Read

via "National Vulnerability Database".
20:40
πŸ” Coronavirus: How hackers are exploiting the epidemic to steal your information πŸ”

Karen Roby interviewed an expert about a different threat than COVID-19 brings.

πŸ“– Read

via "Security on TechRepublic".
?
22:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-5361

Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide data channel session (gate) will allow the FTPS client temporary access to all TCP ports on the FTPS server. The data session is associated to the control channel and will be closed when the control channel session closes. Depending on the configuration of the FTPS server, supporting load-balancer, and SRX inactivity-timeout values, the server/load-balancer and SRX may keep the control channel open for an extended period of time, allowing an FTPS client access for an equal duration.Ò€&lsaquo; Note that the ftps-extensions option is not enabled by default.

πŸ“– Read

via "National Vulnerability Database".
22:33
ATENTIONβ€Ό New - CVE-2015-3006

On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
23:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Fraud alert: Voice authentication platform analyzes 1,380 data points per call πŸ”

Pindrop's dashboard scores the caller, the device, and the behavior to spot bad actors and authentic customers.

πŸ“– Read

via "Security on TechRepublic".
29 February 2020
?
08:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
1 March 2020
?
12:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  SerialTweaker 1.1 πŸ› 

SerialTweaker is a tool that can be used to load a serialized object, change its contents, and reserialize it to a new serialized object with modified fields inside.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:47
πŸ›  nfstream 3.2.2 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
2 March 2020
?
03:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-17026

Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.

πŸ“– Read

via "National Vulnerability Database".
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 23 stories of the week ⚠

From Chrome's mystery zero-day to why the EC has switched to Signal, get yourself up to date with everything we've written in the last week.

πŸ“– Read

via "Naked Security".
08:21
πŸ•΅ Dashlane VPN Review πŸ•΅


πŸ“– Read

via "VPNpro".
?
09:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5G and IoT security: Why cybersecurity experts are sounding an alarm πŸ”

Without regulation and strong proactive measures, 5G networks remain vulnerable to cyberattacks, and the responsibility falls on businesses and governments.

πŸ“– Read

via "Security on TechRepublic".
?
09:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook sues data analytics firm OneAudience over malicious SDK ⚠

Facebook says OneAudience paid developers to install its social-media-profile-looting SDK into their apps to get marketing data for clients.

πŸ“– Read

via "Naked Security".
09:41
⚠ Fresh phish! Stripe scam baked and delivered in under an hour ⚠

Less than an hour after the crooks registered their scamming domain, the phishing attack was under way.

πŸ“– Read

via "Naked Security".
09:41
⚠ Ironpie robot vacuum can suck up your privacy ⚠

You might want to unplug this not-so-smart robot: researchers found they can watch video streams piped out from its security camera.

πŸ“– Read

via "Naked Security".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Let’s Encrypt issues one billionth free certificate ⚠

Thanks to this flood of free certificates, the web is a lot more encrypted than it was a few years ago.

πŸ“– Read

via "Naked Security".
?
12:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What Disney+ Can Teach Businesses About Customer Security πŸ•΄

Businesses must prioritize customer protection by taking on some of the responsibility to prevent credential stuffing attacks through multipronged authentication and identity management.

πŸ“– Read

via "Dark Reading: ".
12:53
ATENTIONβ€Ό New - CVE-2018-17058

An issue was discovered in JABA XPress Online Shop through 2018-09-14. It contains an arbitrary file upload vulnerability in the picture-upload feature of ProductEdit.aspx. An authenticated attacker may bypass the frontend filename validation and upload an arbitrary file via FileUploader.aspx.cs in FileUploader.aspx by using empty w and h parameters. This file may contain arbitrary aspx code that may be executed by accessing /Jec/ProductImages/<number>/<filename>. Accessing the file once uploaded does not require authentication.

πŸ“– Read

via "National Vulnerability Database".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Walgreens Mobile App Leaks Prescription Data ❌

A security error in the Walgreens mobile app may have leaked customers' full names, prescriptions and shipping addresses.

πŸ“– Read

via "Threatpost".
13:43
πŸ•΄ Name That Toon: Holy Cow! πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
?
14:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Morphisec is using the Windows 10 transition to help companies boost security πŸ”

Morphisec combines the anti-virus protection in the new Microsoft OS with its own defenses against malware.

πŸ“– Read

via "Security on TechRepublic".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TrickBot Adds ActiveX Control, Hides Dropper in Images ❌

The tricky trojan has evolved again, to stay a step ahead of defenders.

πŸ“– Read

via "Threatpost".
15:13
πŸ•΄ Tesla, SpaceX Parts Manufacturer Suffers Data Breach πŸ•΄

Visser Precision has confirmed a security incident likely caused by the data-stealing DoppelPaymer ransomware.

πŸ“– Read

via "Dark Reading: ".
15:23
ATENTIONβ€Ό New - CVE-2019-12183

Incorrect Access Control in Safescan Timemoto TM-616 and TA-8000 series allows remote attackers to read any file via the administrative API.

πŸ“– Read

via "National Vulnerability Database".
15:23
ATENTIONβ€Ό New - CVE-2017-12580

An issue was discovered in IDM UltraEdit through 24.10.0.32. To exploit the vulnerability, on unpatched Windows systems, an attacker could include in the same directory as the affected executable a DLL using the name of a Windows DLL. This DLL must be preloaded by the executable (for example, "ntmarta.dll"). When the installer EXE is executed by the user, the DLL located in the EXE's current directory will be loaded instead of the Windows DLL, allowing the attacker to run arbitrary code on the affected system.

πŸ“– Read

via "National Vulnerability Database".
15:23
ATENTIONβ€Ό New - CVE-2015-1583

Multiple cross-site request forgery (CSRF) vulnerabilities in ATutor 2.2 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account via a request to mods/_core/users/admins/create.php or (2) create a user account via a request to mods/_core/users/create_user.php.

πŸ“– Read

via "National Vulnerability Database".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ RSAC: Keeping Smart Cities Safe From Hacks ❌

As cities grow more connected, municipal operators must deal with new risks like ransomware, IoT hacks and more.

πŸ“– Read

via "Threatpost".
?
16:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Companies Increasingly Complacent Around Data Breach Preparedness πŸ”

Ponemon Institute's annual data breach readiness survey suggests the increased adoption of security technologies but the continuation of problems, like spear phishing attacks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:53
ATENTIONβ€Ό New - CVE-2019-14892

A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
16:53
ATENTIONβ€Ό New - CVE-2018-14384

The Website Manager module in SEO Panel 3.13.0 and earlier is affected by a stored Cross-Site Scripting (XSS) vulnerability, allowing remote authenticated attackers to inject arbitrary web script or HTML via the websites.php name parameter.

πŸ“– Read

via "National Vulnerability Database".
16:53
ATENTIONβ€Ό New - CVE-2018-11675

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Report: Coronavirus is negatively impacting international call quality πŸ”

When entire regions are quarantined, home-bound people are overloading local switches, reducing international call quality and interrupting connectivity.

πŸ“– Read

via "Security on TechRepublic".
?
17:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
?
18:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Walgreens' Mobile App Exposes Customers' Info πŸ•΄

An error in the app allowed some secure chat users to see medical information that wasn't theirs.

πŸ“– Read

via "Dark Reading: ".
18:53
ATENTIONβ€Ό New - CVE-2018-19658

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:53
ATENTIONβ€Ό New - CVE-2018-19599

Monstra CMS 1.6 allows XSS via an uploaded SVG document to the admin/index.php?id=filesmanager&path=uploads/ URI. NOTE: this is a discontinued product.

πŸ“– Read

via "National Vulnerability Database".
18:53
ATENTIONβ€Ό New - CVE-2018-19284

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:53
ATENTIONβ€Ό New - CVE-2018-18479

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:53
ATENTIONβ€Ό New - CVE-2018-17572

InfluxDB 0.9.5 has Reflected XSS in the Write Data module.

πŸ“– Read

via "National Vulnerability Database".
18:53
ATENTIONβ€Ό New - CVE-2018-16357

An issue was discovered in PbootCMS. There is a SQL injection via the api.php/Cms/search order parameter.

πŸ“– Read

via "National Vulnerability Database".
18:53
ATENTIONβ€Ό New - CVE-2018-16356

An issue was discovered in PbootCMS. There is a SQL injection via the api.php/List/index order parameter.

πŸ“– Read

via "National Vulnerability Database".
18:53
ATENTIONβ€Ό New - CVE-2018-15820

EasyIO EasyIO-30P devices before 2.0.5.27 allow XSS via the dev.htm GDN parameter.

πŸ“– Read

via "National Vulnerability Database".
18:53
ATENTIONβ€Ό New - CVE-2018-15819

EasyIO EasyIO-30P devices before 2.0.5.27 have Incorrect Access Control, related to webuser.js.

πŸ“– Read

via "National Vulnerability Database".
?
19:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Phishing: Leading targets, breaking myths, and educating users πŸ”

Vade Secure's Adrien Gendre explains why the end user is an important link in the security chain.

πŸ“– Read

via "Security on TechRepublic".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Gamer Alert: Serious Nvidia Flaw Plagues Graphics Driver ❌

Several flaws found in Nvidia's graphics drivers could enable denial of service, remote code execution and other malicious attacks.

πŸ“– Read

via "Threatpost".
19:29
❌ NetSupport Manager RAT Spread via Bogus NortonLifeLock Docs ❌

The legitimate remote-access tool is being used to maliciously infect victims and allow remote code-execution.

πŸ“– Read

via "Threatpost".
19:43
πŸ” Phishing: Leading targets, breaking myths, and educating users πŸ”

Vade Secure's Adrien Gendre explains why the end user is an important link in the security chain.

πŸ“– Read

via "Security on TechRepublic".
?
20:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Security Leads at Starbucks and Microsoft Prepare for Breaches πŸ•΄

Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

πŸ“– Read

via "Dark Reading: ".
?
20:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Threat Intelligence Gathering Can Be a Legal Minefield πŸ•΄

In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground online marketplaces.

πŸ“– Read

via "Dark Reading: ".
20:53
ATENTIONβ€Ό New - CVE-2018-5951

An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack.

πŸ“– Read

via "National Vulnerability Database".
20:53
ATENTIONβ€Ό New - CVE-2018-20347

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:53
ATENTIONβ€Ό New - CVE-2018-20343

Multiple buffer overflow vulnerabilities have been found in Ken Silverman Build Engine 1. An attacker could craft a special map file to execute arbitrary code when the map file is loaded.

πŸ“– Read

via "National Vulnerability Database".
20:53
ATENTIONβ€Ό New - CVE-2018-19798

Fleetco Fleet Maintenance Management (FMM) 1.2 and earlier allows uploading an arbitrary ".php" file with the application/x-php Content-Type to the accidents_add.php?submit=1 URI, as demonstrated by the value_Images_1 field, which leads to remote command execution on the remote server. Any authenticated user can exploit this.

πŸ“– Read

via "National Vulnerability Database".
3 March 2020
?
07:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CrowdStrike's 2020 Threat Report: Spammers finetune email thread hijacking πŸ”

Existing controls are often not configured properly or deployed widely, allowing bad actors to steal data.

πŸ“– Read

via "Security on TechRepublic".
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ XSS plugin vulnerabilities plague WordPress users ⚠

Thousands of active WordPress plugins have been hit with a swathe of XSS vulnerabilities that could give attackers complete control of the site.

πŸ“– Read

via "Naked Security".
?
08:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Nvidia patches severe flaws affecting GeForce, Quadro NVS and Tesla ⚠

In all, the update covers five Windows and Linux desktop CVE vulnerabilities, including one rated as critical.

πŸ“– Read

via "Naked Security".
?
09:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DoppelPaymer Ransomware Used to Steal Data from Supplier to SpaceX, Tesla ❌

Cyber attack at Visser Precision, which builds custom parts for the aerospace and automotive industries, reveals sensitive company data.

πŸ“– Read

via "Threatpost".
?
10:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ GoodRx stops sharing personal medical data with Google, Facebook ⚠

The mobile app saves people money but was letting 20 companies know who's taking antipsychotics, erectile dysfunction and HIV meds, and more.

πŸ“– Read

via "Naked Security".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Huge flaw found in how facial features are measured from images ⚠

It has to do with optics: faces appear to flatten out as we get further away. Our brains compensate, but AI-run facial recognition doesn't.

πŸ“– Read

via "Naked Security".
10:43
πŸ•΄ How Security Leaders at Starbucks and Microsoft Prepare for Breaches πŸ•΄

Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

πŸ“– Read

via "Dark Reading: ".
?
11:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Digital piggy bank sevice broken into by cybercrooks ⚠

A financial proivider that gives loans but locks them down to turn them into savings... didn't lock down its own network.

πŸ“– Read

via "Naked Security".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Cybercrime Pandemic Keeps Spreading πŸ•΄

The World Economic Forum says cyberattacks will be one of the top global business risks over the next 10 years.

πŸ“– Read

via "Dark Reading: ".
12:13
πŸ” How to create a Linux user that cannot log in πŸ”

For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
?
13:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Chinese Nationals Charged with Laundering $100M in Cryptocurrency πŸ•΄

The two defendants allegedly laundered $100 million for the benefit of North Korean threat actors who stole the funds in 2018.

πŸ“– Read

via "Dark Reading: ".
13:13
πŸ” Cybercriminals and drug cartels are teaming up to spread malware and steal financial information across Latin America πŸ”

Drug cartels are using cryptocurrency and partnering with hackers to scam banks in Latin American banks.

πŸ“– Read

via "Security on TechRepublic".
13:13
πŸ” Data security: 5 problems and solutions πŸ”

When it comes to securing data, most enterprises are negligent and unaware, according to a Lepide report.

πŸ“– Read

via "Security on TechRepublic".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Have I Been Pwned No Longer For Sale ❌

Troy Hunt said the popular HIBP will continue to be run as an independent service.

πŸ“– Read

via "Threatpost".
?
13:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Golden Frieza πŸ› 

Imagine finding yourself in a "hostile" environment, one where you cannot run exploits, tools, and applications without worrying about prying eyes spying on you, be they a legitimate system administrator, a colleague sharing an access with you or a software solution that scans the machine you are logged in to for malicious files. Your binary should live in encrypted form in the filesystem so that no static analysis would be possible even if identified and copied somewhere else. It should be only decrypted on the fly in memory when executed, so preventing dynamic analysis too, unless the decryption key is known. To experiment with such an idea Red Timmy Sec have created the "golden frieza" project.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Why β€˜free’ Wi-Fi isn’t really free ⚠

How much data is too much to give away to get online while you're waiting at the train station? In the airport? A shopping mall?

πŸ“– Read

via "Naked Security".
15:13
πŸ•΄ Former Microsoft Software Engineer Convicted of Fraud πŸ•΄

The 25-year-old was convicted of 18 charges stemming from illegal access to money stored in online gift cards.

πŸ“– Read

via "Dark Reading: ".
15:13
πŸ•΄ NSS Labs Revises Endpoint Security Test Model πŸ•΄

New product ratings system comes amid growing shift in the testing market toward more "open and transparent" evaluation of security tools.

πŸ“– Read

via "Dark Reading: ".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MediaTek Bug Actively Exploited, Affects Millions of Android Devices ❌

An exploit published by a developer is easy to use and has already been used to build malicious apps that gain root access on Android devices.

πŸ“– Read

via "Threatpost".
16:43
πŸ” 7 security tips for IoT systems πŸ”

Security risks are important considerations with IoT initiatives. A Kaspersky report includes steps to take to prevent an IoT-targeted attack.

πŸ“– Read

via "Security on TechRepublic".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ With New SOL4Ce Lab, Purdue U. and DoE Set Sights on National Security πŸ•΄

The cooperative research initiative brings together faculty and students to "focus on problems and cutting-edge ways to solve them."

πŸ“– Read

via "Dark Reading: ".
17:13
πŸ•΄ Avoiding the Perils of Electronic Communications πŸ•΄

Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That's why an agile communications strategy is so important.

πŸ“– Read

via "Dark Reading: ".
17:21
πŸ” Govt Contractors Allege Air Force Stole IP, Proprietary Data πŸ”

Two contractors claim the U.S. Air Force took their proprietary data and used it to develop, market, and sell their own version of a storage tank used by planes to fight fires.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:29
❌ Let’s Encrypt to Revoke Millions of TLS Certs ❌

On Wednesday millions of Transport Layer Security certificates will be revoked because of a Certificate Authority Authorization bug.

πŸ“– Read

via "Threatpost".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cobalt Ulster Strikes Again With New ForeLord Malware ❌

Threatpost talks to Alex Tilley, senior security researcher with Dell SecureWorks' Counter Threat Unit Research Team, about a recently discovered campaign linked to an Iranian APT.

πŸ“– Read

via "Threatpost".
?
20:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Gotta Patch 'Em All? Not Necessarily, Experts Say πŸ•΄

When it's impossible to remediate all vulnerabilities in an organization, data can indicate which bugs should be prioritized.

πŸ“– Read

via "Dark Reading: ".
4 March 2020
?
02:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Almost half of mobile malware are hidden apps πŸ”

Cybercriminals are finding new ways to get malware on mobile devices, including abusing Android's accessibility features, according to a McAfee report.

πŸ“– Read

via "Security on TechRepublic".
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook purges hundreds of fake accounts from state actors, marketers ⚠

It removed 5 networks engaged in foreign or government interference in Egypt, India, Russia, Iran, and Myanmar/Vietnam. Some targeted the US.

πŸ“– Read

via "Naked Security".
08:11
⚠ Tech support scammers hacked back by vigilante ⚠

A cybercrime vigilante was so incensed by tech support scammers, he reverse-hacked the Indian call centre to spy on his would-be attackers.

πŸ“– Read

via "Naked Security".
?
09:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google fixes MediaTek bug in Android March patches ⚠

There are patches for over 70 bugs, and they finally fixed a months-old exploit for MediaTek chipsets, said to affect millions of devices.

πŸ“– Read

via "Naked Security".
09:11
⚠ NCSC: Secure your webcams now ⚠

We don't want to see what you do behind closed doors, but lots of hackers would be happy to pull up a chair to view that video stream.

πŸ“– Read

via "Naked Security".
09:13
πŸ•΄ 7 Loyalty Program and Rewards App Attacks πŸ•΄

The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights.

πŸ“– Read

via "Dark Reading: ".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 4 essential things security experts do to protect their own data πŸ”

Learn from the experts what it takes to keep hackers away from your personal data.

πŸ“– Read

via "Security on TechRepublic".
?
12:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep29: Facial recognition, malware madness and smart speakers – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
12:41
⚠ Why 3 million Let’s Encrypt certificates are being killed off today ⚠

If your certificate gets revoked and you don't renew it, visitors won't be able to get to your site...

πŸ“– Read

via "Naked Security".
12:43
πŸ•΄ 3 Ways to Strengthen Your Cyber Defenses πŸ•΄

By taking proactive action, organizations can face down threats with greater agility and earned confidence.

πŸ“– Read

via "Dark Reading: ".
?
13:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cathay Pacific Hit with Fine for Long-Lasting Breach πŸ•΄

The breach, which was active for four years, resulted in the theft of personal information on more than 9 million people.

πŸ“– Read

via "Dark Reading: ".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Loyalty Cards Targeted in Tesco Clubcard Attack ❌

Around 600,000 of the supermarket's 12 million loyalty program members have been warned about a cyberattack.

πŸ“– Read

via "Threatpost".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to install and use the open source OTPClient 2FA tool on Linux πŸ”

If your desktop of choice is Linux, you don't have to be without a 2FA tool, thanks to OTPClient.

πŸ“– Read

via "Security on TechRepublic".
14:13
πŸ•΄ The Perfect Travel Security Policy for a Globe-Trotting Laptop πŸ•΄

There are many challenges to safely carrying data and equipment on international travels, but the right policy can make navigating the challenges easier and more successful.

πŸ“– Read

via "Dark Reading: ".
?
14:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” UK company uses cell phone chips to create super secure browsing πŸ”

Garrison is using ARM processor chips to create a hardware defense against data breaches and malware.

πŸ“– Read

via "Security on TechRepublic".
14:43
πŸ•΄ EternalBlue Longevity Underscores Patching Problem πŸ•΄

Three years after the Shadow Brokers published zero-day exploits stolen from the National Security Agency, the SMB compromise continues to be a popular Internet attack.

πŸ“– Read

via "Dark Reading: ".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft OneNote Used To Sidestep Phishing Detection ❌

A recent phishing campaign used OneNote to distribute the Agent Tesla keylogger.

πŸ“– Read

via "Threatpost".
?
15:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Number of spoof attempts on domains drops to "near zero" within months of DMARC enforcement πŸ”

Despite an increase in usage, a Valimail report found that of the 933,000 organizational domains with DMARC, only 13% are at enforcement.

πŸ“– Read

via "Security on TechRepublic".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISOs Who Want a Seat at the DevOps Table Better Bring Value πŸ•΄

Here are four ways to make inroads with the DevOps team -- before it's too late.

πŸ“– Read

via "Dark Reading: ".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Netgear Bug Impacts Flagship Nighthawk Router ❌

Dozens of routers are patched by Netgear as it snuffs out critical, high and medium severity flaws.

πŸ“– Read

via "Threatpost".
?
16:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Lawsuit Alleges Theft of Bridge Security Trade Secrets πŸ”

This armor safety company claims a former employee stole secrets via a USB drive and used them to net a multi-million dollar contract

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” COVID-19: What business pros need to know πŸ”

The coronavirus is spurring questions and concerns in the tech industry. Get tips about remote work, interviewing and hiring, travel, and cybersecurity, as well as the latest news.

πŸ“– Read

via "Security on TechRepublic".
?
18:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to scan your WordPress sites for vulnerabilities πŸ”

How confident are you with the security of your WordPress deployments? If you're not 100% confident, you need to make use of the wpscan tool.

πŸ“– Read

via "Security on TechRepublic".
18:43
πŸ•΄ Most Cyberattacks in 2019 Were Waged Without Malware πŸ•΄

If the "malware-free" attack trajectory continues, it could mean major trouble for defenders, according to experts from CrowdStrike and other security companies.

πŸ“– Read

via "Dark Reading: ".
?
21:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Let's Encrypt Revokes Over 3 Million of Its Digital Certs πŸ•΄

Domain validation glitch prompts an abrupt decision.

πŸ“– Read

via "Dark Reading: ".
5 March 2020
?
06:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Coronavirus warning spreads computer virus ⚠

There's an attachment that you are "strongly recommended to read" on account of coronavirus infections in your area. Don't open it!

πŸ“– Read

via "Naked Security".
?
08:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Zynga faces class action suit over massive Words With Friends hack ⚠

It's charging subpar password security and lousy user notification: Zynga has yet to notify users to warn them of the breach, the suit says.

πŸ“– Read

via "Naked Security".
?
08:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Let’s Encrypt Pushes Back Deadline to Revoke Some TLS Certificates ❌

While 1.7 million of the certificates potentially affected by a CAA bug have already been replaced, around 1 million are still active.

πŸ“– Read

via "Threatpost".
08:43
❌ Trump, Sanders Are the Top Brands for Cybercriminals ❌

An analysis of spam subject lines and malicious domains shows that attackers have been betting on Trump and Sanders to snag public interest.

πŸ“– Read

via "Threatpost".
08:53
⚠ Google launches FuzzBench service to benchmark fuzzing tools ⚠

Google has announced FuzzBench, a free service β€œfor painlessly evaluating fuzzers in a reproducible way.”

πŸ“– Read

via "Naked Security".
08:53
⚠ Ethical hackers swarm Pentagon websites ⚠

Hackers are crawling all over the US Department of Defense's websites - and DoD officials are quite happy about the whole thing.

πŸ“– Read

via "Naked Security".
?
09:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10587

Possible Stack overflow can occur when processing a large SDP body or non standard SDP body without right delimiters in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
09:13
ATENTIONβ€Ό New - CVE-2019-10586

Filling media attribute tag names without validating the destination buffer size which can result in the buffer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
09:13
ATENTIONβ€Ό New - CVE-2019-10577

Improper input validation while processing SIP URI received from the network will lead to buffer over-read and then to denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, Saipan, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:13
ATENTIONβ€Ό New - CVE-2019-10569

Stack buffer overflow due to instance id is misplaced inside definition of hardware accelerated effects in makefile in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, APQ8098, MDM9607, MDM9640, MSM8998, QCS605, SC8180X, SDM439, SDM630, SDM636, SDM660, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
?
10:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10554

Multiple Read overflows issue due to improper length check while decoding Identity Request in CSdomain/Authentication Reject in CS domain/ PRAU accept/while logging DL message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
10:07
ATENTIONβ€Ό New - CVE-2019-10553

Multiple Read overflows due to improper length checks while decoding authentication in Cs domain/RAU Reject and TC cmd in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
10:07
ATENTIONβ€Ό New - CVE-2019-10552

Multiple Buffer Over-read issue can happen due to improper length checks while decoding Service Reject/RAU Reject/PTMSI Realloc cmd in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
10:07
ATENTIONβ€Ό New - CVE-2019-10550

Buffer Over-read when UE is trying to process the message received form the network without zero termination in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
10:07
ATENTIONβ€Ό New - CVE-2019-10549

Null pointer dereference issue can happen due to improper validation of CSEQ header response received from network in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, Nicobar, QCM2150, QM215, Rennell, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM632, SDX24, SDX55, SM6150, SM7150, SM8150

πŸ“– Read

via "National Vulnerability Database".
10:07
ATENTIONβ€Ό New - CVE-2019-10546

Buffer overflow can occur in WLAN firmware while parsing beacon/probe_response frames during roaming in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in APQ8096, APQ8096AU, IPQ6018, IPQ8074, MDM9607, MDM9640, MDM9650, MSM8996AU, Nicobar, QCA6174A, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCS404, QCS605, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
10:07
ATENTIONβ€Ό New - CVE-2019-10526

Out of bound write in WLAN driver due to NULL character not properly placed after SSID name in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS405, QCS605, SC8180X, SDA845, SDM450, SDX20, SDX24, SDX55, SXR1130

πŸ“– Read

via "National Vulnerability Database".
10:07
ATENTIONβ€Ό New - CVE-2018-11838

Possible double free issue in WLAN due to lack of checking memory free condition. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8053, MDM9640, SDA660, SDM636, SDM660, SDX20

πŸ“– Read

via "National Vulnerability Database".
?
10:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook: No, we are not killing Libra ⚠

Facebook denies that it's cringing away from its virtual currency plans due to the fact that regulators loathe it.

πŸ“– Read

via "Naked Security".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ High-Severity Cisco Webex Flaws Fixed ❌

The high-severity flaws, existing in Webex Player and Webex Network Recording Player, can allow arbitrary code execution.

πŸ“– Read

via "Threatpost".
12:14
πŸ•΄ Advanced Tech Needs More Ethical Consideration & Security πŸ•΄

Unintended consequences and risks need board-level attention and action.

πŸ“– Read

via "Dark Reading: ".
12:27
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.3 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Businesses should be texting customers, but with cybersecurity in mind πŸ”

Consumers now expect businesses to communicate via text, but there are ways to do it securely without using a smartphone.

πŸ“– Read

via "Security on TechRepublic".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Mimecast tracks Malware-as-a-Service trend in analysis of 202 billion emails πŸ”

Software security company identified 92 billion malicious mails in Q4 and a spike in Emotet and ransomware.

πŸ“– Read

via "Security on TechRepublic".
?
14:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Coronavirus adds uncertainty and cost to tech company supply chains πŸ”

Just-in-time manufacturing and low inventory levels mean even a short disruption can cause business interruptions.

πŸ“– Read

via "Security on TechRepublic".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Find 670+ Microsoft Subdomains Vulnerable to Takeover πŸ•΄

The now-fixed flaw could have enabled attackers to trick users into downloading malicious content or sharing credentials.

πŸ“– Read

via "Dark Reading: ".
?
15:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Search Engine Aims to Make Dark Markets More Accessible πŸ•΄

Two years after the administrator of the Grams search engine shuttered the service, another search engine for finding questionable and illegal goods on the Dark Web has opened up shop.

πŸ“– Read

via "Dark Reading: ".
?
16:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Americans worry more about identity theft than being murdered πŸ”

A study finds that ID fraud is a greater concern than murder for 47% of Americans.

πŸ“– Read

via "Security on TechRepublic".
16:14
πŸ•΄ 6 Steps CISOs Should Take to Secure Their OT Systems πŸ•΄

The first question each new CISO must answer is, "What should I do on Monday morning?" My suggestion: Go back to basics. And these steps will help.

πŸ“– Read

via "Dark Reading: ".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to maintain safe cybersecurity practices while transitioning workers from the office to remote workstations πŸ”

With the spread of coronavirus, businesses are increasingly asking staff to work from home. We asked experts how to keep cybersecurity policies in place.

πŸ“– Read

via "Security on TechRepublic".
16:44
πŸ•΄ Poll: Strengthening Security ... by Easing Security? πŸ•΄

If security measures were made easier for end users, would your organization be more secure?

πŸ“– Read

via "Dark Reading: ".
16:51
πŸ” Digital Guardian's Data Protection Platform Rated Five Stars, Named A "Best Buy" by SC Magazine πŸ”

SC Labs' review highlights the visibility provided by the solution, its ability to identify, tag, and fingerprint sensitive data, and provide insider/external threat protection.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Chris Eng: Patch Management Challenges Drive β€˜Security Debt’ ❌

Chris Eng with Veracode talks about how organizations are falling into security debt due to patch management issues.

πŸ“– Read

via "Threatpost".
?
18:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zynga Faces Lawsuit Over Massive Words with Friends Breach ❌

Meanwhile, breach incidents have hit Carnival Cruise Lines, T-Mobile and J. Crew customers.

πŸ“– Read

via "Threatpost".
?
18:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 3 Data Breaches Disclosed This Week: J.Crew, T-Mobile, and Carnival πŸ•΄

The separate incidents show how data theft knows no market-based limits.

πŸ“– Read

via "Dark Reading: ".
?
19:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Distributing Malware Under Guise of Security Certificate Updates πŸ•΄

Approach is a twist to the old method of using fake software, browser updates, Kaspersky says.

πŸ“– Read

via "Dark Reading: ".
?
19:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Mimecast tracks growing Malware-as-a-Service trend in analysis of 202 billion emails πŸ”

Software security company identified 92 billion malicious mails in Q4 and a spike in Emotet and ransomware.

πŸ“– Read

via "Security on TechRepublic".
19:37
πŸ” How to install and use the NordPass password manager on Linux πŸ”

The makers of NordVPN have come out with a new version of their NordPass password manager. Find out how to install and use it.

πŸ“– Read

via "Security on TechRepublic".
6 March 2020
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Boots yanks loyalty card payouts after 150K accounts get stuffed ⚠

The UK pharmacy chain says it wasn't hacked, its systems are fine. It's all the password reusers mucking things up again!

πŸ“– Read

via "Naked Security".
09:23
⚠ Cathay Pacific fined over crooks slurping its database for over 4 years ⚠

The ICO found a "catalog of errors," including backups without passwords, unpatched servers, no-longer-supported OSes and feeble anti-virus.

πŸ“– Read

via "Naked Security".
09:23
⚠ Chrome extension cons cryptocurrency users out of hardware wallet key ⚠

Ledger has warned users about a rogue Chrome extension that duped users into giving up the keys to their hardware crypto wallets.

πŸ“– Read

via "Naked Security".
?
09:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researcher finds 670 Microsoft subdomains vulnerable to takeover ⚠

Researchers have found it’s still child’s play to hijack subdomains from companies such as Microsoft to use in phishing and malware attacks.

πŸ“– Read

via "Naked Security".
09:53
⚠ Run ANDROID on an iPhone? Are you SERIOUS?!? ⚠

It's true - Android on an iPhone. OK, a few things don't work yet... such as sound. And the phone bit.

πŸ“– Read

via "Naked Security".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Securing Our Elections Requires Change in Technology, People & Attitudes πŸ•΄

Increasing security around our election process and systems will take a big effort from many different parties. Here's how.

πŸ“– Read

via "Dark Reading: ".
?
12:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Physical Flaws: Intel's Root-of-Trust Issue Mostly Mitigated πŸ•΄

An insider, or security expert with physical access, can compromise the hardware protections of Intel chips sold in the past five years.

πŸ“– Read

via "Dark Reading: ".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to scan your WordPress sites for vulnerabilities πŸ”

How confident are you with the security of your WordPress deployments? If you're not 100% confident, you need to make use of the wpscan tool.

πŸ“– Read

via "Security on TechRepublic".
14:21
πŸ” Friday Five: 3/6 Edition πŸ”

National security professionals tightly monitor Super Tuesday voting, Coronavirus complicates security operations, and moreΒ  - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
14:23
⚠ 5 tips for working safely from home ⚠

Don't let teleworking due to concerns over the coronavirus (Covid-19) put your cybersecurity health at risk....

πŸ“– Read

via "Naked Security".
14:37
πŸ” 10 best practices for using Windows servers πŸ”

Follow these tips to keep your Windows-based servers operating smoothly, securely, and efficiently.

πŸ“– Read

via "Security on TechRepublic".
14:43
❌ Critical Zoho Zero-Day Flaw Disclosed ❌

A Zoho zero day vulnerability and proof of concept (PoC) exploit code was disclosed on Twitter.

πŸ“– Read

via "Threatpost".
?
15:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spread of Coronavirus-Themed Cyberattacks Persists with New Attacks ❌

In cybersecurity circles, the Coronavirus is spurring anxiety over the virtual abuse of the deadly disease by scammers.

πŸ“– Read

via "Threatpost".
15:14
πŸ•΄ Siemens Shares Incident Response Playbook for Energy Infrastructure πŸ•΄

The playbook simulates a cyberattack on the energy industry to educate regulators, utilities, and IT and OT security experts.

πŸ“– Read

via "Dark Reading: ".
?
15:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity πŸ•΄

The former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyber threats our nation and its businesses face today.

πŸ“– Read

via "Dark Reading: ".
?
16:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Former Acting Inspector General Charged in Federal Fraud Scheme πŸ•΄

A federal grand jury has indicted Charles K. Edwards on 16 counts related to a conspiracy to steal software from one department and sell an enhanced version to another.

πŸ“– Read

via "Dark Reading: ".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” American cases added to 3D map showing the spread of COVID-19 πŸ”

The outbreak is slowing down in China while the WHO warns the rest of the world to "pull out all the stops" to control the spread of the illness.

πŸ“– Read

via "Security on TechRepublic".
?
17:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How world leaders use big data πŸ”

It's a fine line between countries sharing data in order to help with common interests and imposing on the privacy of those who provide it. The World Economic Forum's director weighs in.

πŸ“– Read

via "Security on TechRepublic".
17:37
πŸ” How world leaders use big data πŸ”

It's a fine line between countries sharing data in order to help with common interests and imposing on the privacy of those who provide it. The World Economic Forum's director weighs in.

πŸ“– Read

via "Security on TechRepublic".
?
19:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Next-Gen Ransomware Packs a β€˜Human’ Punch, Microsoft Warns ❌

Ryuk, DoppelPaymer, Parinacota and other ransomware groups are getting more sophisticated, Microsoft warns.

πŸ“– Read

via "Threatpost".
?
19:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Cloud Attack Techniques You Should Worry About πŸ•΄

Security pros detail the common and concerning ways attackers target enterprise cloud environments.

πŸ“– Read

via "Dark Reading: ".
19:44
πŸ•΄ New Ransomware Variant Developed Entirely as Shellcode πŸ•΄

PwndLocker is harder to detect than other crypto-malware, Crypsis Group says.

πŸ“– Read

via "Dark Reading: ".
8 March 2020
?
09:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ IWD: biometrics, machine learning, privacy and being a woman in tech – Naked Security Podcast ⚠

To celebrate International Women's Day we invite you to this all-female splinter episode.

πŸ“– Read

via "Naked Security".
9 March 2020
?
03:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-11021

setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.

πŸ“– Read

via "National Vulnerability Database".
?
07:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 29 stories of the week ⚠

From an ultrasonic attack on Siri and Google Assistant to the guy who hacked back at tech support scammers - and everything in between.

πŸ“– Read

via "Naked Security".
?
08:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ 99% of compromised Microsoft enterprise accounts lack MFA ⚠

Cybercriminals compromise over a million Microsoft enterprise accounts each month as too few customers use multi-factor authentication.

πŸ“– Read

via "Naked Security".
?
08:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Now you need a notarized document to get a .gov domain ⚠

The US government is tightening its rules around the registration of government web domains to stop fraudsters impersonating government sites.

πŸ“– Read

via "Naked Security".
08:54
⚠ Microsoft: Turn off Memory Integrity if it’s causing problems ⚠

Microsoft has finally clarified how users can fix a Windows security measure that has been causing hardware problems: turn it off.

πŸ“– Read

via "Naked Security".
?
10:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to install and use the NordPass password manager on Linux πŸ”

The makers of NordVPN have come out with a new version of their NordPass password manager. Find out how to install and use it.

πŸ“– Read

via "Security on TechRepublic".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Threat Awareness: A Critical First Step in Detecting Adversaries πŸ•΄

One thing seems certain: Attackers are only getting more devious and lethal. Expect to see more advanced attacks.

πŸ“– Read

via "Dark Reading: ".
11:24
⚠ One billion Android smartphones racking up security flaws ⚠

How long do Android devices continue to receive security updates after they’re purchased? The answer is: barely two years.

πŸ“– Read

via "Naked Security".
?
12:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cyberattackers are delivering malware by using links from whitelisted sites πŸ”

Legitimate-looking links from OneDrive, Google Drive, iCloud, and Dropbox slip by standard security measures.

πŸ“– Read

via "Security on TechRepublic".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ AMD Downplays CPU Threat Opening Chips to Data Leak Attacks ❌

New side-channel attacks have been disclosed in AMD CPUs, however AMD said that they are not new.

πŸ“– Read

via "Threatpost".
?
13:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ WatchGuard Buys Panda Security for Endpoint Security Tech πŸ•΄

In the long term, Panda Security's technologies will be integrated into the WatchGuard platform.

πŸ“– Read

via "Dark Reading: ".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-7968

nwbc_ext2int in SAP NetWeaver Application Server before Security Note 2183189 allows XXE attacks for local file inclusion via the sap/bc/ui2/nwbc/nwbc_ext2int/ URI.

πŸ“– Read

via "National Vulnerability Database".
14:13
ATENTIONβ€Ό New - CVE-2015-7344

HikaShop Joomla Component before 2.6.0 has XSS via an injected payload[/caption].

πŸ“– Read

via "National Vulnerability Database".
14:13
ATENTIONβ€Ό New - CVE-2015-7343

JNews Joomla Component before 8.5.0 has XSS via the mailingsearch parameter.

πŸ“– Read

via "National Vulnerability Database".
14:21
πŸ•΄ Malware Campaign Feeds on Coronavirus Fears πŸ•΄

A new malware campaign that offers a "coronavirus map" delivers a well-known data-stealer.

πŸ“– Read

via "Dark Reading: ".
14:22
πŸ›  Richsploit RichFaces Exploitation Toolkit πŸ› 

This tool can be used to exploit vulnerable versions of RichFaces. It has payloads for 4 vulnerabilities that have been identified, which can lead to remote code execution via java deserialization and EL injection.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Exchange Server Flaw Exploited in APT Attacks ❌

A vulnerability is Microsoft Exchange servers is being actively exploited by multiple APT groups, researchers warn.

πŸ“– Read

via "Threatpost".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ It’s not a breach… it’s just that someone else has your data ⚠

If you lose someone's data because of a configuration blunder that lets crooks in without any actual hacking... is that a "breach" or not?

πŸ“– Read

via "Naked Security".
?
15:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-6918

Lexmark Markvision Enterprise (MVE) before 2.4.1 allows remote attackers to execute arbitrary commands by uploading files. (

πŸ“– Read

via "National Vulnerability Database".
15:43
ATENTIONβ€Ό New - CVE-2016-1159

In ZOHO Password Manager Pro (PMP) 8.3.0 (Build 8303) and 8.4.0 (Build 8400,8401,8402), underprivileged users can obtain sensitive information (entry password history) via a vulnerable hidden service.

πŸ“– Read

via "National Vulnerability Database".
15:43
ATENTIONβ€Ό New - CVE-2015-7342

JNews Joomla Component before 8.5.0 allows SQL injection via upload thumbnail, Queue Search Field, Subscribers Search Field, or Newsletters Search Field.

πŸ“– Read

via "National Vulnerability Database".
15:51
πŸ•΄ Cyber Resiliency, Cloud & the Evolving Role of the Firewall πŸ•΄

Today's defenses must be creative in both isolating threats and segmenting environments to prevent attacks. Here's why.

πŸ“– Read

via "Dark Reading: ".
15:55
πŸ” Federal Employees Worked to Defraud Govt Through Stolen Data πŸ”

A one-time inspector general at the Department of Homeland Security was indicted on Friday on charges he conspired to steal the U.S. government's proprietary software and databases.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-7341

JNews Joomla Component before 8.5.0 allows arbitrary File Upload via Subscribers or Templates, as demonstrated by the .php5 extension.

πŸ“– Read

via "National Vulnerability Database".
16:13
ATENTIONβ€Ό New - CVE-2015-7340

JEvents Joomla Component before 3.4.0 RC6 has SQL Injection via evid in a Manage Events action.

πŸ“– Read

via "National Vulnerability Database".
16:13
ATENTIONβ€Ό New - CVE-2015-7339

JCE Joomla Component 2.5.0 to 2.5.2 allows arbitrary file upload via a .php file extension for an image file to the /com_jce/editor/libraries/classes/browser.php script.

πŸ“– Read

via "National Vulnerability Database".
16:13
ATENTIONβ€Ό New - CVE-2015-7338

SQL Injection exists in AcyMailing Joomla Component before 4.9.5 via exportgeolocorder in a geolocation_longitude request to index.php.

πŸ“– Read

via "National Vulnerability Database".
16:13
ATENTIONβ€Ό New - CVE-2014-1634

SQL Injection exists in Advanced Newsletter Magento extension before 2.3.5 via the /store/advancednewsletter/index/subscribeajax/an_category_id/ PATH_INFO.

πŸ“– Read

via "National Vulnerability Database".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-1487

Lexmark Markvision Enterprise before 2.3.0 misuses the Apache Commons Collections Library, leading to remote code execution because of Java deserialization.

πŸ“– Read

via "National Vulnerability Database".
17:43
ATENTIONβ€Ό New - CVE-2011-4538

Lexmark X, W, T, E, and C devices before 2012-02-09 allow attackers to obtain sensitive information by reading passwords within exported settings.

πŸ“– Read

via "National Vulnerability Database".
17:43
ATENTIONβ€Ό New - CVE-2011-3269

Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut.

πŸ“– Read

via "National Vulnerability Database".
?
19:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Microsoft Disabled Legacy Authentication Across the Company πŸ•΄

The process was not smooth or straightforward, employees say in a discussion of challenges and lessons learned during the multi-year project.

πŸ“– Read

via "Dark Reading: ".
10 March 2020
?
06:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Watch What We Do in the Shadows on Netflix πŸ•΅


πŸ“– Read

via "VPNpro".
?
07:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spear-Phishing Attack Lures Victims With β€˜HIV Results’ ❌

Attackers are purporting to send victims HIV test results - but in reality are convincing them to download the Koadic RAT.

πŸ“– Read

via "Threatpost".
?
08:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phone carriers may soon be forced to adopt anti-robocall tech ⚠

US carriers haven't been doing enough to block robocalls voluntarily. The Federal Communications Commission's response? Fine - we'll make you.

πŸ“– Read

via "Naked Security".
?
09:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Keys to Hiring Cybersecurity Pros When Certification Can't Help πŸ•΄

There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.

πŸ“– Read

via "Dark Reading: ".
09:24
⚠ Ex-Inspector General indicted for stealing data on 250k govt colleagues ⚠

Crime doesn't pay, even if you have the audacity to try to sell your employer its own, free software and personal data on your own colleagues.

πŸ“– Read

via "Naked Security".
?
09:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google data puts innocent man at the scene of a crime ⚠

The man became a suspect because location data from his Android phone was swept up in a surveillance dragnet called a geofence warrant.

πŸ“– Read

via "Naked Security".
10:04
❌ Variant of Paradise Ransomware Targets Office IQY Files ❌

Threat actors can easily infiltrate networks because attacks evade detection by typical security protections.

πŸ“– Read

via "Threatpost".
?
10:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Watch out for Office 365 and G Suite scams, FBI warns businesses ⚠

The FBI has warned users of Microsoft Office 365 and Google G Suite hosted email about Business Email Compromise (BEC) scams.

πŸ“– Read

via "Naked Security".
?
10:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Over 80% of Medical Imaging Devices Run on Outdated Operating Systems πŸ•΄

New data on live Internet of Things devices in healthcare and other organizations shines a light on security risks.

πŸ“– Read

via "Dark Reading: ".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Network Metadata Can Transform Compromise Assessment πŸ•΄

Listen more closely and your network's metadata will surrender insights the bad guys counted on keeping secret

πŸ“– Read

via "Dark Reading: ".
?
11:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10065

An issue was discovered in Open Ticket Request System (OTRS) 7.0 through 7.0.6. An attacker who is logged into OTRS as a customer user can use the search result screens to disclose information from internal FAQ articles, a different vulnerability than CVE-2019-9753.

πŸ“– Read

via "National Vulnerability Database".
11:43
ATENTIONβ€Ό New - CVE-2018-18894

Certain older Lexmark devices (C, M, X, and 6500e before 2018-12-18) contain a directory traversal vulnerability in the embedded web server.

πŸ“– Read

via "National Vulnerability Database".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-14502

controllers/quizzes.php in the Kiboko Chained Quiz plugin before 1.0.9 for WordPress allows remote unauthenticated users to execute arbitrary SQL commands via the 'answer' and 'answers' parameters.

πŸ“– Read

via "National Vulnerability Database".
12:18
πŸ” Intel's data center CPUs vulnerability could lead to "devastating" attacks πŸ”

Security researchers found vulnerabilities that can affect multi-tenant environments such as public clouds or shared enterprise workloads.

πŸ“– Read

via "Security on TechRepublic".
12:21
πŸ•΄ What Should I Do About Vulnerabilities Without Fixes? πŸ•΄

With better tools that identify potential threats even before developers address them, a new problem has arisen.

πŸ“– Read

via "Dark Reading: ".
?
12:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-10992

In HPE Storage Essentials 9.5.0.142, there is Unauthenticated Java Deserialization with remote code execution via OS commands in a request to invoker/JMXInvokerServlet, aka PSRT110461.

πŸ“– Read

via "National Vulnerability Database".
12:56
πŸ” HHS Finalizes New Health Data Rules To Improve Data Governance πŸ”

The U.S. Department of Health and Human Services finalized two new rules designed to give patients better control over their data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
14:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Paradise Ransomware Variant Hides in Office IQY Files πŸ•΄

The uncommon Internet Query file format lets attacks slip past defenses to effectively break into target networks.

πŸ“– Read

via "Dark Reading: ".
?
15:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 3 Tips to Stay Secure When You Lose an Employee πŸ•΄

Whether they leave for a better job or get fired, and whether they mean to cause problems or do so out of ignorance, ex-workers can pose a threat to your company.

πŸ“– Read

via "Dark Reading: ".
15:34
❌ High-Severity Flaws Plague Intel Graphics Drivers ❌

Intel patched six high-severity flaws in its graphics drivers, as well as other vulnerabilities in its NUC firmware, and a load value injection vulnerability that could allow attackers to steal sensitive data.

πŸ“– Read

via "Threatpost".
15:34
❌ Firefox Bug Opens iPhone AirPods to Third-Party Snooping ❌

Mozilla Foundation snuffs out bugs with the introduction of Firefox 74 and ESR 68.6.

πŸ“– Read

via "Threatpost".
15:43
ATENTIONβ€Ό New - CVE-2012-1096

NetworkManager 0.9 and earlier allows local users to use other users' certificates or private keys when making a connection via the file path when adding a new connection.

πŸ“– Read

via "National Vulnerability Database".
15:43
ATENTIONβ€Ό New - CVE-2012-1094

JBoss AS 7 prior to 7.1.1 and mod_cluster do not handle default hostname in the same way, which can cause the excluded-contexts list to be mismatched and the root context to be exposed.

πŸ“– Read

via "National Vulnerability Database".
?
17:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Bitsight and Microsoft Disrupt Necurs Botnet πŸ•΄

But roughly 2 million infected systems remain in the wild, and infected systems could be reactivated at any time.

πŸ“– Read

via "Dark Reading: ".
17:21
πŸ•΄ Microsoft Patches Over 100 Vulnerabilities πŸ•΄

Patch Tuesday features several remote code execution flaws in Microsoft Word.

πŸ“– Read

via "Dark Reading: ".
17:34
❌ Popular ThemeREX WordPress Plugin Opens Websites to RCE ❌

The bug has been under active attack as a zero-day.

πŸ“– Read

via "Threatpost".
?
18:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Develop New Side-Channel Attacks on Intel CPUs πŸ•΄

Load Value Injection (LVI) takes advantage of speculative execution processes just like Meltdown and Spectre, say security researchers from Bitdefender and several universities.

πŸ“– Read

via "Dark Reading: ".
18:22
πŸ›  Zeek 3.1.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
18:34
❌ Microsoft Patches 26 Critical Bugs in Big March Update ❌

March security updates include 115 CVEs patching everything from Windows, Office and Microsoft’s new Chromium-based Edge web browser.

πŸ“– Read

via "Threatpost".
?
19:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Bugs in Rockwell, Johnson Controls ICS Gear ❌

Bugs affecting programmable logic controllers (PLC) and physical access-control systems for facilities are rated 9.8 in severity.

πŸ“– Read

via "Threatpost".
?
20:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Two attendees at RSA tech conference in San Francisco stricken with COVID-19 πŸ”

The organizers of the popular security conference, RSA, which drew over 36,000 people to San Francisco in February, confirmed that at least two people who attended have tested positive for COVID-19.

πŸ“– Read

via "Security on TechRepublic".
11 March 2020
?
05:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Closing the cybersecurity gender gap would boost the US economy by $30B πŸ”

82% of women in cybersecurity jobs agree the industry has a gender bias problem. Fixing it would not only improve morale and confidence, but also result in an economic boost to the cybersecurity industry.

πŸ“– Read

via "Security on TechRepublic".
?
07:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Brave browser to block web fingerprinting with randomisation ⚠

Brave is testing a new defence against fingerprinting: confusing algorithms by randomising some of the data they collect.

πŸ“– Read

via "Naked Security".
?
09:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Trial for accused CIA leaker ends in hung jury ⚠

The US is expected to press for a retrial in the high-stakes trial of Joshua Schulte, suspected of raiding the CIA's cyber arsenal.

πŸ“– Read

via "Naked Security".
09:14
⚠ FBI arrests alleged owner of Deer.io, top market for stolen accounts ⚠

Started around 2013, the site claims to host over 24,000 active shops doing brisk business in stolen PII and hacking services.

πŸ“– Read

via "Naked Security".
?
09:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Necurs Botnet in Crosshairs of Global Takedown Offensive ❌

The tech giant will take control of the U.S.-based infrastructure used by the criminals behind the world’s most prolific botnet used to distribute malware and infect victim computers.

πŸ“– Read

via "Threatpost".
09:48
πŸ” Local governments: Don't pay ransoms to hackers πŸ”

A Deloitte survey about ransomware also recommends that local governments use air-gapped system backups.

πŸ“– Read

via "Security on TechRepublic".
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Ultimate Security Budget Excel Template – The Easiest Way to Plan and Monitor Your Security Spending ❌

The Ultimate Security Budget Plan & Track Excel template provides security executives with a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that security needs are addressed while maintaining the budgetary frame.

πŸ“– Read

via "Threatpost".
?
11:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why CSP Isn't Enough to Stop Magecart-Like Attacks πŸ•΄

As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it.

πŸ“– Read

via "Dark Reading: ".
11:34
❌ More Than Half of IoT Devices Vulnerable to Severe Attacks ❌

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

πŸ“– Read

via "Threatpost".
11:48
πŸ” Media and e-commerce brands are top targets for phishing attacks πŸ”

Some 84% of phishing URLs seen by content delivery network Akamai were abusing media and e-commerce companies.

πŸ“– Read

via "Security on TechRepublic".
?
12:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Trend Micro VP talks cloud security, IoT risks, and ransomware πŸ”

In an interview at RSA 2020, Greg Young, the vice present of cybersecurity at Trend Micro, said that companies need to focus on cloud security posture management to make sure all cloud instances are configured correctly and securely.

πŸ“– Read

via "Security on TechRepublic".
12:42
πŸ” Hackers are working harder to make phishing and malware look legitimate πŸ”

A Trend Micro report finds that spammers are using public and hosted cloud infrastructure to slip malicious emails past security defenses.

πŸ“– Read

via "Security on TechRepublic".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New TrickBot Variant Updates Anti-Analysis Tricks ❌

A new TrickBot variant shows that the malware is continuing to swap out new anti-analysis and persistence tactics.

πŸ“– Read

via "Threatpost".
?
13:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-1101

systemd 37-1 does not properly handle non-existent services, which causes a denial of service (failure of login procedure).

πŸ“– Read

via "National Vulnerability Database".
13:44
⚠ S2 Ep30: Let’s Encrypt, ULTRASOUND attacks, backups for ransom – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
?
14:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals πŸ•΄

Visibility into phishing attacks by content delivery networks and security firms shows many domains fail to be classified as malicious.

πŸ“– Read

via "Dark Reading: ".
14:34
❌ Wormable, Unpatched Microsoft Bug Threatens Corporate LANs ❌

CVE-2020-0796 affects version 3.1.1 of Microsoft’s SMB file-sharing system and was not included in Patch Tuesday.

πŸ“– Read

via "Threatpost".
14:44
⚠ Microsoft leaves critical bug unpatched on Patch Tuesday ⚠

Microsoft fixed bugs across a range of products on patch Tuesday, issuing patches for 115 distinct CVEs, with 26 rated critical.

πŸ“– Read

via "Naked Security".
?
15:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Gender Equality in Cybersecurity Could Drive Economic Boost πŸ•΄

If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.

πŸ“– Read

via "Dark Reading: ".
15:14
⚠ TRRespass research reveals rowhammering is alive and well ⚠

"TRRespass" is a new trick for rowhammering - an attack where you write to a memory chip by reading it over and over (and over) again.

πŸ“– Read

via "Naked Security".
?
15:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How the Rise of IoT Is Changing the CISO Role πŸ•΄

Prepare for the future by adopting a risk-based approach. Following these five steps can help.

πŸ“– Read

via "Dark Reading: ".
15:32
ATENTIONβ€Ό New - CVE-2013-1753

The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2011-2487

The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.

πŸ“– Read

via "National Vulnerability Database".
?
16:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Europe πŸ•΄

ExCel London, UK

πŸ“– Read

via "Dark Reading: ".
16:01
πŸ•΄ Black Hat Asia πŸ•΄

Singapore

πŸ“– Read

via "Dark Reading: ".
?
16:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat USA πŸ•΄



πŸ“– Read

via "Dark Reading: ".
16:31
πŸ•΄ I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know? πŸ•΄

Should you happen to be in a meeting with an ICS vendor, here are some terms you will need to know so as to not be laughed out of the room.

πŸ“– Read

via "Dark Reading: ".
16:34
❌ Phishing Attack Skirts Detection With YouTube ❌

Attackers are using YouTube redirect links, whitelisted by various security defense mechanisms, to evade detection.

πŸ“– Read

via "Threatpost".
16:47
πŸ” Sweeping Federal Cybersecurity Upgrades Needed to Defend US πŸ”

A new report says the federal government and the private sector needs to better defend the United States in cyberspace.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” February sees huge jump in exploits designed to spread Mirai botnet πŸ”

The Mirai botnet is known for targeting Internet of Things devices and conducting massive DDoS attacks, as described by cyberthreat researcher Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
18:12
πŸ” Cybersecurity pros are using artificial intelligence but still prefer the human touch πŸ”

More than half of organizations have adopted AI for security efforts, but a majority are more confident in results verified by humans, according to WhiteHat Security.

πŸ“– Read

via "Security on TechRepublic".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Flaws Riddle Zyxel’s Network Management Software ❌

Over 16 security flaws, including multiple backdoors and hardcoded SSH server keys, plague the software.

πŸ“– Read

via "Threatpost".
?
19:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready? πŸ•΄

A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.

πŸ“– Read

via "Dark Reading: ".
19:01
πŸ•΄ Microsoft Discloses New Remote Execution Flaw in SMBv3 πŸ•΄

A patch for the flaw is not yet available, but there are no known exploits -- so far.

πŸ“– Read

via "Dark Reading: ".
19:01
πŸ•΄ Ransomware Increasingly Targeting Small Governments πŸ•΄

To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.

πŸ“– Read

via "Dark Reading: ".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyberspace Solarium Commission Slams US Cybersecurity Readiness πŸ•΄

The federal commission outlined more than 60 recommendations to remedy major security problems.

πŸ“– Read

via "Dark Reading: ".
19:32
ATENTIONβ€Ό New - CVE-2016-1000111

Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

πŸ“– Read

via "National Vulnerability Database".
12 March 2020
?
09:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Necurs zombie botnet disrupted by Microsoft ⚠

Necurs, one of the world's biggest botnets, infected over 9 million computers worldwide.

πŸ“– Read

via "Naked Security".
?
09:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Analytics firm’s VPN and ad-blocking apps are secretly grabbing user data ⚠

Both Google and Apple have removed at least some of the apps from the company, Sensor Tower.

πŸ“– Read

via "Naked Security".
?
10:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Dell: Cost of data loss per organization surpassed $1M in the past year πŸ”

Businesses now manage an average of 13.53 petabytes of data, but struggle to keep it secure.

πŸ“– Read

via "Security on TechRepublic".
10:14
⚠ Intel patches graphics drivers and offers new LVI flaw mitigations ⚠

Intel’s March security updates reached its customers this week and the dominant theme is the bundle of flaws affecting Graphics drivers.

πŸ“– Read

via "Naked Security".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Akamai Talks Massive Uptick in Credential-Stuffing Attacks Against Bank APIs ❌

Researchers with Akamai say that 75 percent of all credential abuse attacks against the financial services industry were targeting APIs.

πŸ“– Read

via "Threatpost".
?
11:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Back to the Future: A Threat Intelligence Journey πŸ•΄

Threat intelligence needs the problem solvers, the curious ones, the mission seekers, the analytical minds, the defenders, and the fierce -- whatever their gender.

πŸ“– Read

via "Dark Reading: ".
11:34
❌ $100K Paid Out for Google Cloud Shell Root Compromise ❌

A Dutch researcher claimed Google's very first annual Cloud Platform bug-bounty prize, for a clever container escape exploit.

πŸ“– Read

via "Threatpost".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox 74 offers privacy and security updates ⚠

A month after shipping version 73 of its Firefox browser, Mozilla has released version 74 with a range of privacy and security enhancements.

πŸ“– Read

via "Naked Security".
12:14
⚠ Data of millions of eBay and Amazon shoppers exposed ⚠

Eight million customer records belonging to companies including Amazon, eBay, Shopify, PayPal, and Stripe were collected.

πŸ“– Read

via "Naked Security".
?
14:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybercriminals raking in $1.5 trillion every year πŸ”

Research from Atlas VPN found that criminals' net proceeds outpace the revenue made by tech giants each year.

πŸ“– Read

via "Security on TechRepublic".
?
14:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Patches Leaked Remote Code Execution Flaw πŸ•΄

A vulnerability in Microsoft's Server Message Block protocol prompted concerns of wormable exploits when it was disclosed this week.

πŸ“– Read

via "Dark Reading: ".
?
15:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Working from Home? These Tips Can Help You Adapt πŸ•΄

COVID-19 means many people are doing their jobs from outside the confines of the office. That may not be as easy as it sounds.

πŸ“– Read

via "Dark Reading: ".
?
17:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft Patches SMBv3 Bug πŸ”

Microsoft issued an out-of-band security update for a critical SMB bug (CVE-2020-0796) on Thursday.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Nearly 300 cybersecurity incidents impacted supply chain entities in 2019 πŸ”

A study from Resilience360 listed cyberthreats as one of the biggest issues facing global supply chains in 2020.

πŸ“– Read

via "Security on TechRepublic".
?
18:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CASB 101: Why a Cloud Access Security Broker Matters πŸ•΄

A CASB isn't a WAF, isn't an NGF, and isn't an SWG. So what is it, precisely, and why do you need one to go along with all the other letters? Read on for the answer.

πŸ“– Read

via "Dark Reading: ".
18:01
πŸ•΄ New Android Malware Strain Sneaks Cookies from Facebook πŸ•΄

Two malware modifications, when combined, can snatch cookies collected by browsers and social networking apps.

πŸ“– Read

via "Dark Reading: ".
18:04
❌ Trojan Raids Android Users’ Cookie Jars ❌

Cookiethief steals cookies to infiltrate Facebook and other web service accounts.

πŸ“– Read

via "Threatpost".
18:04
❌ Researchers Warn of Novel PXJ Ransomware Strain ❌

While PXJ performs typical ransomware functions, it does not appear to share the same underlying code with most known ransomware families.

πŸ“– Read

via "Threatpost".
18:12
πŸ” Facebook cookie-stealing trojans surface on Android devices πŸ”

The trojans are designed to gain control of Facebook user accounts by capturing browser cookies in Android, says Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
?
18:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Report Shows Breach Costs Continuing to Grow πŸ•΄

The costs associated with data breaches climb alongside the amount of data managed by the enterprise according to the latest Global Protection Index Snapshot.

πŸ“– Read

via "Dark Reading: ".
?
20:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russia-Based Turla APT Group's Infrastructure, Activity Traceable πŸ•΄

Threat actor's practice of using known malware and tactics gives an opening for defenders, says Recorded Future.

πŸ“– Read

via "Dark Reading: ".
20:02
ATENTIONβ€Ό New - CVE-2018-20586

bitcoind and Bitcoin-Qt prior to 0.17.1 allow injection of arbitrary data into the debug log via an RPC call.

πŸ“– Read

via "National Vulnerability Database".
20:02
ATENTIONβ€Ό New - CVE-2018-19516

messagepartthemes/default/defaultrenderer.cpp in messagelib in KDE Applications before 18.12.0 does not properly restrict the handling of an http-equiv="REFRESH" value.

πŸ“– Read

via "National Vulnerability Database".
20:02
ATENTIONβ€Ό New - CVE-2018-10704

yidashi yii2cmf 2.0 has XSS via the /search q parameter.

πŸ“– Read

via "National Vulnerability Database".
20:02
ATENTIONβ€Ό New - CVE-2017-18350

bitcoind and Bitcoin-Qt prior to 0.15.1 have a stack-based buffer overflow if an attacker-controlled SOCKS proxy server is used. This results from an integer signedness error when the proxy server responds with an acknowledgement of an unexpected target domain name.

πŸ“– Read

via "National Vulnerability Database".
20:02
ATENTIONβ€Ό New - CVE-2015-3641

bitcoind and Bitcoin-Qt prior to 0.10.2 allow attackers to cause a denial of service (disabled functionality such as a client application crash) via an "Easy" attack.

πŸ“– Read

via "National Vulnerability Database".
13 March 2020
?
08:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Confessions app Whisper spills almost a billion records ⚠

Researchers say the exposure includes exact locations of users' last posts, nicknames, age, and gender.

πŸ“– Read

via "Naked Security".
08:54
πŸ•΅ NordPass now verified as a secure password manager πŸ•΅


πŸ“– Read

via "VPNpro".
?
09:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Homeland Security sued over secretive use of face recognition ⚠

As of June 2019, CBP had processed more than 20 million travelers using facial recognition, civil rights group ACLU says.

πŸ“– Read

via "Naked Security".
?
10:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ EARN IT Act threatens end-to-end encryption ⚠

The bill, which would undercut Section 230 protections for online publishing, presents itself as a way to stop online child abuse.

πŸ“– Read

via "Naked Security".
10:47
πŸ” Dang... How Did I Miss International Women’s Day on Sunday, March 8?! πŸ”

While there have been some successes when it comes to getting women involved in tech, by and large, we haven't made enough progress.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
11:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Texas Chose to Fight Ransomware and Not Pay. What About the Rest of Us? πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ACLU Sues Over U.S. Airport Facial-Recognition Technology ❌

Civil-liberties group wants more transparency about who the government is partnering with and how they are using the information gathered in biometric checks.

πŸ“– Read

via "Threatpost".
?
13:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Lesson in Social Engineering πŸ•΄

What kind of school project is this?

πŸ“– Read

via "Dark Reading: ".
?
13:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2009-5159

Invision Power Board (aka IPB or IP.Board) 2.x through 3.0.4, when Internet Explorer 5 is used, allows XSS via a .txt attachment.

πŸ“– Read

via "National Vulnerability Database".
?
14:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Princess Cruises Confirms Data Breach πŸ•΄

The cruise liner, forced to shut down operations due to coronavirus, says the incident may have compromised passengers' personal data.

πŸ“– Read

via "Dark Reading: ".
14:01
πŸ•΄ What Cybersecurity Pros Really Think About Artificial Intelligence πŸ•΄

While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.

πŸ“– Read

via "Dark Reading: ".
14:04
❌ Coronavirus-Themed APT Attack Spreads Malware ❌

The APT group was spotted sending spear-phishing emails that purport to detail information about coronavirus - but they actually infect victims with a custom RAT.

πŸ“– Read

via "Threatpost".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 3/13 πŸ”

Ryuk Ransomware targets another U.S. city, University of Kentucky ends a month-long cyberattack, and a secret-sharing app exposes user data - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:31
πŸ•΄ Beyond Burnout: What Is Cybersecurity Doing to Us? πŸ•΄

Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.

πŸ“– Read

via "Dark Reading: ".
15:31
πŸ•΄ Big BEC Bust Brings Down Dozens πŸ•΄

Two dozen individuals have been named in the latest arrests of alleged participants in a business email compromise scheme that cost victims $30 million.

πŸ“– Read

via "Dark Reading: ".
?
18:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WordPress Plugin Bug in Popup Builder Threatens 100K Websites ❌

The high-severity flaw allows malicious code injection into website pop-up windows.

πŸ“– Read

via "Threatpost".
18:04
❌ Working from Home: COVID-19’s Constellation of Security Challenges ❌

Organizations are sending employees and students home to work and learn -- but implementing the plan opens the door to more attacks, IT headaches and brand-new security challenges.

πŸ“– Read

via "Threatpost".
?
19:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile πŸ•΄

Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons.

πŸ“– Read

via "Dark Reading: ".
?
20:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
?
20:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How hospital CIOs can prepare for the onslaught of coronavirus patients πŸ”

There are steps that IT departments can take to strengthen their technical infrastructure in advance of COVID-19's arrival at their facility.

πŸ“– Read

via "Security on TechRepublic".
15 March 2020
?
11:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  AIEngine 1.9.2 πŸ› 

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
16 March 2020
?
07:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 23 stories of the week ⚠

Amazon and eBay shopper data was exposed, and the EARN IT act threatens end-to-end encryption. These stories and more in the weekly roundup.

πŸ“– Read

via "Naked Security".
?
07:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Senate bill would ban TikTok from government phones ⚠

Concerns over cybersecurity risk and possible spying by China have already brought about bans from DHS, DoD, TSA, and the State Department.

πŸ“– Read

via "Naked Security".
?
08:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Open source bugs have soared in the past year ⚠

Open source bugs have skyrocketed, according to a report from WhiteSource, with XSS flaws account for a quarter of those bugs.

πŸ“– Read

via "Naked Security".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Report calls for web pre-screening to end UK’s child abuse β€˜explosion’ ⚠

The IICSA report cited "unprecedented levels of depravity" and said that encryption is getting in the way of current screening.

πŸ“– Read

via "Naked Security".
09:07
⚠ Microsoft patches wormable Windows 10 β€˜SMBGhost’ flaw ⚠

What’s the difference between a scheduled security update and one that’s out-of-band? In this case, it's two days.

πŸ“– Read

via "Naked Security".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Ways Thinking 'Childishly' Can Empower Security Professionals πŸ•΄

Younger minds -- more agile and less worried by failure -- provide a useful model for cyber defenders to think more creatively.

πŸ“– Read

via "Dark Reading: ".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Report: US Health and Human Services department hit by cyberattack amidst coronavirus fears πŸ”

The Sunday cybersecurity attack was designed to slow down the agency's systems as it tries to grapple with the spread of COVID-19.

πŸ“– Read

via "Security on TechRepublic".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10091

When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack.

πŸ“– Read

via "National Vulnerability Database".
13:46
ATENTIONβ€Ό New - CVE-2018-13063

Easy!Appointments 1.3.0 has a Missing Authorization issue allowing retrieval of hashed passwords and salts.

πŸ“– Read

via "National Vulnerability Database".
13:46
ATENTIONβ€Ό New - CVE-2018-13060

Easy!Appointments 1.3.0 has a Guessable CAPTCHA issue.

πŸ“– Read

via "National Vulnerability Database".
13:46
ATENTIONβ€Ό New - CVE-2018-10125

Contao before 4.5.7 has XSS in the system log.

πŸ“– Read

via "National Vulnerability Database".
?
14:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fewer Vulnerabilities in Web Frameworks, but Exploits Remain Steady πŸ•΄

Attackers continue to focus on web and application frameworks, such as Apache Struts and WordPress, fighting against a decline in vulnerabilities, according to an analysis.

πŸ“– Read

via "Dark Reading: ".
14:04
πŸ•΄ Hellman & Friedman Acquires Checkmarx for $1.5B πŸ•΄

The private equity firm will buy Checkmarx from Insight Partners, which will continue to own a minority interest.

πŸ“– Read

via "Dark Reading: ".
14:14
πŸ” How to enable 2FA on a per-user basis in Nextcloud πŸ”

If you want to enable two-factor authentication for Nextcloud on a per-user basis, it's just a simple app installation away.

πŸ“– Read

via "Security on TechRepublic".
14:14
πŸ” How to enable 2FA on a per-user basis in Nextcloud πŸ”

If you want to enable two-factor authentication for Nextcloud on a per-user basis, it's just a simple app installation away.

πŸ“– Read

via "Security on TechRepublic".
14:23
❌ Microsoft Edge Shares Privacy-Busting Telemetry, Research Alleges ❌

An academic study found Microsoft's Edge browser to be the least private, due to it sending device identifiers and web browsing pages to back-end servers.

πŸ“– Read

via "Threatpost".
?
15:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 88% of IT pros say world is in permanent state of cyberwar πŸ”

A Venafi study looked into what digital infrastructure will suffer from cyberattacks, which are most vulnerable, and what it means.

πŸ“– Read

via "Security on TechRepublic".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Case Almost Closed: Motorola Wins Multimillion Dollar Trade Secret Case πŸ”

A jury ruled the telecom is owed upwards to $420 million in damages after a Chinese company was caught stealing its trade secrets for radios.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Five Indicted on Romance and Lottery Fraud Charges πŸ•΄

Fraudsters allegedly targeted elderly victims, ultimately wringing more than $4 million from their bank accounts.

πŸ“– Read

via "Dark Reading: ".
?
17:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-11073

A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.

πŸ“– Read

via "National Vulnerability Database".
?
18:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-19325

tcpdump 4.9.2 (and probably lower versions) is prone to a heap-based buffer over-read in the EXTRACT_32BITS function (extract.h, called from the rx_cache_find function, print-rx.c) due to improper serviceId sanitization.

πŸ“– Read

via "National Vulnerability Database".
18:23
❌ Convincing Google Impersonation Opens Door to MiTM, Phishing ❌

Using homographic characters is an easy way to execute a convincing fake site.

πŸ“– Read

via "Threatpost".
18:34
πŸ•΄ Privacy in a Pandemic: What You Can (and Can't) Ask Employees πŸ•΄

Businesses struggle to strike a balance between workplace health and employees' privacy rights in the midst of a global health emergency.

πŸ“– Read

via "Dark Reading: ".
?
19:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-12842

Bitcoin Core before 0.14 allows an attacker to create an ostensibly valid SPV proof for a payment to a victim who uses an SPV wallet, even if that payment did not actually occur. Completing the attack would cost more than a million dollars, and is relevant mainly only in situations where an autonomous system relies solely on an SPV proof for transactions of a greater dollar amount.

πŸ“– Read

via "National Vulnerability Database".
17 March 2020
?
08:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Europol busts up two SIM-swapping hacking rings ⚠

What a nightmare: your phone goes dead, and you can't log into your bank account because it's controlled by a hacker who's draining you dry.

πŸ“– Read

via "Naked Security".
?
09:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Activities of a Nigerian Cybercriminal Uncovered ❌

Rise and fall of a Nigerian cybercriminal called β€˜Dton,’ who made hundreds of thousands of dollars in a 7-year campaign, outlined in new report.

πŸ“– Read

via "Threatpost".
09:39
⚠ WordPress to get automatic updates for plugins and themes ⚠

Good news for website admins: the ability to automatically update plugins and themes is being beta-tested for WordPress 5.5, due in August.

πŸ“– Read

via "Naked Security".
09:39
⚠ Tor browser fixes bug that allows JavaScript to run when disabled ⚠

The Tor browser has a bug that could allow JavaScript to execute on websites even when users think they’ve disabled it for maximum anonymity.

πŸ“– Read

via "Naked Security".
09:39
⚠ Slack fixes account-stealing bug ⚠

Slack has fixed a bug that allowed attackers to hijack user accounts by tampering with their HTTP sessions.

πŸ“– Read

via "Naked Security".
?
10:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Many Ransomware Attacks Can be Stopped Before They Begin πŸ•΄

The tendency by many attackers to wait for the right time to strike gives defenders an opening, FireEye says.

πŸ“– Read

via "Dark Reading: ".
10:31
πŸ›  Lulzbuster 1.3.2 πŸ› 

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
10:44
πŸ” CovidLock ransomware exploits coronavirus with malicious Android app πŸ”

The app promises access to a coronavirus map tracker but instead holds your contacts and other data for ransom, DomainTools found.

πŸ“– Read

via "Security on TechRepublic".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hellman & Friedman Acquires Checkmarx for $1.15B πŸ•΄

The private equity firm will buy Checkmarx from Insight Partners, which will continue to own a minority interest.

πŸ“– Read

via "Dark Reading: ".
?
11:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Needed: A Cybersecurity Good Samaritan Law πŸ•΄

Legislation should protect the good hackers who are helping to keep us safe, not just go after the bad.

πŸ“– Read

via "Dark Reading: ".
?
12:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ InfoSec Pros Uncertain About Relationships With Partner Security Teams πŸ•΄

Only half of respondents to a recent Dark Reading study felt confident that their third-party business partners would, at least, tell them if a compromise occurred.

πŸ“– Read

via "Dark Reading: ".
12:29
πŸ” Cybersecurity risks grow as thousands of federal employees shift to telecommuting πŸ”

The Trump administration has ordered hundreds of thousands of federal employees to be prepared to work from home full time and use VPNs to connect to government systems.

πŸ“– Read

via "Security on TechRepublic".
12:33
❌ APT36 Taps Coronavirus as β€˜Golden Opportunity’ to Spread Crimson RAT ❌

The Pakistani-linked APT has been spotted infecting victims with data exfiltration malware.

πŸ“– Read

via "Threatpost".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization from security threats amidst the rise in telecommuters πŸ”

Security becomes a greater challenge as more people work from home due to the coronavirus. Learn how to better protect your organization and employees.

πŸ“– Read

via "Security on TechRepublic".
?
13:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ NordVPN Teams offers free accounts during coronavirus pandemic πŸ•΅


πŸ“– Read

via "VPNpro".
13:24
πŸ•΄ Remote Workforce Jumps 15% In Two Weeks πŸ•΄

Netskope reports the total number of remote employees is the highest it has ever observed.

πŸ“– Read

via "Dark Reading: ".
13:31
ATENTIONβ€Ό New - CVE-2019-11074

A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2018-21037

Subrion CMS 4.1.5 (and possibly earlier versions) allow CSRF to change the administrator password via the panel/members/edit/1 URI.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2018-18576

The Hustle (aka wordpress-popup) plugin through 6.0.5 for WordPress allows Directory Traversal to obtain a directory listing via the views/admin/dashboard/ URI.

πŸ“– Read

via "National Vulnerability Database".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ This Tax Season, Save the Scorn and Protect Customers from Phishing Scams πŸ•΄

As security professionals, it's easy to get cynical about the continued proliferation of tax ID theft and blame the consumers themselves. But that doesn't help anyone.

πŸ“– Read

via "Dark Reading: ".
?
15:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Lessons We've Learned (So Far) from COVID-19 πŸ•΄

Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.

πŸ“– Read

via "Dark Reading: ".
?
17:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Canadian Govt Prioritizing Rules Around Insider Threats πŸ”

Following a high profile espionage case, Canada is set to roll out a new set of protocols designed to stop insider threats within government departments.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Startup Offering Secure Access to Corporate Apps Emerges from Stealth πŸ•΄

Axis Security has raised $17 million in VC funding.

πŸ“– Read

via "Dark Reading: ".
?
18:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attorney General Directs DoJ to Prioritize Coronavirus Crime πŸ•΄

Criminal activity related to the pandemic cannot be tolerated, William Barr states in memo.

πŸ“– Read

via "Dark Reading: ".
19:03
❌ This Stalkerware Delivers Extra-Creepy Features ❌

Stalkerware called Monitor Minor gives users the ability to creep on a target’s missives swapped via Instagram, Skype and Snapchat.

πŸ“– Read

via "Threatpost".
19:03
❌ A COVID-19 Cybersecurity Poll: Securing a Remote Workforce ❌

COVID-19 is changing how we work. Weigh in on how your organization is securing its remote footprint with our short Threatpost poll.

πŸ“– Read

via "Threatpost".
18 March 2020
?
03:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-11939

Golang Facebook Thrift servers would not error upon receiving messages declaring containers of sizes larger than the payload. As a result, malicious clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2020.03.16.00.

πŸ“– Read

via "National Vulnerability Database".
?
06:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magecart Cyberattack Targets NutriBullet Website ❌

Researchers warn that a Magecart group has set up skimmers on the blender manufacturer's website, in hopes of stealing customer payment-card data.

πŸ“– Read

via "Threatpost".
?
08:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Human traffickers use social media oversharing to gain victims’ trust ⚠

Posts about money or family trouble are being used to gain trust by those who force victims into sex work or slavery, the FBI warns.

πŸ“– Read

via "Naked Security".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ DDoS attack on US Health agency part of coordinated campaign ⚠

It coincided with a disinformation campaign carried out via SMS, email and social media claiming that national quarantine was imminent.

πŸ“– Read

via "Naked Security".
?
09:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Uber to file federal suit against LA over users’ real-time location data ⚠

Real-time, in-trip geolocation data isn't good for traffic/bike lane planning, a draft of the suit says. What it's good for is surveillance.

πŸ“– Read

via "Naked Security".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ VMware patches virtualisation bugs ⚠

Virtualisation company VMware patched two bugs this week that affected a large proportion of its client-side virtual machines.

πŸ“– Read

via "Naked Security".
?
10:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Authorities Eye Using Mobile Phone Tracking COVID-19’s Spread ❌

Privacy advocates advise caution when tracking the movements of patients or those infected with the new coronavirus, as an effort to minimize the pandemic’s effect.

πŸ“– Read

via "Threatpost".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Adobe Discloses Dozens of Critical Photoshop, Acrobat Reader Flaws ❌

An out-of-band Adobe security update addressed critical flaws in Photoshop, Acrobat Reader and other products.

πŸ“– Read

via "Threatpost".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What the Battle of Britain Can Teach Us About Cybersecurity's Human Element πŸ•΄

During WWII, the British leveraged both technology and human intelligence to help win the war. Security leaders must learn the lessons of history and consider how the human element can make their machine-based systems more effective.

πŸ“– Read

via "Dark Reading: ".
11:29
πŸ” How to protect yourself from coronavirus-themed malware πŸ”

Attackers are using phishing emails, ransomware, and malicious apps to target people curious about the virus, says security firm Cybereason.

πŸ“– Read

via "Security on TechRepublic".
?
11:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to control what personal information people see in Android πŸ”

Do you know what information you share within the Google ecosystem? You can easily control what is visible or hidden, from with your Android device. Find out how.

πŸ“– Read

via "Security on TechRepublic".
?
12:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Trend Micro Patches Two Zero-Days Under Attack πŸ•΄

Businesses are urged to update the Apex One and OfficeScan XG enterprise security products as soon as possible.

πŸ“– Read

via "Dark Reading: ".
12:36
πŸ›  OpenSSL Toolkit 1.1.1e πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:36
πŸ›  Falco 0.21.0 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-11689

An issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl fail to properly validate server responses and pass unsanitized text to the system shell, resulting in code execution as root.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2019-11688

An issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl accept any certificate for asustornasapi.asustor.com. In other words, there is Missing SSL Certificate Validation.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2019-10682

django-nopassword before 5.0.0 stores cleartext secrets in the database.

πŸ“– Read

via "National Vulnerability Database".
13:31
ATENTIONβ€Ό New - CVE-2019-10146

A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser.

πŸ“– Read

via "National Vulnerability Database".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TrickBot Trojan Adds RDP Brute-Forcing to Its Arsenal ❌

A fresh module aims to compromise remote desktop accounts to access corporate resources.

πŸ“– Read

via "Threatpost".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ransomware: A security expert explains what makes us vulnerable and how to prevent it πŸ”

Ransomware attacks are still happening, and more employees need to be trained on how to prevent them.

πŸ“– Read

via "Security on TechRepublic".
14:59
πŸ” Ransomware: A security expert explains what makes us vulnerable and how to prevent it πŸ”

Ransomware attacks are still happening, and more employees need to be trained on how to prevent them.

πŸ“– Read

via "Security on TechRepublic".
15:03
❌ Trend Micro Fixes Critical Flaws Under Attack ❌

Fixes are now available for five critical and high-severity Trend Micro flaws, two of which are being actively targeted by attackers.

πŸ“– Read

via "Threatpost".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Facebook Got Tagged, but not Hard Enough πŸ•΄

Ensuring that our valuable biometric information is protected is worth more than a $550 million settlement.

πŸ“– Read

via "Dark Reading: ".
15:31
ATENTIONβ€Ό New - CVE-2019-10178

It was found that the Token Processing Service (TPS) did not properly sanitize the Token IDs from the "Activity" page, enabling a Stored Cross Site Scripting (XSS) vulnerability. An unauthenticated attacker could trick an authenticated victim into creating a specially crafted activity, which would execute arbitrary JavaScript code when viewed in a browser. All versions of pki-core are believed to be vulnerable.

πŸ“– Read

via "National Vulnerability Database".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 500,000 Documents Exposed in Open S3 Bucket Incident πŸ•΄

The open database exposed highly sensitive financial and business documents related to two financial organizations.

πŸ“– Read

via "Dark Reading: ".
16:29
πŸ” How a Nigerian cybercriminal earned more than $100,000 πŸ”

A savvy operator in Nigeria has bought items with stolen credit cards and used phishing and malware attacks to earn a healthy income, according to cybersecurity provider Check Point.

πŸ“– Read

via "Security on TechRepublic".
16:29
πŸ” How to better defend your organization against remote access threats πŸ”

With people working remotely due to the coronavirus, cybercriminals are trying to take advantage of such tools as VPNs and remote desktop services, says security firm Radware.

πŸ“– Read

via "Security on TechRepublic".
?
17:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Data Protection Authorities Issue Guidance on Processing COVID-19 Data πŸ”

Data protection authorities around the world are reiterating that in most scenarios, data protection laws do not stand in the way of the provision of healthcare and the management of public health issues.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-12124

An issue was discovered in ONAP APPC before Dublin. By using an exposed unprotected Jolokia interface, an unauthenticated attacker can read or overwrite an arbitrary file. All APPC setups are affected.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2019-12123

An issue was discovered in ONAP SDNC before Dublin. By executing sla/printAsXml with a crafted module parameter, an authenticated user can execute an arbitrary command. All SDC setups that include admportal are affected.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2019-12122

An issue was discovered in ONAP Portal through Dublin. By executing a call to ONAPPORTAL/portalApi/loggedinUser, an attacker who possesses a user's cookie may retrieve that user's password from the database. All Portal setups are affected.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2019-12121

An issue was detected in ONAP Portal through Dublin. By executing a padding oracle attack using the ONAPPORTAL/processSingleSignOn UserId field, an attacker is able to decrypt arbitrary information encrypted with the same symmetric key as UserId. All Portal setups are affected.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2019-12120

An issue was discovered in ONAP VNFSDK through Dublin. By accessing port 8000 of demo-vnfsdk-vnfsdk, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.

πŸ“– Read

via "National Vulnerability Database".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” COVID-19 brings new security challenges and new allies, says HackerOne CEO πŸ”

Commentary: Even as phishing and other attacks rise in the wake of COVID-19, white-hat hackers are readying their defenses.

πŸ“– Read

via "Security on TechRepublic".
18:01
ATENTIONβ€Ό New - CVE-2019-12119

An issue was discovered in ONAP SDC through Dublin. By accessing port 7000 of demo-sdc-sdc-wfd-fe pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.

πŸ“– Read

via "National Vulnerability Database".
18:01
ATENTIONβ€Ό New - CVE-2019-12118

An issue was discovered in ONAP SDC through Dublin. By accessing port 7001 of demo-sdc-sdc-wfd-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.

πŸ“– Read

via "National Vulnerability Database".
18:01
ATENTIONβ€Ό New - CVE-2019-12117

An issue was discovered in ONAP SDC through Dublin. By accessing port 4001 of demo-sdc-sdc-onboarding-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.

πŸ“– Read

via "National Vulnerability Database".
18:01
ATENTIONβ€Ό New - CVE-2019-12116

An issue was discovered in ONAP SDC through Dublin. By accessing port 6000 of demo-sdc-sdc-fe pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.

πŸ“– Read

via "National Vulnerability Database".
18:01
ATENTIONβ€Ό New - CVE-2019-12115

An issue was discovered in ONAP SDC through Dublin. By accessing port 4000 of demo-sdc-sdc-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.

πŸ“– Read

via "National Vulnerability Database".
18:01
ATENTIONβ€Ό New - CVE-2019-12114

An issue was discovered in ONAP HOLMES before Dublin. By accessing port 9202 of dep-holmes-engine-mgmt pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.

πŸ“– Read

via "National Vulnerability Database".
18:01
ATENTIONβ€Ό New - CVE-2019-12113

An issue was discovered in ONAP SDNC before Dublin. By executing sla/printAsGv with a crafted module parameter, an authenticated user can execute an arbitrary command. All SDC setups that include admportal are affected.

πŸ“– Read

via "National Vulnerability Database".
18:01
ATENTIONβ€Ό New - CVE-2019-12112

An issue was discovered in ONAP SDNC before Dublin. By executing sla/upload with a crafted filename parameter, an unauthenticated attacker can execute an arbitrary command. All SDC setups that include admportal are affected.

πŸ“– Read

via "National Vulnerability Database".
?
18:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ TrickBot Module Takes Aim at Remote Desktops πŸ•΄

The module, still in development, focuses on compromising Windows systems by brute-forcing accounts via the Remote Desktop Protocol.

πŸ“– Read

via "Dark Reading: ".
18:24
πŸ•΄ Process Injection Tops Attacker Techniques for 2019 πŸ•΄

Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows.

πŸ“– Read

via "Dark Reading: ".
18:33
❌ Azure Red Flag: Microsoft Accidentally Fixes Cloud Config β€˜Bug’ ❌

Researchers detail a misconfiguration in Microsoft’s Azure cloud platform that could have given hackers carte blanche access to a targeted company's cloud services.

πŸ“– Read

via "Threatpost".
18:33
❌ WordPress, Apache Struts Attract the Most Bug Exploits ❌

An analysis found these web frameworks to be the most-targeted by cybercriminals in 2019.

πŸ“– Read

via "Threatpost".
?
18:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Skimmer May Have Put NutriBullet Customers' Card Data at Risk for Nearly a Month πŸ•΄

Blender maker is the latest victim of Magecart.

πŸ“– Read

via "Dark Reading: ".
18:59
πŸ” Libya-based hackers using coronavirus pandemic to spread mobile surveillance malware πŸ”

The drastic spread of coronavirus across the world has not stopped cybercriminals from exploiting fear to hack into devices.

πŸ“– Read

via "Security on TechRepublic".
?
20:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Android malware uses coronavirus for sextortion and ransomware combo ⚠

The app says it will notify you of coronavirus cases... but in fact it locks up your phone and sextorts you for money at the same time

πŸ“– Read

via "Naked Security".
19 March 2020
?
08:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook accidentally blocks genuine COVID-19 news ⚠

Facebook is denying that a recent content moderation glitch has anything to do with workforce issues, but blames automatic systems.

πŸ“– Read

via "Naked Security".
?
08:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Delayed Adobe patches fix long list of critical flaws ⚠

This week the company made amends, issuing fixes for an unusually high CVE-level 41 vulnerabilities, 21 of which are rated critical.

πŸ“– Read

via "Naked Security".
?
09:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Quantifying Cyber Risk: Why You Must & Where to Start πŸ•΄

Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them.

πŸ“– Read

via "Dark Reading: ".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cryptojacking is almost conquered – crushed along with coinhive.com ⚠

Cryptojacking may not be entirely gone following the shutdown of notorious cryptomining service Coinhive - but it's drastically diminished.

πŸ“– Read

via "Naked Security".
?
10:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” IT security report finds 97% have suspicious network activity πŸ”

The suspicious network activities revealed in the research by Positive Technologies are traffic hiding, VPN tunneling, connections to the Tor anonymous network, and network proxying.

πŸ“– Read

via "Security on TechRepublic".
11:03
❌ What is the Best Defense Against Phishing Attacks? ❌

While many view phishing as a small annoyance, this attack method has maintained longevity for a reason and is still the number one cause of data breaches.

πŸ“– Read

via "Threatpost".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Achieving DevSecOps Requires Cutting Through the Jargon πŸ•΄

Establishing a culture where security can work easily with developers starts with making sure they can at least speak the same language.

πŸ“– Read

via "Dark Reading: ".
11:24
πŸ•΄ Cyber Resilience Benchmarks 2020 πŸ•΄

Here are four things that separate the leaders from the laggards when fighting cyber threats.

πŸ“– Read

via "Dark Reading: ".
11:24
πŸ•΄ TA505 Targets HR Departments with Poisoned CVs πŸ•΄

Infamous cybercrime organization spotted in attacks that employ legitimate software -- and Google Drive.

πŸ“– Read

via "Dark Reading: ".
11:29
πŸ” Healthcare devices at higher cybersecurity risk now due to COVID-19 πŸ”

Much of the US healthcare system is running on outdated software and unsupported operating systems, such as Windows 7, leaving devices vulnerable to hackers who are actively exploiting the coronavirus.

πŸ“– Read

via "Security on TechRepublic".
?
11:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Study Calls Common Risk Figure into Question πŸ•΄

Many risk models use a commonly quoted number -- $150 per record -- to estimate the cost of an incident. A new study from the Cyentia Institute says misusing that number means that estimates are almost never accurate.

πŸ“– Read

via "Dark Reading: ".
12:03
❌ Cloud Misconfig Mistakes Show Need For DevSecOps ❌

Unit 42 researchers discuss public cloud misconfiguration issues that are leading to breaches of sensitive data.

πŸ“– Read

via "Threatpost".
?
12:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ VPN Usage Surges as More Nations Shut Down Offices πŸ•΄

As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the year.

πŸ“– Read

via "Dark Reading: ".
12:39
⚠ NIST shared dataset of tattoos that’s been used to identify prisoners ⚠

The EFF got in touch with the institutions that have the dataset. Some deleted it, while one refused and others didn't bother to respond.

πŸ“– Read

via "Naked Security".
12:54
πŸ•΄ DDoS Attack Targets German Food Delivery Service πŸ•΄

Liefrando delivers food from more than 15,000 restaurants in Germany, where people under COVID-19 restrictions depend on the service.

πŸ“– Read

via "Dark Reading: ".
12:59
πŸ” How to control what personal information people see in Android πŸ”

Do you know what information you share within the Google ecosystem? You can easily control what is visible or hidden, from with your Android device. Find out how.

πŸ“– Read

via "Security on TechRepublic".
13:03
❌ Cisco Warns of High-Severity SD-WAN Flaws ❌

The high-severity flaws exist in the products using SD-WAN software earlier than Release 19.2.2.

πŸ“– Read

via "Threatpost".
13:06
πŸ›  TOR Virtual Network Tunneling Tool 0.4.2.7 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-12128

In ONAP SO through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All ONAP Operations Manager (OOM) setups are affected.

πŸ“– Read

via "National Vulnerability Database".
?
14:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to listen to port traffic on a Linux server πŸ”

Every network administrator needs to know how to listen to port traffic on a server. Here's one way to do it on Linux.

πŸ“– Read

via "Security on TechRepublic".
?
15:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-11361

Zoho ManageEngine Remote Access Plus 10.0.258 does not validate user permissions properly, allowing for privilege escalation and eventually a full application takeover.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2014-2723

In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2014-2722

In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2014-2721

In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect.

πŸ“– Read

via "National Vulnerability Database".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” COVID-19 demonstrates the need for disaster recovery and business continuity plans πŸ”

The coronavirus may put organizations at risk through short staffing or unavailable workers and services, but disaster recovery and business continuity plans can help sustain business operations.

πŸ“– Read

via "Security on TechRepublic".
15:59
πŸ” Cybercriminals exploiting coronavirus outbreak with virus-themed sales on the dark web πŸ”

Malicious COVID-19 domains and special virus-themed sales on the dark web are two ways criminals are using the outbreak to ramp up business, said security provider Check Point.

πŸ“– Read

via "Security on TechRepublic".
16:06
πŸ” Senators Press Google on Coronavirus Tracking, Screening Site Privacy πŸ”

Privacy-conscious Senators are worried that technology used by the government to prevent the coronavirus from spreading could be exploited for profit and fear.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Bring sanity and security to infection outbreaks with a malware response plan πŸ”

Find out how to deal with a security breach and protect your data and your network from another attack using this 37-step incident response checklist.

πŸ“– Read

via "Security on TechRepublic".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Infrared AI cameras at polling places could spot voters with a fever to detect potential coronavirus carriers πŸ”

Security company is using thermal imaging and AI to identify people with a temperature of 100 degrees.

πŸ“– Read

via "Security on TechRepublic".
?
19:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Coronavirus Poll: Cyberattacks Ramp Up as Work from Home Takes Hold ❌

A poll of Threatpost readers shows that security preparedness is uneven as organizations make an unprecedented transition to remote working.

πŸ“– Read

via "Threatpost".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Misconfigured Elasticsearch Instance Exposes More Than 5 Billion Records πŸ•΄

The collections contained information collected by a UK research firm on data breaches from the years 2012 to 2019.

πŸ“– Read

via "Dark Reading: ".
?
20:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€˜Dirty little secret’ extortion email threatens to give your family coronavirus ⚠

...And it's got your password as "proof".

πŸ“– Read

via "Naked Security".
20 March 2020
?
02:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-20335

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can trigger a DoS of the httpd service via the /APP_Installation.asp?= URI.

πŸ“– Read

via "National Vulnerability Database".
02:32
ATENTIONβ€Ό New - CVE-2018-20334

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.

πŸ“– Read

via "National Vulnerability Database".
02:32
ATENTIONβ€Ό New - CVE-2018-20333

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can request /update_applist.asp to see if a USB device is attached to the router and if there are apps installed on the router.

πŸ“– Read

via "National Vulnerability Database".
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Location-tracking wristbands required on all incoming travelers to Hong Kong ⚠

The government says the wristband isn't privacy-invading because it won't track your location, per se; just if you wander from COVID-19 quarantine.

πŸ“– Read

via "Naked Security".
?
09:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ COVID-19 disruption delays release of Chrome version 81 ⚠

It’s the COVID-19 shortage nobody expected - not toilet rolls, tinned goods or headache pills this time but Google software engineers.

πŸ“– Read

via "Naked Security".
?
10:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Mirai Variant β€˜Mukashi’ Targets Zyxel NAS Devices ❌

The botnet exploits a vulnerability discovered last month that can allow threat actors to remotely compromise and control devices.

πŸ“– Read

via "Threatpost".
?
10:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attack Surface, Vulnerabilities Increase as Orgs Respond to COVID-19 Crisis πŸ•΄

In typical fashion, attackers are gearing up to take advantage of the surge in teleworking prompted by the pandemic.

πŸ“– Read

via "Dark Reading: ".
11:03
❌ Covid-19 Spurs Facial Recognition Tracking, Privacy Fears ❌

The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues need to be top of mind, tech experts warn.

πŸ“– Read

via "Threatpost".
11:17
πŸ” Friday Five: 3/20 Edition πŸ”

Hackers take advantage of the COVID-19 pandemic, Magecart group targets NutriBullet, and many countries at risk for violating data privacy laws - catch up on the week's infosec news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
11:23
πŸ•΄ Security Ratings Are a Dangerous Fantasy πŸ•΄

They don't predict breaches, and they don't help people make valuable business decisions or make users any safer.

πŸ“– Read

via "Dark Reading: ".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Exchange rate service’s customer details hacked via AWS ⚠

Online exchange rate data provider Open Exchange Rates has exposed an undisclosed amount of user data via an Amazon database.

πŸ“– Read

via "Naked Security".
?
12:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” TrickBot and Emotet strains make process injection most prevalent attack technique πŸ”

A Red Canary study analyzed six million leads to determine threats and found that worms had the most significant impact in 2019.

πŸ“– Read

via "Security on TechRepublic".
12:33
πŸ” Network address-based security: How to implement better controls πŸ”

Traditional network address-based security controls aren't as effective for the cloud or internal networks. Here's what to do about these security issues.

πŸ“– Read

via "Security on TechRepublic".
?
13:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10221

A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server. This flaw is caused by missing sanitization of the GET URL parameters. An attacker could abuse this flaw to trick an authenticated user into clicking a specially crafted link which can execute arbitrary code when viewed in a browser.

πŸ“– Read

via "National Vulnerability Database".
13:32
ATENTIONβ€Ό New - CVE-2019-10179

A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.

πŸ“– Read

via "National Vulnerability Database".
?
14:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create a Kubernetes security policy πŸ”

If you're looking to take your Kubernetes security to the next level, you'll want to start working with pod security policies. Here's a quick introduction to this feature.

πŸ“– Read

via "Security on TechRepublic".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Proof of Concept Released for kr00k Wi-Fi Vulnerability πŸ•΄

The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.

πŸ“– Read

via "Dark Reading: ".
14:36
⚠ Trolls ZoomBomb work-from-home videocall with filth ⚠

Trolls have been joining videoconferencing calls to expose meeting participants to disturbing videos.

πŸ“– Read

via "Naked Security".
14:36
⚠ S2 Ep31: Remote working, malwareless ransomware and EARN IT – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
?
15:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to deal with network security and bandwidth issues during the coronavirus pandemic πŸ”

Experts discuss what precautions companies need to be taking right now that a record number of people are working outside of offices.

πŸ“– Read

via "Security on TechRepublic".
?
16:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap, Coronavirus Edition: WFH Security Woes, Pwn2Own ❌

Threatpost editors discuss this week's top news stories from COVID-19 themed malware attacks to Pwn2Own updates.

πŸ“– Read

via "Threatpost".
?
16:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Dark Reading Cybersecurity Crossword Puzzle πŸ•΄

Here's a little something to snuggle up with if you're on lockdown.

πŸ“– Read

via "Dark Reading: ".
?
17:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Defying Covid-19’s Pall: Pwn2Own Goes Virtual ❌

Hacking contest goes virtual with participants remotely winning $295k in prizes for taking down Adobe Reader, Safari and Ubuntu.

πŸ“– Read

via "Threatpost".
?
18:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Revamped HawkEye Keylogger Swoops in on Coronavirus Fears ❌

Emails claiming to be directly from WHO’s Dr. Tedros Adhanom Ghebreyesus offer "drug advice" -- and malware infections.

πŸ“– Read

via "Threatpost".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 200M Records of US Citizens Leaked in Unprotected Database πŸ•΄

Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.

πŸ“– Read

via "Dark Reading: ".
?
21:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-11574

An issue was discovered in Simple Machines Forum (SMF) before release 2.0.17. There is SSRF related to Subs-Package.php and Subs.php because user-supplied data is used directly in curl calls.

πŸ“– Read

via "National Vulnerability Database".
21 March 2020
?
02:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-7487

On Swann DVR04B, DVR08B, DVR-16CIF, and DVR16B devices, raysharpdvr application has a vulnerable call to Ò€&oelig;systemҀ�, which allows remote attackers to execute arbitrary code via TCP port 9000.

πŸ“– Read

via "National Vulnerability Database".
?
13:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  GNU Privacy Guard 2.2.20 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
23 March 2020
?
07:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 23 stories of the week ⚠

From the EARN IT Act to the Martinelli hoax - and everything in between. It’s your weekly security roundup.

πŸ“– Read

via "Naked Security".
?
08:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Bitwarden Review πŸ•΅


πŸ“– Read

via "VPNpro".
?
09:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox is dropping FTP support ⚠

Heads up, Firefox users who rely on FTP: the browser is eliminating support for this venerable protocol.

πŸ“– Read

via "Naked Security".
09:47
⚠ Stolen data of company that refused REvil ransom payment now on sale ⚠

A comment from one buyer of data purportedly from Brooks International: "It even has credit card number & a password. lol !!"

πŸ“– Read

via "Naked Security".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Tour guide/Chinese spy gets four years for SD card dead drops ⚠

The dead drops were very James Bond: once, the data mule taped the SD card to the underside of a desk in a hotel.

πŸ“– Read

via "Naked Security".
10:17
⚠ Cisco issues urgent fixes for SD-WAN router flaws ⚠

Cisco has patched a clutch of high-priority vulnerabilities in its SD-WAN routes and their management software.

πŸ“– Read

via "Naked Security".
?
11:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ From Zero to Hero: CISO Edition πŸ•΄

It's time for organizations to realize that an empowered CISO can effectively manage enterprise risk and even grow the business along the way.

πŸ“– Read

via "Dark Reading: ".
11:33
πŸ” 3 ways to revamp the hiring process for cybersecurity jobs πŸ”

Deloitte expert recommends using tactics to compete for the pool of security pros, including offering new incentives like student loan repayment.

πŸ“– Read

via "Security on TechRepublic".
?
12:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Fake Coronavirus β€˜Vaccine’ Website Busted in DoJ Takedown ❌

Authorities have cracked down on a website that claimed to give out coronavirus vaccine kits - but that was actually stealing victims' payment card data and personal information.

πŸ“– Read

via "Threatpost".
?
13:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Infosec Page-Turners for Days Spent Indoors πŸ•΄

Stuck inside and looking for a new read? Check out these titles written by security practitioners and reporters across the industry.

πŸ“– Read

via "Dark Reading: ".
?
13:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-11022

NETGEAR Prosafe WC9500 5.1.0.17, WC7600 5.1.0.17, and WC7520 2.5.0.35 devices allow a remote attacker to execute code with root privileges via shell metacharacters in the reqMethod parameter to login_handler.php.

πŸ“– Read

via "National Vulnerability Database".
?
14:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybercriminals now recycling standard phishing emails with coronavirus themes πŸ”

The latest malicious COVID-19 campaigns are repurposing conventional phishing emails with a coronavirus angle, says security trainer KnowBe4.

πŸ“– Read

via "Security on TechRepublic".
?
14:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Warns of Fake CDC Emails in COVID-19 Phishing Alert πŸ•΄

Fraudsters exploit concerns by claiming to offer virus-related information or promising stimulus checks.

πŸ“– Read

via "Dark Reading: ".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WhatsApp β€œMartinelli” hoax is back, warning about β€œDance of the Pope” ⚠

Two old WhatsApp hoaxes are back, with a grain-of-truth story in the middle to add a veneer of believability. Don't spread this stuff!

πŸ“– Read

via "Naked Security".
15:22
πŸ›  Hyperion Runtime Encrypter 2.3 πŸ› 

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
15:22
πŸ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.10 πŸ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
15:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization and remote workers against ransomware πŸ”

Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services.

πŸ“– Read

via "Security on TechRepublic".
15:55
❌ Microsoft Warns of Critical Windows Zero-Day Flaws ❌

The unpatched Windows zero day flaws are being exploited in "limited, targeted" attacks, according to Microsoft.

πŸ“– Read

via "Threatpost".
?
18:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ex-Google Engineer Pleads Guilty to Trade Secret Theft πŸ”

Ex-Google engineer Anthony Levandowski plead guilty to trade secret theft last week, acknowleding he took a sensitive Google file before joining Uber.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
18:25
❌ Hackers Actively Exploit 0-Day in CCTV Camera Hardware ❌

Criminals behind botnets Chalubo, FBot and Moobot attack unpatched vulnerabilities in the commercial DVRs made by LILIN.

πŸ“– Read

via "Threatpost".
18:25
❌ Apache Tomcat Exploit Poised to Pounce, Stealing Files ❌

Researchers said that a working exploit for CVE-2020-1938 leaked on GitHub makes is a snap to compromise webservers.

πŸ“– Read

via "Threatpost".
18:28
πŸ•΄ 538 Million Weibo Users' Info for Sale on Dark Web πŸ•΄

The user data, which does not include passwords, purportedly comes from a mid-2019 breach.

πŸ“– Read

via "Dark Reading: ".
18:28
πŸ•΄ Three Ways Your BEC Defense Is Failing & How to Do Better πŸ•΄

Business email compromises cost the economy billions of dollars. Experts have advice on how to stop them from hitting you for millions at a pop.

πŸ“– Read

via "Dark Reading: ".
?
18:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Publishes Advisory for Windows Zero-Day πŸ•΄

There is no available patch for the vulnerabilities, which Microsoft says exist in all supported versions of Windows.

πŸ“– Read

via "Dark Reading: ".
24 March 2020
?
07:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Feds shut down bogus COVID-19 vaccine site ⚠

A vaccine for $4.95!? Nah, we didn't think so, either. Shuttering the alleged rip-off site is the DOJ's 1st takedown of COVID-19 flimflam.

πŸ“– Read

via "Naked Security".
?
08:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Top VPNs are recording users and potentially leaking their data when they visit their website πŸ•΅


πŸ“– Read

via "VPNpro".
?
09:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft Defender for Linux is coming. This is what you need to know πŸ”

Microsoft's security tools extend beyond the company's own platforms. While the ambition for Defender for Linux is broad, the first preview is aimed just at servers and does less than on Windows.

πŸ“– Read

via "Security on TechRepublic".
09:17
⚠ Russia’s FSB wanted its own IoT botnet ⚠

If you thought the Mirai botnet was bad, what about a version under the control of Russia's military that it could point like an electronic cannon at people it didn't like?

πŸ“– Read

via "Naked Security".
09:17
⚠ Facebook Messenger may ban mass-forwarding of messages ⚠

Facebook has done this before: it did it with WhatsApp, following an outbreak of lynchings sparked by viral social media hoaxes.

πŸ“– Read

via "Naked Security".
?
10:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tekya Malware Threatens Millions of Android Users via Google Play ❌

The ad-fraud malware lurks in dozens of childrens' and utilities apps.

πŸ“– Read

via "Threatpost".
10:25
❌ Domain Name Security: Important Measures You Need to Know ❌

A domain name that points to a website hosting your generated content is still one of the most secure means to ensure that an online identity does not fall prey to hackers or hijackers.

πŸ“– Read

via "Threatpost".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 tips for securely working from home πŸ”

As working from home becomes more common for tech workers, ensuring proper security measures is important. Tom Merritt offers five security tips for employees working from home.

πŸ“– Read

via "Security on TechRepublic".
10:41
πŸ” Top 5 tips for securely working from home πŸ”

As working from home becomes more common for tech workers, ensuring proper security measures is important. Tom Merritt offers five security tips for employees working from home.

πŸ“– Read

via "Security on TechRepublic".
?
11:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Vulnerability Management Isn't Just a Numbers Game πŸ•΄

Attackers work 24/7, so you have to be vigilant around the clock. Time for some game theory.

πŸ“– Read

via "Dark Reading: ".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Akamai adds secure web gateway capabilities to threat service πŸ”

Responding to customer demand, the company is bringing something new to its Enterprise Threat Protector.

πŸ“– Read

via "Security on TechRepublic".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Automated Tools Make Cyberattacks Easier to Pull Off πŸ•΄

Gone are the days when threat actors had to actually spend time and effort planning and developing an attack on their own, Recorded Future says.

πŸ“– Read

via "Dark Reading: ".
?
12:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybercriminals' Promises to Pause During Pandemic Amount to Little πŸ•΄

As pandemic worsens, online profiteering -- from fraudsters to ransomware operators to cybercriminal hacking -- continues unabated, despite some promises from the underground.

πŸ“– Read

via "Dark Reading: ".
13:10
πŸ•΅ VPN usage soars as coronavirus spreads πŸ•΅


πŸ“– Read

via "VPNpro".
?
14:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Adobe Flaw Fixed in Out-of-Band Security Update ❌

Adobe has fixed a critical flaw in its Creative Cloud Desktop Application for Windows.

πŸ“– Read

via "Threatpost".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Secure Your Kubernetes Deployments πŸ•΄

As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.

πŸ“– Read

via "Dark Reading: ".
15:28
πŸ•΄ New APT Targets Middle Eastern Victims πŸ•΄

The new malware, dubbed "Milum," can take control of industrial devices.

πŸ“– Read

via "Dark Reading: ".
15:28
πŸ•΄ Malware Found Hidden in Android Utility Apps, Children's Games πŸ•΄

The 'Tekya' malware, as researchers call it, is designed to imitate the user's actions to click advertisements.

πŸ“– Read

via "Dark Reading: ".
?
16:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” NYDFS Asks Financial Services Organizations for COVID-19 Preparedness Plans πŸ”

The New York Department of Financial Services is asking all regulated organizations to provide them with a COVID-19 preparedness plan, including an assessment of how susceptible each entity would be to increased cyberattacks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WHO Targeted in Espionage Attempt, COVID-19 Cyberattacks Spike ❌

The DarkHotel group could have been looking for information on tests, vaccines or trial cures.

πŸ“– Read

via "Threatpost".
?
18:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Covid-19 Privacy Poll: Phone Tracking, Public Health and Surveillance ❌

Is sacrificing your personal privacy worth flattening the coronavirus infection curve? Weigh in on our Threatpost poll.

πŸ“– Read

via "Threatpost".
18:25
❌ Unknown β€˜WildPressure’ Malware Campaign Lets Off Steam in Middle East ❌

The cyberattacks -- some on industrial targets -- use a previously unknown trojan dubbed Milum.

πŸ“– Read

via "Threatpost".
?
18:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Attackers Could Use Azure Apps to Sneak into Office 365 πŸ•΄

Microsoft 365 account holders are cautioned to pay attention to unknown applications that request permissions.

πŸ“– Read

via "Dark Reading: ".
?
23:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hackers target World Health Organization in attempt to steal passwords πŸ”

Hacking attempts against the health organization and its partners have jumped as they struggle to battle the coronavirus.

πŸ“– Read

via "Security on TechRepublic".
25 March 2020
?
00:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Coronavirus-related digital fraud: 22% of Americans targeted πŸ”

A TransUnion report details how COVID-19 has impacted online shopping and fraud.

πŸ“– Read

via "Security on TechRepublic".
?
01:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Data-layer security is a new imperative as employees telecommute due to coronavirus πŸ”

Commentary: COVID-19 has laid bare our need to take a new, more data-centric approach to security in light of more people working from home.

πŸ“– Read

via "Security on TechRepublic".
?
07:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Infrastructure cyberattacks biggest concern for global IT security leaders πŸ”

A study on industrial cybersecurity focused on the biggest security threats for the enterprise.

πŸ“– Read

via "Security on TechRepublic".
07:47
⚠ Battling the global COVID-19 scammers and fake news hawkers ⚠

Europol seized 34K fake surgical masks, while the office of NY's AG wants registrars to explain how they're battling the sale of lies.

πŸ“– Read

via "Naked Security".
?
08:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hackers target WHO in phishing attack ⚠

A cyberattack that targeted the World Health Organization is probably just the tip of the iceberg according to experts reacting to the news this week.

πŸ“– Read

via "Naked Security".
?
08:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Your unused computer can help find a COVID-19 cure ⚠

Put it to work for the Folding@Home distributed computing project to uncover how the virus's spikes latch on and how they can be blocked.

πŸ“– Read

via "Naked Security".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Windows has a zero-day that won’t be patched for weeks ⚠

Cybercriminals are exploiting two unpatched zero-day flaws affecting all supported versions of Windows, Microsoft has warned.

πŸ“– Read

via "Naked Security".
10:25
❌ Apple Safari Blocks Ad-Targeting Cookie Support ❌

The move follows Google’s announcement last May that it would do the same in Chrome by 2022.

πŸ“– Read

via "Threatpost".
10:25
❌ TrickBot App Bypasses Non-SMS Banking 2FA ❌

TrickBot victims are being fooled into downloading an app that records their screens - stealing non-SMS 2FA passcodes for banking websites.

πŸ“– Read

via "Threatpost".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Boost security defenses against Kwampirs RAT malware with new list of IOCs πŸ”

ReversingLabs did a forensic analysis of attacks from the remote access trojan to understand the malware control structure.

πŸ“– Read

via "Security on TechRepublic".
?
11:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ COVID-19: Getting Ready for the Next Business Continuity Challenge πŸ•΄

What comes after you've empowered your remote workforce in the wake of the coronavirus pandemic? Dealing with a large portion of that workforce getting sick at the same time.

πŸ“– Read

via "Dark Reading: ".
?
11:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Shutters Russian-Based Hacker Platform, Makes Arrest πŸ•΄

The Deer.io platform let cybercriminals buy access to virtual storefronts where they could sell illicit products and services.

πŸ“– Read

via "Dark Reading: ".
?
12:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ GE Employees Lit Up with Sensitive Doc Breach ❌

Marriage, divorce and death certificates, beneficiary info, passports and more were all caught up in an email takeover hack.

πŸ“– Read

via "Threatpost".
?
13:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-19127

An authentication bypass vulnerability is present in the standalone SITS:Vision 9.7.0 component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This occurs because the Uniface TLS Driver is not enabled by default. This vulnerability allows attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does.

πŸ“– Read

via "National Vulnerability Database".
13:55
❌ Chinese Hackers Exploit Cisco, Citrix Flaws in Massive Espionage Campaign ❌

Researchers say that APT41's exploits are part of one of the broadest espionage campaigns they've seen from a Chinese-linked actor "in recent years."

πŸ“– Read

via "Threatpost".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Organizations are moving their security to the cloud, but concerns remain πŸ”

Businesses see advantages in migrating to cloud-based security tools but are worried about such issues as data privacy and unauthorized access, says Exabeam.

πŸ“– Read

via "Security on TechRepublic".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Do DevOps Teams Need a Company Attorney on Speed Dial? πŸ•΄

In today's regulatory and legislative environment, companies and individuals are exposed to lawsuits over security breaches, resulting in significant fines and ending careers.

πŸ“– Read

via "Dark Reading: ".
?
16:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What Should I Do If My Company Is Being Impersonated in a Phishing Campaign? πŸ•΄

Two security awareness advocates from KnowBe4 provide some solid suggestions.

πŸ“– Read

via "Dark Reading: ".
?
17:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-18626

Harris Ormed Self Service before 2019.1.4 allows an authenticated user to view W-2 forms belonging to other users via an arbitrary empNo value to the ORMEDMIS/Data/PY/T4W2Service.svc/RetrieveW2EntriesForEmployee URI, thus exposing sensitive information including employee tax information, social security numbers, home addresses, and more.

πŸ“– Read

via "National Vulnerability Database".
?
18:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Update Fixes WebKit Flaws in iOS, Safari ❌

Apple's security update included a slew of vulnerabilities in various components of iOS, macOS and Safari - the most severe of which could enable remote code execution.

πŸ“– Read

via "Threatpost".
?
18:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Tupperware Hit By Card Skimmer Attack πŸ•΄

Malicious code was found hidden inside graphics files on the storage container maker's e-commerce website.

πŸ“– Read

via "Dark Reading: ".
18:58
πŸ•΄ Missing Patches, Misconfiguration Top Technical Breach Causes πŸ•΄

Less than half of businesses surveyed can patch critical vulnerabilities within 72 hours. Why does the process take so long?

πŸ“– Read

via "Dark Reading: ".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” DoD's Data Access Program Needs Oversight, Evaluation πŸ”

The Department of Defense and its research facilities could be taking more steps to ensure steps around data protection are taken when sharing sensitive data, a federal audit revealed.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
26 March 2020
?
07:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tokyo Olympics Postponed, But 5G Security Lessons Shine ❌

Threatpost Senior Editor Tara Seals is joined by Russ Mohr, engineer and Apple evangelist at MobileIron along with Jerry Ray, COO at SecureAge, for a discussion about the now postponed Tokyo Games and its use of 5G and the myriad of security concerns Japan is preparing for.

πŸ“– Read

via "Threatpost".
?
08:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5 things SMB IT departments should do to survive the impact of COVID-19 πŸ”

The overnight transformation to telecommuting means security risks are even higher than during normal business times.

πŸ“– Read

via "Security on TechRepublic".
?
09:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is Microsoft Azure Sphere? Everything you need to know πŸ”

Microsoft locks down the Internet of Things with its own Linux.

πŸ“– Read

via "Security on TechRepublic".
09:19
⚠ Hijacked Twitter accounts used to advertise face masks ⚠

The accounts were used to advertise a site selling products made scarce by COVID-19: face masks, forehead thermometers and toilet paper.

πŸ“– Read

via "Naked Security".
09:19
⚠ Adobe issues emergency fix for file-munching bug ⚠

Adobe has released another security patch outside of its usual routine, to deal with a bug that allows attackers to delete victims' files.

πŸ“– Read

via "Naked Security".
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ China-Based Threat Group Launches Widespread Malicious Campaign πŸ•΄

The motives behind the attacks remain unclear, but likely triggers include the ongoing trade war between the US and China and the unfolding COVID-19 pandemic.

πŸ“– Read

via "Dark Reading: ".
10:19
⚠ Apple iOS 13.4 offers fixes for 30 vulnerabilities ⚠

Apple has just announced its latest something for everyone security and feature updates for iOS, iPadOS, macOS, watchOS, and tvOS.

πŸ“– Read

via "Naked Security".
10:29
❌ Responding to the New Normal: How to Prevent Added Risk in Your Business ❌

With more employees than ever working remotely, there are numerous potential threats that organizations must be aware of.

πŸ“– Read

via "Threatpost".
10:41
πŸ” How 4G and 5G networks are vulnerable to Denial-of-Service attacks πŸ”

Existing 4G and early 5G networks use Diameter signaling protocol, which contains certain security holes that can lead to a range of attacks, says enterprise security provider Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
?
11:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple Safari now blocks all third-party cookies by default ⚠

Starting in 13.1, advertisers and analytics firms can't track us through browser cookies. Apple says this also kills login fingerprinting.

πŸ“– Read

via "Naked Security".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Introducing Zero-Trust Access πŸ•΄

It's too early to tell whether ZTA will be a VPN killer or not, but major players are ramping up products in this new class of security technology that focuses on the cloud.

πŸ“– Read

via "Dark Reading: ".
11:41
πŸ” How hackers are using COVID-19 fears to push new scams and malware πŸ”

Cybercriminals may be staying home, but they're not taking a break from phishing attempts and password hacking during the coronavirus outbreak.

πŸ“– Read

via "Security on TechRepublic".
11:52
ATENTIONβ€Ό New - CVE-2019-15796

Python-apt doesn't check if hashes are signed in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py or in `_fetch_archives()` of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn't be allowed and has been fixed in verisions 1.9.5, 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

πŸ“– Read

via "National Vulnerability Database".
11:59
❌ Hackers Hijack Routers to Spread Malware Via Coronavirus Apps ❌

The router DNS hijacking attacks have targeted more than a thousand victims with the Oski info-stealing malware.

πŸ“– Read

via "Threatpost".
12:02
πŸ•΅ KeePassXC Review πŸ•΅


πŸ“– Read

via "VPNpro".
12:02
πŸ•΅ Myki Review πŸ•΅


πŸ“– Read

via "VPNpro".
12:16
πŸ›  nullscan 1.0.0 πŸ› 

nullscan is a modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs corresponding modules and their nullscan-tools afterwards. It can also take hosts and start nmap first in order to perform a basic portscan and run the modules afterwards. Also, nullscan can parse a given nmap logfile for open tcp and udp ports and again run the modules afterwards. All results will be logged in specified directories with a clean structure and an HTML report can subsequently be generated.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:19
⚠ Watch out! Scummy scammers target home deliveries ⚠

Anxiously waiting for a home delivery? Don't be tricked by a message that says there's a problem with your address...

πŸ“– Read

via "Naked Security".
12:22
ATENTIONβ€Ό New - CVE-2019-15795

python-apt only checks the MD5 sums of downloaded files in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py in version 1.9.0ubuntu1 and earlier. This allows a man-in-the-middle attack which could potentially be used to install altered packages and has been fixed in versions 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

πŸ“– Read

via "National Vulnerability Database".
12:34
πŸ•΄ Technology Empowers Pandemic Response, But Privacy Worries Remain πŸ•΄

As technology companies and the medical community work to find ways to track and test for the virus, privacy might fall by the wayside.

πŸ“– Read

via "Dark Reading: ".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ As Zoom Booms Incidents of β€˜ZoomBombing’ Become a Growing Nuisance ❌

Numerous instances of online conferences being disrupted by pornographic images, hate speech or even threats can be mitigated using some platform tools.

πŸ“– Read

via "Threatpost".
?
14:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hackers hijacking home routers to direct people to malicious coronavirus app πŸ”

The attackers are changing DNS settings on Linksys routers to redirect users to a malicious website promising an informative COVID-19 app, says security provider BitDefender.

πŸ“– Read

via "Security on TechRepublic".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Emerging APT Mounts Mass iPhone Surveillance Campaign ❌

The malware, the work of a new APT called TwoSail Junk, allows deep surveillance and total control over iOS devices.

πŸ“– Read

via "Threatpost".
15:03
πŸ” Digital Guardian Named to JMP Securities 2020 Elite 80 List πŸ”

JMP Securities has announced its annual Elite 80 list and we're pleased to report Digital Guardian is on it!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tupperware Cyberattack Stores Away Customer Payment Cards ❌

The food container company's main website had a card skimmer that scooped up online customers' payment card data.

πŸ“– Read

via "Threatpost".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to safely work from home during the coronavirus outbreak πŸ”

A malware expert offers telecommuters security tips about their work computer, remote access and network connections, phishing emails, and more.

πŸ“– Read

via "Security on TechRepublic".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 667% spike in email phishing attacks due to coronavirus fears πŸ”

New data from Barracuda shows cybercriminals are taking advantage of people's concerns during the COVID-19 pandemic.

πŸ“– Read

via "Security on TechRepublic".
16:34
πŸ•΄ 3 Mobile Security Problems That Most Security Teams Haven't Fixed Yet πŸ•΄

Mobility must be included in the security operations workflow so that company data is protected regardless of where remote workers are located.

πŸ“– Read

via "Dark Reading: ".
?
17:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Not a Priority for SAP Projects, Users Report πŸ•΄

Nearly 70% of SAP users surveyed believe organizations lacked focus on IT security during previous SAP implementations.

πŸ“– Read

via "Dark Reading: ".
17:04
πŸ•΄ 10 Security Services Options for SMBs πŸ•΄

Outsourcing security remains one of the best ways for small to midsize businesses to protect themselves from cyberthreats.

πŸ“– Read

via "Dark Reading: ".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical CODESYS Bug Allows Remote Code Execution ❌

CVE-2020-10245, a heap-based buffer overflow that rates 10 out of 10 in severity, exists in the CODESYS web server and takes little skill to exploit.

πŸ“– Read

via "Threatpost".
?
18:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Zoom, Netflix, and Dropbox are Staying Online During the Pandemic πŸ•΄

Inside the efforts to keep the quarantined world's popular Internet services running smoothly.

πŸ“– Read

via "Dark Reading: ".
?
19:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Evict Attackers Living Off Your Land πŸ•΄

As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.

πŸ“– Read

via "Dark Reading: ".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How hospitals can be proactive to prevent ransomware attacks πŸ”

The coronavirus is putting a strain on healthcare facilities and increasing cybersecurity risks. Here are steps hospital IT admins can take to prevent ransomware and safeguard patient data.

πŸ“– Read

via "Security on TechRepublic".
?
20:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Insurance Giant Chubb Might Be Ransomware Victim πŸ•΄

A ransomware operator claims to have successfully attacked Chubb Insurance databases.

πŸ“– Read

via "Dark Reading: ".
?
20:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyber Version of 'Justice League' Launches to Fight COVID-19 Related Hacks πŸ•΄

Goal is to help organizations - especially healthcare entities - protect against cybercriminals trying to take advantage of the pandemic.

πŸ“– Read

via "Dark Reading: ".
27 March 2020
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FBI takes down hacker platform Deer.io ⚠

The FBI on Tuesday shut down Deer.io, a Russia-based platform catering to cybercrooks that offered turnkey online storefront design and hosting and a place where they could sell and advertise their wares, including ripped-off credentials, hacked servers, hacking services, gamer accounts and more. Earlier this month, the bureau nabbed the guy they think was running […]

πŸ“– Read

via "Naked Security".
?
09:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Thousands of Dark Web sites deleted in attack on free hosting service ⚠

It's the second time that the popular Daniel's Hosting platform was attacked in 16 months. This time, 7,600 Dark Web sites were obliterated.

πŸ“– Read

via "Naked Security".
?
10:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox 76 will have option to enforce HTTPS-only connections ⚠

The aim is to block the browser from reaching the small number of sites that cling to HTTP, closing security risks.

πŸ“– Read

via "Naked Security".
10:49
⚠ Android apps are snooping on your installed software ⚠

Android apps are snooping on other software on your device - and that could tell shady advertising companies more about you than you'd like.

πŸ“– Read

via "Naked Security".
?
11:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to sync Firefox containers across devices πŸ”

If you make use of the Firefox Multi-Container Account add-on, it now includes the ability to sync your customizations across your Firefox account.

πŸ“– Read

via "Security on TechRepublic".
?
11:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Unpatched VPN Bypass Bug Impacts iOS 13, Warn Researchers ❌

The vulnerability can be exploited to reveal limited traffic data including a device’s IP address.

πŸ“– Read

via "Threatpost".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why Microsoft's Office 365 has become an all-access pass for phishers to exploit πŸ”

Cybercriminals are tapping into the widespread use of Office 365 to spread malware in an attempt to steal account credentials, according to email security provider Vade Secure.

πŸ“– Read

via "Security on TechRepublic".
12:29
πŸ” How to enable 2FA for groups in Nextcloud πŸ”

Nextcloud allows you to enforce groups to use two-factor authentication. Let's find out how to create a group and then add them to 2FA enforcement.

πŸ“– Read

via "Security on TechRepublic".
12:32
πŸ•΅ Best shows to binge watch in 2020 πŸ•΅


πŸ“– Read

via "VPNpro".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely πŸ•΄

The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware.

πŸ“– Read

via "Dark Reading: ".
?
13:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-8536

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow cross-site request forgery.

πŸ“– Read

via "National Vulnerability Database".
13:52
ATENTIONβ€Ό New - CVE-2015-8535

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A directory traversal vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow a user to execute arbitrary code with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
13:52
ATENTIONβ€Ό New - CVE-2015-8534

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow a user to execute arbitrary code with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
13:52
ATENTIONβ€Ό New - CVE-2015-7336

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior that could allow the signature check of an update to be bypassed.

πŸ“– Read

via "National Vulnerability Database".
13:52
ATENTIONβ€Ό New - CVE-2015-7335

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A race condition was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior that could allow a user to execute arbitrary code with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
13:52
ATENTIONβ€Ό New - CVE-2015-7334

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type COMMAND type could allow a user to execute arbitrary code with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
?
14:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-7333

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type INF and INF_BY_COMPATIBLE_ID command types could allow a user to execute arbitrary code with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
15:03
πŸ” Friday Five 3/27 πŸ”

Cybercrime groups capitalize on pandemic anxiety, Norwegian Cruise Line suffers data breach, and more - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:04
πŸ•΄ The Wild, Wild West(world) of Cybersecurity πŸ•΄

Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.

πŸ“– Read

via "Dark Reading: ".
?
15:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-5684

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A buffer overflow vulnerability was reported, (fixed and publicly disclosed in 2015) in the Lenovo Service Engine (LSE), affecting various versions of BIOS for Lenovo Notebooks, that could allow a remote user to execute arbitrary code on the system.

πŸ“– Read

via "National Vulnerability Database".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybercriminals attack KEEN shoe drive for people affected by coronavirus pandemic πŸ”

KEEN is providing shoes to people most impacted by the COVID-19 pandemic, but their website was bombarded by malicious bots.

πŸ“– Read

via "Security on TechRepublic".
?
17:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Virgin Media Could Pay GB pound 4.5B for Leak Affecting 900,000 Customers πŸ•΄

A misconfigured database holding personal data was left available online between April 2019 and February 2020.

πŸ“– Read

via "Dark Reading: ".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to listen to port traffic on a Linux server πŸ”

Every network administrator needs to know how to listen to port traffic on a server. Here's one way to do it on Linux.

πŸ“– Read

via "Security on TechRepublic".
17:34
πŸ•΄ Malicious USB Drive Hides Behind Gift Card Lure πŸ•΄

Victims are being enticed to insert an unknown USB drive into their computers.

πŸ“– Read

via "Dark Reading: ".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create a Kubernetes security policy πŸ”

If you're looking to take your Kubernetes security to the next level, you'll want to start working with pod security policies. Here's a quick introduction to this feature.

πŸ“– Read

via "Security on TechRepublic".
30 March 2020
?
04:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-10823

A stack-based buffer overflow in /cgi-bin/activate.cgi through var parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 1 of 3).

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10817

The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10791 (openitcockpit)

app/Plugin/GrafanaModule/Controller/GrafanaConfigurationController.php in openITCOCKPIT before 3.7.3 allows remote authenticated users to trigger outbound TCP requests (aka SSRF) via the Test Connection feature (aka testGrafanaConnection) of the Grafana Module.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10790 (openitcockpit)

openITCOCKPIT before 3.7.3 has unnecessary files (such as Lodash files) under the web root, which leads to XSS.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10789 (openitcockpit)

openITCOCKPIT before 3.7.3 has a web-based terminal that allows attackers to execute arbitrary OS commands via shell metacharacters that are mishandled on an su command line in app/Lib/SudoMessageInterface.php.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10788

openITCOCKPIT before 3.7.3 uses the 1fea123e07f730f76e661bced33a94152378611e API key rather than generating a random API Key for WebSocket connections.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10649

DevActSvc.exe in ASUS Device Activation before 1.0.7.0 for Windows 10 notebooks and PCs could lead to unsigned code execution with no additional restrictions when a user puts an application at a particular path with a particular file name.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10607

In Advantech WebAccess, Versions 8.4.2 and prior. A stack-based buffer overflow vulnerability caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10510

Sunnet eHRD, a human training and development management system, contains a vulnerability of Broken Access Control. After login, attackers can use a specific URL, access unauthorized functionality and data.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10509

Sunnet eHRD, a human training and development management system, contains vulnerability of Cross-Site Scripting (XSS), attackers can inject arbitrary command into the system and launch XSS attack.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10508

Sunnet eHRD, a human training and development management system, improperly stores system files. Attackers can use a specific URL and capture confidential information.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2020-10245

CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2019-7630

An issue was discovered in gdrv.sys in Gigabyte APP Center before 19.0227.1. The vulnerable driver exposes a wrmsr instruction via IOCTL 0xC3502580 and does not properly filter the target Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2019-7245

An issue was discovered in GPU-Z.sys in TechPowerUp GPU-Z before 2.23.0. The vulnerable driver exposes a wrmsr instruction via an IOCTL and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2019-7244

An issue was discovered in kerneld.sys in AIDA64 before 5.99. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x80112084 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2019-7240

An issue was discovered in WinRing0x64.sys in Moo0 System Monitor 1.83. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x9C402088 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2019-5105

An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService 3.5.13.20. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
04:47
ATENTIONβ€Ό New - CVE-2019-20633

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.

πŸ“– Read

via "National Vulnerability Database".
?
05:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Who is dominating the rising VPN market right now? Here are the numbers πŸ•΅


πŸ“– Read

via "VPNpro".
?
07:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 22 stories of the week ⚠

From the return of the Martinelli WhatsApp hoax to the takedown of hacker forum Deer.io - and everything in between. It's roundup time.

πŸ“– Read

via "Naked Security".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google sent ~40K warnings to targets of state-backed attackers in 2019 ⚠

Google has seen a rising number of attackers impersonating news outlets and journalists to spread fake news among other reporters.

πŸ“– Read

via "Naked Security".
09:09
⚠ Should governments track your location to fight COVID-19? ⚠

Google Maps data could help governments track patients that a newly-diagnosed COVID-19 sufferer has been in contact with.

πŸ“– Read

via "Naked Security".
?
10:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Chrome may bring back β€˜www’ with option to show full URLs ⚠

Google's doing so grudgingly: it still thinks that showing too much will confuse users trying to assess a site's security.

πŸ“– Read

via "Naked Security".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple’s iOS 13.4 hit by VPN bypass vulnerability ⚠

It’s less than a week since iOS 13.4 appeared and already researchers have discovered a bug that puts at risk the privacy of VPN connections.

πŸ“– Read

via "Naked Security".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Securing Your Remote Workforce: A Coronavirus Guide for Businesses πŸ•΄

Often the hardest part in creating an effective awareness program is deciding what NOT to teach.

πŸ“– Read

via "Dark Reading: ".
?
11:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-10560

An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the SiteKey to insert into a crafted URL for components/OssnComments/ossn_com.php and/or libraries/ossn.lib.upgrade.php.

πŸ“– Read

via "National Vulnerability Database".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ How to stay on top of coronavirus scams – and all the others too ⚠

The bad news is that you have to watch out for a plethora of new coronavirus cyberscams, as well as all the old stuff, too...

πŸ“– Read

via "Naked Security".
13:11
πŸ›  Recon Informer πŸ› 

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization and remote workers against ransomware πŸ”

Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services.

πŸ“– Read

via "Security on TechRepublic".
14:13
πŸ” How to use an iPhone or Android device as the security key for your Google account πŸ”

Your smartphone can act as your security key to authenticate your Google credentials on the web. Learn how to set that up on an Android device or an iPhone.

πŸ“– Read

via "Security on TechRepublic".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zeus Sphinx Banking Trojan Arises Amid COVID-19 ❌

The malware is back after three years, looking to cash in on interest in government relief efforts around coronavirus.

πŸ“– Read

via "Threatpost".
?
15:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 remote access threats πŸ”

When working from home, it's important to understand the security risks. Tom Merritt lists five remote access threats so you can secure your system.

πŸ“– Read

via "Security on TechRepublic".
15:47
ATENTIONβ€Ό New - CVE-2019-7755

In webERP 4.15, the Import Bank Transactions function fails to sanitize the content of imported MT940 bank statement files, resulting in the execution of arbitrary SQL queries, aka SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 remote access threats πŸ”

When working from home, it's important to understand the security risks. Tom Merritt lists five remote access threats so you can secure your system.

πŸ“– Read

via "Security on TechRepublic".
16:13
πŸ” Security policies explain step-by-step solutions for strengthening IT defenses πŸ”

These TechRepublic Premium resources offer a comprehensive solution from responding to a data breach to explaining company-wide security responsibilities.

πŸ“– Read

via "Security on TechRepublic".
16:13
πŸ” The dark web: Where coronavirus fraud, profiteering, malware, and scams are discussed πŸ”

COVID-19 is fueling new dark web conversations about cybercriminal activity, says cyber intelligence company Sixgill.

πŸ“– Read

via "Security on TechRepublic".
?
16:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zoom Kills iOS App’s Data-Sharing Facebook Feature ❌

Zoom removed its Facebook SDK for iOS feature after a report found the app sending Facebook "unnecessary" user data.

πŸ“– Read

via "Threatpost".
16:57
πŸ•΄ HackerOne Drops Mobile Voting App Vendor Voatz πŸ•΄

Bug bounty platform provider cited "Voatz's pattern of interactions with the research community" in its decision to halt the app vendor's vuln disclosure program on HackerOne.

πŸ“– Read

via "Dark Reading: ".
?
17:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Groups Seek to Bump CCPA Enforcement Date Amid Coronavirus Confusion πŸ”

As with many things currently, details of the California Consumer Privacy Act are unclear. That, plus confusion around COVID-19, has many interest groups hoping enforcement around the law is postponed.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-17561

The "Apache NetBeans" autoupdate system does not fully validate code signatures. An attacker could modify the downloaded nbm and include additional code. "Apache NetBeans" versions up to and including 11.2 are affected by this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
17:47
ATENTIONβ€Ό New - CVE-2019-17560

The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. Ò€&oelig;Apache NetBeans" versions up to and including 11.2 are affected by this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
17:54
❌ Nation-State Attacks Drop in Latest Google Analysis ❌

Phishing and zero-days continue to be a core part of the APT arsenal.

πŸ“– Read

via "Threatpost".
18:09
⚠ No, Houseparty hasn’t hacked your phone and stolen your bank details ⚠

There's one thing missing in all the claims that deleting the Houseparty app will "unhack" you - evidence"

πŸ“– Read

via "Naked Security".
?
18:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
?
18:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” COVID-19: Security risks are increasing as more people work from home πŸ”

A security expert offers tips on how to keep employees safe in this work-from-home environment during the coronavirus pandemic.

πŸ“– Read

via "Security on TechRepublic".
18:13
πŸ” COVID-19: Security risks are increasing as more people work from home πŸ”

A security expert offers tips on how to keep employees safe in this work-from-home environment during the coronavirus pandemic.

πŸ“– Read

via "Security on TechRepublic".
18:27
πŸ•΄ Microsoft Edge Will Tell You If Credentials Are Compromised πŸ•΄

Password Monitor, InPrivate mode, and ad-tracking prevention are three new additions to Microsoft Edge.

πŸ“– Read

via "Dark Reading: ".
18:27
πŸ•΄ Researchers Spot Sharp Increase in Zoom-Themed Domain Registrations πŸ•΄

Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says.

πŸ“– Read

via "Dark Reading: ".
?
19:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Untangling Third-Party Risk (and Fourth, and Fifth...) πŸ•΄

Third parties bring critical products and services to your organization. They also bring risk that must be understood and managed.

πŸ“– Read

via "Dark Reading: ".
?
19:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-20634

An issue was discovered in Proofpoint Email Protection through 2019-09-08. By collecting scores from Proofpoint email headers, it is possible to build a copy-cat Machine Learning Classification model and extract insights from this model. The insights gathered allow an attacker to craft emails that receive preferable scores, with a goal of delivering malicious emails.

πŸ“– Read

via "National Vulnerability Database".
?
20:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-11024 (odata4j)

odata4j 0.7.0 allows ExecuteJPQLQueryCommand.java SQL injection. NOTE: this product is apparently discontinued.

πŸ“– Read

via "National Vulnerability Database".
20:17
ATENTIONβ€Ό New - CVE-2016-11023 (odata4j)

odata4j 0.7.0 allows ExecuteCountQueryCommand.java SQL injection. NOTE: this product is apparently discontinued.

πŸ“– Read

via "National Vulnerability Database".
?
20:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cyberattacks rank as the biggest data protection concern facing SMBs πŸ”

World Backup Day is March 31, and while cyberattacks are a potential threat to their data, many SMBs say they don't have a data backup or disaster recovery process, according to data protection company Infrascale.

πŸ“– Read

via "Security on TechRepublic".
20:43
πŸ” Coronavirus-themed spam surged 14,000% in two weeks says IBM πŸ”

Since February, spam exploiting the novel coronavirus has jumped by 4,300% and 14,000% in the past 14 days, according to IBM X-Force, IBM's threat intelligence group.

πŸ“– Read

via "Security on TechRepublic".
?
21:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ 5 tips for keeping your data safe this World Backup Day ⚠

The only backup you will ever regret... is the one you didn't make

πŸ“– Read

via "Naked Security".
?
22:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-9508

The web interface of the Vertiv Avocent UMG-4000 version 4.2.1.19 is vulnerable to stored XSS. A remote attacker authenticated with an administrator account could store a maliciously named file within the web application that would execute each time a user browsed to the page.

πŸ“– Read

via "National Vulnerability Database".
22:17
ATENTIONβ€Ό New - CVE-2019-9507

The web interface of the Vertiv Avocent UMG-4000 version 4.2.1.19 is vulnerable to command injection because the application incorrectly neutralizes code syntax before executing. Since all commands within the web application are executed as root, this could allow a remote attacker authenticated with an administrator account to execute arbitrary commands as root.

πŸ“– Read

via "National Vulnerability Database".
22:17
ATENTIONβ€Ό New - CVE-2019-19913

In Intland codeBeamer ALM 9.5 and earlier, there is stored XSS via the Trackers Title parameter.

πŸ“– Read

via "National Vulnerability Database".
22:17
ATENTIONβ€Ό New - CVE-2019-19912

In Intland codeBeamer ALM 9.5 and earlier, a cross-site scripting (XSS) vulnerability in the Upload Flash File feature allows authenticated remote attackers to inject arbitrary scripts via an active script embedded in an SWF file.

πŸ“– Read

via "National Vulnerability Database".
22:17
ATENTIONβ€Ό New - CVE-2019-19606

X-Plane 11.41 and earlier has multiple improper path validations that could allow reading and writing files from/to arbitrary paths (or a leak of OS credentials to a remote system) via crafted network packets. This could be used to execute arbitrary commands on the system.

πŸ“– Read

via "National Vulnerability Database".
22:17
ATENTIONβ€Ό New - CVE-2019-19605

X-Plane 11.41 and earlier allows Arbitrary Memory Write via crafted network packets, which could cause a denial of service or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
31 March 2020
?
05:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€œInstant bank fraud” warning spread on WhatsApp is a hoax ⚠

No, we don't know why people start hoaxes like this. You can do your bit by not forwarding them, not even "just in case".

πŸ“– Read

via "Naked Security".
?
07:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Covid-19 Poll Results: One in Four Prioritize Health Over Privacy ❌

An informal Threatpost reader poll shows the majority of site visitors are privacy absolutists. But attitudes shift when the trade off is saving lives.

πŸ“– Read

via "Threatpost".
?
08:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers speed the death of β€˜bad’ data in the race against good ⚠

They have a way to inject 'good' data - i.e., accurate COVID-19 news or security patches - to outpace the spread of fake news or malware.

πŸ“– Read

via "Naked Security".
?
08:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Data on almost every citizen of Georgia posted on hacker forum ⚠

Where did it all come from? 4.9m records were posted on a hacking forum - and the country only has an estimated population of 3.7m.

πŸ“– Read

via "Naked Security".
?
08:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Limited-Time Free Offers to Secure the Enterprise Amid COVID-19 πŸ•΄

These products and services could be of immediate help to infosec pros now protecting their organizations while working from home.

πŸ“– Read

via "Dark Reading: ".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Much Downtime Can Your Company Handle? πŸ•΄

Why every business needs cyber resilience and quick recovery times.

πŸ“– Read

via "Dark Reading: ".
11:39
⚠ Dharma ransomware source code on sale for $2,000 ⚠

The source code for ransomware-as-a-service strain Dharma has been put up for sale by hackers.

πŸ“– Read

via "Naked Security".
11:39
⚠ Patch now! Critical flaw found in OpenWrt router software ⚠

OpenWrt is an open source operating system used by millions of home and small business routers and embedded devices.

πŸ“– Read

via "Naked Security".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  OpenSSL Toolkit 1.1.1f πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
12:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Does the 2020 Online Census Account for Security Risk? πŸ•΄

Experts discuss the security issues surrounding a census conducted online and explain how COVID-19 could exacerbate the risk.

πŸ“– Read

via "Dark Reading: ".
?
12:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Palo Alto Networks to Buy CloudGenix for $420M πŸ•΄

Palo Alto Networks plans to integrate CloudGenix's SD-WAN technology into its Prisma SASE platform following the deal.

πŸ“– Read

via "Dark Reading: ".
13:09
⚠ Marriott International confirms data breach of up to 5.2 million guests ⚠

Marriott International has today announced that it has suffered a data breach affecting up to 5.2 million people.

πŸ“– Read

via "Naked Security".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-2391

Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure.

πŸ“– Read

via "National Vulnerability Database".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Phishing emails claim recipient has been infected with coronavirus πŸ”

A new phishing campaign is using the fear of being infected as a way to spread malware, as spotted by security trainer KnowBe4.

πŸ“– Read

via "Security on TechRepublic".
14:13
πŸ” IBM providing 9 free public cloud business services to customers during coronavirus pandemic πŸ”

With companies sending employees home to work during the COVID-19 threat, IBM offers a range of tools to support critical IT applications.

πŸ“– Read

via "Security on TechRepublic".
14:13
πŸ” How to better secure your Microsoft Remote Desktop Protocol connections πŸ”

Microsoft's Remote Desktop Protocol has been saddled with security bugs and weaknesses, which means you need to take certain precautions when using RDP for remote connections.

πŸ“– Read

via "Security on TechRepublic".
14:24
❌ 8-Year-Old VelvetSweatshop Bug Resurrected in LimeRAT Campaign ❌

An old RAT learns an old trick.

πŸ“– Read

via "Threatpost".
?
14:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zoom Scrutinized As Security Woes Mount ❌

The New York Attorney General has inquired about Zoom's data security strategy, as the conferencing platform comes under heavy scrutiny for its privacy policies.

πŸ“– Read

via "Threatpost".
?
15:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Patching Poses Security Problems with Move to More Remote Work πŸ•΄

Security teams were not ready for the wholesale move to remote work and the sudden expansion of the attack surface area, experts say.

πŸ“– Read

via "Dark Reading: ".
?
15:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Keep these privacy considerations in mind when using Zoom at home for work collaboration πŸ”

The platform allows a host to monitor users' activities while screen sharing, as well as access to a participant's device information and other details.

πŸ“– Read

via "Security on TechRepublic".
15:57
πŸ•΄ Why Third-Party Risk Management Has Never Been More Important πŸ•΄

Given today's coronavirus pandemic, the need for companies to collect cybersecurity data about their business partners is more critical than ever. Here's how to start.

πŸ“– Read

via "Dark Reading: ".
15:57
πŸ•΄ Latest Security News & Commentary about COVID-19 πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading: ".
15:57
πŸ•΄ Data from 5.2M Marriott Loyalty Program Members Hit by Breach πŸ•΄

The data was breached through the credentials of two franchisee employees.

πŸ“– Read

via "Dark Reading: ".
?
16:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-14905

A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.

πŸ“– Read

via "National Vulnerability Database".
16:17
ATENTIONβ€Ό New - CVE-2019-14880

A vulnerability was found in Moodle versions 3.7 before 3.7.3, 3.6 before 3.6.7, 3.5 before 3.5.9 and earlier. OAuth 2 providers who do not verify users' email address changes require additional verification during sign-up to reduce the risk of account compromise.

πŸ“– Read

via "National Vulnerability Database".
16:17
ATENTIONβ€Ό New - CVE-2019-10180

A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code.

πŸ“– Read

via "National Vulnerability Database".
16:27
πŸ•΄ Researchers Uncover Unsophisticated - But Creative - Watering-Hole Attack πŸ•΄

Holy Water campaign is targeting users of a specific religious and ethnic group in Asia, Kaspersky says.

πŸ“– Read

via "Dark Reading: ".
?
16:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Two Exabeam employees at RSA conference who tested positive for COVID-19 are recovering πŸ”

Exabeam's employees are recovering from coronavirus. Both tested positive for coronavirus after attending RSA in San Francisco.

πŸ“– Read

via "Security on TechRepublic".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” FBI warns about Zoom bombing as hijackers take over school and business video conferences πŸ”

Teleconferences are being disrupted by internet trolls shouting profanity and racist remarks and posting pornographic and hate images.

πŸ“– Read

via "Security on TechRepublic".
17:46
πŸ” FBI Urges Vigiliance Around COVID-19 Scams, Malware πŸ”

It’s been difficult keeping track of all the scams leveraging the COVID-19 pandemic to steal your money or your personal information. Now, the FBI is warning of increased attacks that target the supply chain and the healthcare industry in addition to β€œZoom-bombing” style attacks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-13495

In firmware version 4.50 of Zyxel XGS2210-52HP, multiple stored cross-site scripting (XSS) issues allows remote authenticated users to inject arbitrary web script via an rpSys.html Name or Location field.

πŸ“– Read

via "National Vulnerability Database".
18:24
❌ Watering-Holes Target Asian Ethnic Victims with Flash Update Decoy ❌

About 10 compromised websites employ a multi-stage, targeted effort to fingerprint and compromise victims.

πŸ“– Read

via "Threatpost".
?
19:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Defense Evasion Dominated 2019 Attack Tactics πŸ•΄

Researchers mapped tactics and techniques to the MITRE ATT&CK framework to determine which were most popular last year.

πŸ“– Read

via "Dark Reading: ".
1 April 2020
?
08:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft’s Edge browser to get breached credential alerts ⚠

Microsoft has announced a list of new security and privacy features it plans to add to forthcoming versions in an effort to take on its rivals.

πŸ“– Read

via "Naked Security".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Major Cloud, CDN Providers Join Secure Routing Initiative πŸ•΄

Akamai, AWS, Azion, Cloudflare, Facebook, and Netflix are now members of the Mutually Agreed Norms for Routing Security (MANRS) effort.

πŸ“– Read

via "Dark Reading: ".
10:51
⚠ QR code generator scam steals thousands in Bitcoin ⚠

Every once in a while an attack comes along that is so simple to set up, and yet so effective, that it makes your jaw drop. Here's one.

πŸ“– Read

via "Naked Security".
10:51
⚠ Bill Gates’s YouTube β€˜Bitcoin giveaway’ is a big fat scam ⚠

And no, Microsoft said, none of our verified accounts have been hijacked, vehemently denying early reports.

πŸ“– Read

via "Naked Security".
11:05
❌ Top Email Protections Fail in Latest COVID-19 Phishing Campaign ❌

An effective spoofing campaign promises users important information about new coronavirus cases in their local area, scooting past Proofpoint and Microsoft Office 356 ATPs.

πŸ“– Read

via "Threatpost".
11:11
πŸ•΄ The SOC Emergency Room Faces Malware Pandemic πŸ•΄

To keep users and networks healthy and secure, security teams need to mimic countries that have taken on COVID-19 with a rapid, disciplined approach.

πŸ“– Read

via "Dark Reading: ".
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ COVID-19: Latest Security News & Commentary πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading: ".
?
13:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Two Zoom Zero-Day Flaws Uncovered ❌

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

πŸ“– Read

via "Threatpost".
13:11
πŸ•΄ Could Work-From-Home Staff be Violating Privacy Laws During Conference Calls? πŸ•΄

If you are lucky enough to be able to do your job from home right now, you should be aware of a few key things.

πŸ“– Read

via "Dark Reading: ".
?
13:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Holy Water watering hole attack targets visitors of certain websites with malware πŸ”

This campaign tries to trick users into accepting a fake Adobe Flash update, which then installs malware to give the attacker full remote access, says Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
?
14:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Alerts Healthcare to Human-Operated Ransomware πŸ•΄

Microsoft has notified dozens of hospitals with vulnerable gateway and VPN appliances in their infrastructure, which could put them at risk.

πŸ“– Read

via "Dark Reading: ".
?
14:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-10231

TP-Link NC200 through 2.1.8_Build_171109, NC210 through 1.0.9_Build_171214, NC220 through 1.3.0_Build_180105, NC230 through 1.3.0_Build_171205, NC250 through 1.3.0_Build_171205, NC260 through 1.5.1_Build_190805, and NC450 through 1.5.0_Build_181022 devices allow a remote NULL Pointer Dereference.

πŸ“– Read

via "National Vulnerability Database".
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical WordPress Plugin Bug Can Lock Admins Out of Websites ❌

A second vulnerability could be used to prevent access to almost all of a site’s existing content, by simply redirecting visitors.

πŸ“– Read

via "Threatpost".
?
15:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Active Directory Attacks Hit the Mainstream πŸ•΄

Understanding the limitations of authentication protocols, especially as enterprises link authentication to cloud services to Active Directory, is essential for security teams in the modern federated enterprise.

πŸ“– Read

via "Dark Reading: ".
?
15:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-3945

Web server running on Parrot ANAFI can be crashed due to the SDK command "Common_CurrentDateTime" being sent to control service with larger than expected date length.

πŸ“– Read

via "National Vulnerability Database".
15:58
ATENTIONβ€Ό New - CVE-2019-3944

Parrot ANAFI is vulnerable to Wi-Fi deauthentication attack, allowing remote and unauthenticated attackers to disconnect drone from controller during mid-flight.

πŸ“– Read

via "National Vulnerability Database".
15:58
ATENTIONβ€Ό New - CVE-2019-3942

Advantech WebAccess 8.3.4 does not properly restrict an RPC call that allows unauthenticated, remote users to read files. An attacker can use this vulnerability to recover the administrator password.

πŸ“– Read

via "National Vulnerability Database".
15:58
ATENTIONβ€Ό New - CVE-2018-11106

NETGEAR has released fixes for a pre-authentication command injection in request_handler.php security vulnerability on the following product models: WC7500, running firmware versions prior to 6.5.3.5; WC7520, running firmware versions prior to 2.5.0.46; WC7600v1, running firmware versions prior to 6.5.3.5; WC7600v2, running firmware versions prior to 6.5.3.5; and WC9500, running firmware versions prior to 6.5.3.5.

πŸ“– Read

via "National Vulnerability Database".
?
16:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Zoom’s Privacy Problems Snowball as Two Zero Days Uncovered πŸ”

Amid increased scrutiny from researchers and privacy activists, two new zero days in the teleconferencing app surfaced on Wednesday.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:05
❌ Coronavirus β€˜Financial Relief’ Phishing Attacks Spike ❌

A spate of phishing attacks have promised financial relief due to the coronavirus pandemic - but in reality swiped victims' credentials, payment card data and more.

πŸ“– Read

via "Threatpost".
17:11
πŸ•΄ Why All Employees Are Responsible for Company Cybersecurity πŸ•΄

It's not just the IT and security team's responsibility to keep data safe -- every member of the team needs to be involved.

πŸ“– Read

via "Dark Reading: ".
17:14
πŸ” COVID-19 pandemic impact pushing smart home voice control devices to predicted 30% growth πŸ”

Global shipments of smart home speakers will increase this year due to fear of coronavirus germs, according to ABI Research.

πŸ“– Read

via "Security on TechRepublic".
?
18:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Wiper Malware Called β€œCoronavirus” Spreads Among Windows Victims ❌

Like NotPetya, it overwrites the master boot record to render computers "trashed."

πŸ“– Read

via "Threatpost".
?
19:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-9163

The connection initiation process in March Networks Command Client before 2.7.2 allows remote attackers to execute arbitrary code via crafted XAML objects.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2019-11254

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

πŸ“– Read

via "National Vulnerability Database".
19:41
πŸ•΄ Attackers Leverage Excel File Encryption to Deliver Malware πŸ•΄

Technique involves saving malicious Excel file as "read-only" and tricking users into opening it, Mimecast says.

πŸ“– Read

via "Dark Reading: ".
?
21:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-17564

Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.

πŸ“– Read

via "National Vulnerability Database".
21:28
ATENTIONβ€Ό New - CVE-2018-11802

In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin).

πŸ“– Read

via "National Vulnerability Database".
2 April 2020
?
07:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ COVID-19 forces browser makers to continue supporting TLS 1.0 ⚠

In one of the strangest stories of the year, the COVID-19 virus has halted plans by major browsers to drop support for the aging and insecure Transport Layer Security (TLS) 1.0 and 1.1 protocols.

πŸ“– Read

via "Naked Security".
?
08:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phone carriers must authenticate calls to fight robocalls, says FCC ⚠

The FCC has given voice carriers until June 2021 to implement technology it says will stop the robocall plague that's driving us all insane.

πŸ“– Read

via "Naked Security".
?
10:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Vulnerability Researchers Focus on Zoom App's Security πŸ•΄

With videoconferencing's rise as an essential tool for remote work comes a downside: more security scrutiny, which has turned up a number of security weaknesses.

πŸ“– Read

via "Dark Reading: ".
?
11:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Emerging MakeFrame Skimmer from Magecart Sets Sights on SMBs ❌

Attacks using a brand-new card-harvesting code is targeting small- to medium-sized businesses, claiming 19 sites so far.

πŸ“– Read

via "Threatpost".
11:05
❌ 44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig ❌

Millions of IDs, charge cards, loyalty cards, gift cards, medical marijuana ID cards and personal information was left exposed to the open internet.

πŸ“– Read

via "Threatpost".
11:11
πŸ•΄ Best Practices to Manage Third-Party Cyber-Risk Today πŸ•΄

Bold new thinking is needed to solve the rapidly evolving challenge of third-party risk management.

πŸ“– Read

via "Dark Reading: ".
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Magecart Skimmer Infects 19 Victim Websites πŸ•΄

MakeFrame, named for its ability to make iframes for skimming payment data, is attributed to Magecart Group 7.

πŸ“– Read

via "Dark Reading: ".
?
12:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep33: Ransomware on sale, dark web disaster, dead drops and pillow forts – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
13:05
❌ In COVID-19 Scam Scramble, Cybercrooks Recycle Phishing Kits ❌

Old phishing kits are being pressed into service to keep up with the unprecedented volume of new scams that exploit the pandemic.

πŸ“– Read

via "Threatpost".
13:14
πŸ” Most consumers worry about online privacy but many are unsure how to protect it πŸ”

People have taken actions to better protect their information but feel they need to do more, according to a survey from NortonLifeLock.

πŸ“– Read

via "Security on TechRepublic".
?
13:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Targeted cyberattacks surpass mass attacks for 2019 πŸ”

Cybercriminals are increasingly directing targeted attacks at specific organizations or individuals, says security provider Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
13:51
⚠ Don’t get locked out of your own website – update this WordPress plugin now! ⚠

In theory, crooks could mess up your site so vistors can't see your content, then lock you out so you can't jump in and fix it.

πŸ“– Read

via "Naked Security".
13:58
ATENTIONβ€Ό New - CVE-2019-7014

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:58
ATENTIONβ€Ό New - CVE-2019-7013

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:05
❌ Zoom Removes Data-Mining LinkedIn Feature ❌

The feature, criticized for "undisclosed data-mining," is only the latest privacy faux pas for Zoom this month.

πŸ“– Read

via "Threatpost".
14:11
πŸ•΄ Name That Toon: The Devil You Know? πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
14:14
πŸ” Survey: 37% of workers unaware of ransomware, putting businesses at risk πŸ”

Almost 40% of employees surveyed admitted to not knowing what ransomware is, and many of them have already been victims, according to security provider Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
14:28
ATENTIONβ€Ό New - CVE-2019-7012

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
14:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-7011

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:58
ATENTIONβ€Ό New - CVE-2019-7010

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-7009

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:41
πŸ•΄ A Hacker's Perspective on Securing VPNs As You Go Remote πŸ•΄

As organizations rush to equip and secure their newly remote workforce, it's important to keep things methodical and purposeful

πŸ“– Read

via "Dark Reading: ".
?
15:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-7008

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:58
ATENTIONβ€Ό New - CVE-2019-6999

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:58
ATENTIONβ€Ό New - CVE-2019-20635

codeBeamer before 9.5.0-RC3 does not properly restrict the ability to execute custom Java code and access the Java class loader via computed fields.

πŸ“– Read

via "National Vulnerability Database".
15:58
ATENTIONβ€Ό New - CVE-2019-14868

In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.

πŸ“– Read

via "National Vulnerability Database".
15:58
ATENTIONβ€Ό New - CVE-2018-13371

An external control of system vulnerability in FortiOS may allow an authenticated, regular user to change the routing settings of the device via connecting to the ZebOS component.

πŸ“– Read

via "National Vulnerability Database".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Ways Enterprises Inadvertently Compromise Their Network Security πŸ•΄

Is your organization carelessly leaving its networks vulnerable to invasion? Check out these five common oversights to see if your resources are at risk.

πŸ“– Read

via "Dark Reading: ".
?
17:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Prioritizing High-Risk Assets: A 4-Step Approach to Mitigating Insider Threats πŸ•΄

Sound insider threat detection programs combine contextual data and a thorough knowledge of employee roles and behaviors to pinpoint the biggest risks.

πŸ“– Read

via "Dark Reading: ".
17:25
πŸ” Solar Panel Data Behind Latest Trade Secret Theft Case πŸ”

A multimillion dollar solar installation firm is alleging one of its former employees took its data to start a competing firm just 11 miles away.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Companies Are Failing to Deploy Key Solution for Email Security πŸ•΄

A single -- albeit complex-to-deploy -- technology could stop the most expensive form of fraud, experts say. Why aren't more companies adopting it?

πŸ“– Read

via "Dark Reading: ".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft to hospitals: 11 tips on how to combat ransomware πŸ”

Hospitals are under cyberattack even as they struggle to combat the coronavirus. Microsoft is offering hospitals security tips to try to help.

πŸ“– Read

via "Security on TechRepublic".
?
18:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Squashes High-Severity Flaws in Chrome Browser ❌

Google is rolling out the newest Chrome browser version, 80.0.3987.162, in the coming days.

πŸ“– Read

via "Threatpost".
18:41
πŸ•΄ Bad Bots Build Presence Across the Web πŸ•΄

Bots that mimic human behavior are driving a growing percentage of website traffic while contributing to an avalanche of misinformation.

πŸ“– Read

via "Dark Reading: ".
?
19:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Day in The Life of a Pen Tester πŸ•΄

Two penetration testers share their day-to-day responsibilities, challenges they encounter, and the skills they value most on the job.

πŸ“– Read

via "Dark Reading: ".
?
19:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-19348

An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/apb-base, affecting versions before the following 4.3.5, 4.2.21, 4.1.37, and 3.11.188-4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.

πŸ“– Read

via "National Vulnerability Database".
19:58
ATENTIONβ€Ό New - CVE-2019-19346

An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/mariadb-apb, affecting versions before the following 4.3.5, 4.2.21, 4.1.37, and 3.11.188-4 . An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.

πŸ“– Read

via "National Vulnerability Database".
19:58
ATENTIONβ€Ό New - CVE-2019-19097

ABB eSOMS versions 4.0 to 6.0.3 accept connections using medium strength ciphers. If a connection is enabled using such a cipher, an attacker might be able to eavesdrop and/or intercept the connection.

πŸ“– Read

via "National Vulnerability Database".
19:58
ATENTIONβ€Ό New - CVE-2019-19096

The Redis data structure component used in ABB eSOMS versions 6.0 to 6.0.2 stores credentials in clear text. If an attacker has file system access, this can potentially compromise the credentials' confidentiality.

πŸ“– Read

via "National Vulnerability Database".
19:58
ATENTIONβ€Ό New - CVE-2019-19095

Lack of adequate input/output validation for ABB eSOMS versions 4.0 to 6.0.2 might allow an attacker to attack such as stored cross-site scripting by storing malicious content in the database.

πŸ“– Read

via "National Vulnerability Database".
19:58
ATENTIONβ€Ό New - CVE-2019-19094

Lack of input checks for SQL queries in ABB eSOMS versions 3.9 to 6.0.3 might allow an attacker SQL injection attacks against the backend database.

πŸ“– Read

via "National Vulnerability Database".
19:58
ATENTIONβ€Ό New - CVE-2019-19093

eSOMS versions 4.0 to 6.0.3 do not enforce password complexity settings, potentially resulting in lower access security due to insecure user passwords.

πŸ“– Read

via "National Vulnerability Database".
20:11
πŸ•΄ Phishers Try 'Text Direction Deception' Technique to Bypass Email Filters πŸ•΄

With COVID-19 concerns running high, attackers are trying new tactics to get to users.

πŸ“– Read

via "Dark Reading: ".
?
20:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-19092

ABB eSOMS versions 4.0 to 6.0.3 use ASP.NET Viewstate without Message Authentication Code (MAC). Alterations to Viewstate might thus not be noticed.

πŸ“– Read

via "National Vulnerability Database".
20:28
ATENTIONβ€Ό New - CVE-2019-19091

For ABB eSOMS versions 4.0 to 6.0.3, HTTPS responses contain comments with sensitive information about the application. An attacker might use this detail information to specifically craft the attack.

πŸ“– Read

via "National Vulnerability Database".
20:28
ATENTIONβ€Ό New - CVE-2019-19090

For ABB eSOMS versions 4.0 to 6.0.2, the Secure Flag is not set in the HTTP response header. Unencrypted connections might access the cookie information, thus making it susceptible to eavesdropping.

πŸ“– Read

via "National Vulnerability Database".
20:28
ATENTIONβ€Ό New - CVE-2019-19089

For ABB eSOMS versions 4.0 to 6.0.3, the X-Content-Type-Options Header is missing in the HTTP response, potentially causing the response body to be interpreted and displayed as different content type other than declared. A possible attack scenario would be unauthorized code execution via text interpreted as JavaScript.

πŸ“– Read

via "National Vulnerability Database".
20:28
ATENTIONβ€Ό New - CVE-2019-19003

For ABB eSOMS versions 4.0 to 6.0.2, the HTTPOnly flag is not set. This can allow Javascript to access the cookie contents, which in turn might enable Cross Site Scripting.

πŸ“– Read

via "National Vulnerability Database".
?
20:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-19002

For ABB eSOMS versions 4.0 to 6.0.2, the X-XSS-Protection HTTP response header is not set in responses from the web server. For older web browser not supporting Content Security Policy, this might increase the risk of Cross Site Scripting.

πŸ“– Read

via "National Vulnerability Database".
?
21:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-19001

For ABB eSOMS versions 4.0 to 6.0.2, the X-Frame-Options header is not configured in HTTP response. This can potentially allow 'ClickJacking' attacks where an attacker can frame parts of the application on a malicious web site, revealing sensitive user information such as authentication credentials.

πŸ“– Read

via "National Vulnerability Database".
21:28
ATENTIONβ€Ό New - CVE-2019-19000

For ABB eSOMS 4.0 to 6.0.3, the Cache-Control and Pragma HTTP header(s) have not been properly configured within the application response. This can potentially allow browsers and proxies to cache sensitive information.

πŸ“– Read

via "National Vulnerability Database".
3 April 2020
?
00:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.4 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
06:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Watch out for the new wave of COVID-19 scams, warns IRS ⚠

If somebody promises to get your economic impact payment fast, back away: it's just one flavor of COVID-19 scam the tax agency is seeing.

πŸ“– Read

via "Naked Security".
?
07:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Windows 10 security: How the shadow stack will help to keep the hackers at bay πŸ”

How Windows will use Intel's Control-flow Enforcement Technology to block whole classes of common attacks, now it's finally reaching the market.

πŸ“– Read

via "Security on TechRepublic".
07:58
ATENTIONβ€Ό New - CVE-2019-18904

A Uncontrolled Resource Consumption vulnerability in rmt of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Public Cloud 15-SP1, SUSE Linux Enterprise Module for Server Applications 15, SUSE Linux Enterprise Module for Server Applications 15-SP1, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1 allows remote attackers to cause DoS against rmt by requesting migrations. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise High Performance Computing 15-LTSS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Module for Public Cloud 15-SP1 rmt-server versions prior to 2.5.2-3.9.1. SUSE Linux Enterprise Module for Server Applications 15 rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Module for Server Applications 15-SP1 rmt-server versions prior to 2.5.2-3.9.1. SUSE Linux Enterprise Server 15-LTSS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Server for SAP 15 rmt-server versions prior to 2.5.2-3.26.1. openSUSE Leap 15.1 rmt-server versions prior to 2.5.2-lp151.2.9.1.

πŸ“– Read

via "National Vulnerability Database".
?
08:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€˜Zombie’ Windows win32k bug reanimated by researcher ⚠

Dozens of bugs in a core Windows API could enable attackers to elevate their privileges in the operating system.

πŸ“– Read

via "Naked Security".
?
08:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Google confirms SuperVPN vulnerability, but keeps it on Play store πŸ•΅


πŸ“– Read

via "VPNpro".
08:58
ATENTIONβ€Ό New - CVE-2018-17954

A Least Privilege Violation vulnerability in crowbar of SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud Crowbar 9 allows root users on any crowbar managed node to cause become root on any other node. This issue affects: SUSE OpenStack Cloud 7 crowbar-core versions prior to 4.0+git.1578392992.fabfd186c-9.63.1, crowbar-. SUSE OpenStack Cloud 8 ardana-cinder versions prior to 8.0+git.1579279939.ee7da88-3.39.3, ardana-. SUSE OpenStack Cloud 9 ardana-ansible versions prior to 9.0+git.1581611758.f694f7d-3.16.1, ardana-. SUSE OpenStack Cloud Crowbar 8 crowbar-core versions prior to 5.0+git.1582968668.1a55c77c5-3.35.4, crowbar-. SUSE OpenStack Cloud Crowbar 9 crowbar-core versions prior to 6.0+git.1582892022.cbd70e833-3.19.3, crowbar-.

πŸ“– Read

via "National Vulnerability Database".
?
09:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-18905

A Insufficient Verification of Data Authenticity vulnerability in autoyast2 of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows remote attackers to MITM connections when deprecated and unused functionality of autoyast is used to create images. This issue affects: SUSE Linux Enterprise Server 12 autoyast2 version 4.1.9-3.9.1 and prior versions. SUSE Linux Enterprise Server 15 autoyast2 version 4.0.70-3.20.1 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
?
10:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spearphishing Campaign Exploits COVID-19 To Spread Lokibot Infostealer ❌

The attack discovered uses World Health Organization trademark to lure users with info related to coronavirus.

πŸ“– Read

via "Threatpost".
10:11
πŸ•΄ Reminder: The Black Hat USA 2020 Call for Papers Ends Monday πŸ•΄

Now is the time to pitch your great idea for a groundbreaking information security Briefing at Black Hat USA in August. But hurry because submissions close April 6!

πŸ“– Read

via "Dark Reading: ".
?
11:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Want to Improve Cloud Security? It Starts with Logging πŸ•΄

Remedying the "garbage in, garbage out" problem requires an understanding of what is causing the problem in the first place.

πŸ“– Read

via "Dark Reading: ".
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ This is Not Your Father's Ransomware πŸ•΄

Ransomware operators are aiming for bigger targets and hitting below the belt. With doxing and extortion threats added to the mix, ransomware is evolving into something even more sinister.

πŸ“– Read

via "Dark Reading: ".
?
13:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Warns Education & Remote Work Platforms About Cyberattacks πŸ•΄

The FBI expects attackers will target virtual environments as more organizations rely on them as a result of the COVID-19 pandemic.

πŸ“– Read

via "Dark Reading: ".
13:21
⚠ 5 things you can do today to make Zooming safer ⚠

5 things you can do to make your Zooming safer, more private and more secure...

πŸ“– Read

via "Naked Security".
13:25
πŸ” Friday Five: 4/3 πŸ”

Ryuk Ransomware continues to target hospitals, personal information of five million hotel guests gets breached, and Italy's social security website gets hacked - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-17231

includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress has multiple stored XSS issues.

πŸ“– Read

via "National Vulnerability Database".
?
14:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-17230

includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes.

πŸ“– Read

via "National Vulnerability Database".
14:35
❌ Cloud Providers, CDNs Team Up to Battle Internet Routing Attacks ❌

A group of CDNs and cloud providers are joining in on a fight against common internet routing attacks.

πŸ“– Read

via "Threatpost".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Coronavirus-themed attacks proving more successful than typical phishing campaigns πŸ”

Cybercriminals have effectively changed their tactics to take advantage of the fear over COVID-19, says security provider Menlo Security.

πŸ“– Read

via "Security on TechRepublic".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 7 of the best VPN providers for small businesses πŸ”

With work shifting away from offices, SMBs need a top-shelf VPN to continue doing business. Here are some of the leading brands.

πŸ“– Read

via "Security on TechRepublic".
?
17:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Self-Propagating Malware Targets Thousands of Docker Ports Per Day ❌

A Bitcoin-mining campaign using the Kinsing malware is spreading quickly thanks to cloud-container misconfigurations.

πŸ“– Read

via "Threatpost".
17:11
πŸ•΄ 5 Soothing Security Products We Wish Existed πŸ•΄

Maybe security alert fatigue wouldn't be so bad if the alerts themselves delivered less stress and more aromatherapy.

πŸ“– Read

via "Dark Reading: ".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Fraud prevention startup working on anonymous peer-to-peer verification network πŸ”

Identiq uses cryptographic algorithms and preserves customer privacy while enabling companies to to identify new customers through a network of trust.

πŸ“– Read

via "Security on TechRepublic".
?
19:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Digital gamer guide: 10 tips to help new online players πŸ”

To the uninitiated, online gaming may be slightly intimidating and a bit confusing. We can relieve those lingering trepidations with this set of practical tips for new players.

πŸ“– Read

via "Security on TechRepublic".
?
19:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days πŸ•΄

A security researcher earned $75,000 for finding a whopping seven zero-days in Safari, three of which can be combined to access the camera.

πŸ“– Read

via "Dark Reading: ".
?
20:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to prevent Zoom bombing: 5 simple tips πŸ”

Internet trolls are crashing Zoom video conferences and flooding them with inappropriate content. Here are easy ways to protect your meetings from Zoom bombers.

πŸ“– Read

via "Security on TechRepublic".
4 April 2020
?
10:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Firefox Zero-Day Flaws Exploited in the Wild Get Patched ❌

Mozilla Foundation rushes patches to fix bugs in its browser that could allow for remote code execution.

πŸ“– Read

via "Threatpost".
5 April 2020
?
07:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox zero day in the wild: patch now! ⚠

Mozilla just pushed out an update for its Firefox browser to patch a security hole that was already being exploited in the wild.

πŸ“– Read

via "Naked Security".
6 April 2020
?
05:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 24 stories of the week ⚠

From Marriott International's huge data breach to whether Houseparty has really hacked you - it's roundup time.

πŸ“– Read

via "Naked Security".
?
07:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Beyond Zoom: How Safe Are Slack and Other Collaboration Apps? ❌

COVID-19’s effect on work footprints has created an unprecedented challenge for IT and security staff. Many departments are scrambling to enable collaboration apps for all -- but without proper security they can be a big risk.

πŸ“– Read

via "Threatpost".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hackers’ forum hacked, OGUsers database dumped (again) ⚠

A rival hacking forum has yet again hacked OGUsers and doxxed its database for one and all to grab.

πŸ“– Read

via "Naked Security".
?
10:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Rights groups appeal to governments over COVID-19 surveillance ⚠

Digital and human rights groups have joined in a rare worldwide appeal to governments to respect privacy when handling the COVID-19 crisis.

πŸ“– Read

via "Naked Security".
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Windows 10: How to track down that irritating bug with DTrace πŸ”

Microsoft has implemented the popular open tracing tool to help developers debug Windows code.

πŸ“– Read

via "Security on TechRepublic".
10:34
πŸ” How to keep your Apple devices updated automatically πŸ”

Keeping your Apple devices up-to-date helps ensure security and reliability. Don't spend time on manual updates--leave it to iOS and macOS to automatically update your system and apps.

πŸ“– Read

via "Security on TechRepublic".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Humans Will Always Be Phishing's Weakest Link πŸ•΄

And it's not just because they click when they shouldn't... they also leave a trail of clues and details that make them easy to spoof

πŸ“– Read

via "Dark Reading: ".
?
12:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why critical infrastructure is vulnerable to cyberattacks πŸ”

Robert Lee, founder and CEO of Dragos, discusses the dangers cyberattacks pose to critical industrial infrastructures.

πŸ“– Read

via "Security on TechRepublic".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why critical infrastructure is vulnerable to cyberattacks πŸ”

Robert Lee, founder and CEO of Dragos, discusses the dangers cyberattacks pose to critical industrial infrastructures.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ” These are the countries trying to hack US critical infrastructure πŸ”

Dan Patterson speaks with cybersecurity expert Robert Lee about how Russia, Iran, China, and North Korea pose a threat to US industrial infrastructures.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ” These are the countries trying to hack US critical infrastructure πŸ”

Robert Lee, founder & CEO of Dragos, Inc., speaks with Dan Patterson about which countries pose a threat to US industrial infrastructures.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ” How the US hacks other countries πŸ”

Founder & CEO of Dragos, Inc., speaks with Dan Patterson about the US hacking other countries and its policies when responding to cybersecurity threats.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ” How US cities are hacked by other countries πŸ”

Dragos, Inc., Founder & CEO Robert Lee talks to Dan Patterson about the risks of IoT as well as the capabilities of Russian hackers.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ” How the US hacks other countries πŸ”

Founder & CEO of Dragos, Inc., speaks with Dan Patterson about the US hacking other countries and its policies when responding to cybersecurity threats.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ” How the government should regulate cybersecurity πŸ”

Dragos, Inc., Founder & CEO speaks with Dan Patterson about current methods of securing the US infrastructure and ways IoT can be regulated.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ” How US cities are hacked by other countries πŸ”

Dragos, Inc., Founder & CEO Robert Lee talks to Dan Patterson about the risks of IoT as well as the capabilities of Russian hackers.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ” How the government should regulate cybersecurity πŸ”

Dragos, Inc., Founder & CEO speaks with Dan Patterson about current methods of securing the US infrastructure and ways IoT can be regulated.

πŸ“– Read

via "Security on TechRepublic".
12:37
⚠ Will Apple’s β€œmicrophone switch” stop your iPad getting bugged? ⚠

A microphone switch! What will they think of next?

πŸ“– Read

via "Naked Security".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” VPN: 5 reasons business pros should always use one πŸ”

You need to protect your web traffic, and a VPN will do that and more.

πŸ“– Read

via "Security on TechRepublic".
13:08
πŸ•΄ Mozilla Patches Two Critical Zero-Days in Firefox πŸ•΄

The latest release of Firefox brings fixes for two Critical vulnerabilities already seen exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
13:10
❌ Government VPN Servers Targeted in Zero-Day Attack ❌

The attacks are being carried out against Chinese government interests worldwide, according to Qihoo 360.

πŸ“– Read

via "Threatpost".
?
14:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Humans Are Phishing's Weakest Link πŸ•΄

And it's not just because they click when they shouldn't... they also leave a trail of clues and details that make them easy to spoof

πŸ“– Read

via "Dark Reading: ".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Quantum encryption: How it works πŸ”

Futurist Isaac Arthur explains how to stay safe from quantum encryption hacking.

πŸ“– Read

via "Security on TechRepublic".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Quantum encryption: How it works πŸ”

Futurist Isaac Arthur explains how to stay safe from quantum encryption hacking.

πŸ“– Read

via "Security on TechRepublic".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-19699

There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.

πŸ“– Read

via "National Vulnerability Database".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Senators Question Apple About New COVID-19 App Privacy πŸ”

Senators, just like they did when Google announced plans to use its technology to screen for COVID-19, have some privacy questions for Apple, which recently said it will do the same, via a website and app.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:40
❌ Apple Safari Flaws Enable One-Click Webcam Access ❌

The white hat hacker who discovered the vulnerabilities received a $75,000 from Apple's bug-bounty program.

πŸ“– Read

via "Threatpost".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Warns of BEC Dangers πŸ•΄

A new PSA warns of attacks launched against users of two popular cloud-based email systems.

πŸ“– Read

via "Dark Reading: ".
?
18:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to sync Firefox containers across devices πŸ”

If you make use of the Firefox Multi-Container Account add-on, it now includes the ability to sync your customizations across your Firefox account.

πŸ“– Read

via "Security on TechRepublic".
18:04
πŸ” How to enable 2FA for groups in Nextcloud πŸ”

Nextcloud allows you to enforce groups to use two-factor authentication. Let's find out how to create a group and then add them to 2FA enforcement.

πŸ“– Read

via "Security on TechRepublic".
18:10
❌ FBI Threatens β€˜Zoom Bombing’ Trolls With Jail Time ❌

The FBI is cracking down on the practice of Zoom bombing, saying the hijacking of web conferences can be punishable by jail time.

πŸ“– Read

via "Threatpost".
18:10
❌ A Brisk Private Trade in Zero-Days Widens Their Use ❌

More zero-day exploits coming up for sale by NSO Group and others is democratizing the attack vector and placing them within reach of less sophisticated attackers.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5 ways to prevent Zoom bombing πŸ”

Learn how to prevent internet trolls from crashing your Zoom video conferences and flooding them with inappropriate content.

πŸ“– Read

via "Security on TechRepublic".
?
19:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft: Emotet Attack Shut Down an Entire Business Network πŸ•΄

The infection started with a phishing email and spread throughout the organization, overheating all machines and flooding its Internet connection.

πŸ“– Read

via "Dark Reading: ".
?
19:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Misconfigured Containers Again Targeted by Cryptominer Malware πŸ•΄

An attack group is searching for insecure containers exposing the Docker API and then installing a program that attempts to mine cryptocurrency. It's not the first time.

πŸ“– Read

via "Dark Reading: ".
?
21:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ More Attackers Have Begun Using Zero-Day Exploits πŸ•΄

Vendors of offensive cyber tools have made it easy for any threat group with the right funds to leverage unpatched bugs, FireEye says.

πŸ“– Read

via "Dark Reading: ".
7 April 2020
?
07:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
[
[CANAL] Merger 21.02.2020 09:51:48
​​πŸ”₯ AMAZING CHANNELS!! πŸ”₯
?
08:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Thousands of Android apps contain undocumented backdoors, study finds ⚠

A study has found that thousands of legitimate Android apps are taking liberties or installing with capabilities that users wouldn’t expect to exist.

πŸ“– Read

via "Naked Security".
?
08:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 Security Podcasts Worth Tuning In To πŸ•΄

Recommendations for podcasts discussing news, trends, guidance, and stories across the cybersecurity industry.

πŸ“– Read

via "Dark Reading: ".
09:01
⚠ Two schoolkids sue Google for collecting biometrics ⚠

The suit is about biometrics and children's privacy in Google's education apps, which are suddenly, wildly popular now due to COVID-19.

πŸ“– Read

via "Naked Security".
?
09:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Twitter warns users – Firefox might hold on to private messages ⚠

Whose fault was it - Twitter or Firefox? (It's fixed now, to be clear.)

πŸ“– Read

via "Naked Security".
09:34
πŸ” BlackBerry: Chinese cybercriminals target high-value Linux servers with weak defenses πŸ”

Five APT groups have been using remote access trojans to take advantage of a network component that doesn't get much attention from security teams.

πŸ“– Read

via "Security on TechRepublic".
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybercriminals increasingly using SSL certificates to spread malware πŸ”

Enterprises that don't perform adequate SSL inspections are now at a much higher risk to be breached or attacked, according to a Menlo Security report.

πŸ“– Read

via "Security on TechRepublic".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Zoom's security flaws: Has it done enough to fix them? πŸ”

As millions have flooded Zoom because of COVID-19, the site became a prime target for hackers. Here is how the company responded, and whether security experts think it's adequate.

πŸ“– Read

via "Security on TechRepublic".
11:16
❌ Official Government COVID-19 Mobile Apps Hide a Raft of Threats ❌

Android apps launched for citizens in Iran, Colombia and Italy offer cyberattackers new attack vectors.

πŸ“– Read

via "Threatpost".
11:27
πŸ•΄ Using Application Telemetry to Reveal Insider & Evasive Threats πŸ•΄

Data from application processes and other systems leave a trail of threat crumbs that can be used to detect and shut down attacks.

πŸ“– Read

via "Dark Reading: ".
?
11:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-11053

An issue was discovered on Samsung mobile devices with software through 2015-11-11 (supporting FRP/RL). There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2015-5131 (January 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11052

An issue was discovered on Samsung mobile devices with L(5.0/5.1) software. je_free in libQjpeg.so in Qjpeg in Qt 5.5 allows memory corruption via a malformed JPEG file. The Samsung ID is SVE-2015-5110 (January 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11051

An issue was discovered on Samsung mobile devices with J(4.2) (Qualcomm Wi-Fi chipsets) software. There is a buffer overflow in the Qualcomm WLAN Driver. The Samsung ID is SVE-2016-5326 (February 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11050

An issue was discovered on Samsung mobile devices with S3(KK), Note2(KK), S4(L), Note3(L), and S5(L) software. An attacker can rewrite the IMEI by flashing crafted firmware. The Samsung ID is SVE-2016-5562 (March 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11049

An issue was discovered on Samsung mobile devices with software through 2016-01-16 (Shannon333/308/310 chipsets). The IMEI may be retrieved and modified because of an error in managing key information. The Samsung ID is SVE-2016-5435 (March 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11048

An issue was discovered on Samsung mobile devices with L(5.0/5.1) (Spreadtrum or Marvell chipsets) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2016-5421 (March 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11047

An issue was discovered on Samsung mobile devices with JBP(4.2) and KK(4.4) (Marvell chipsets) software. The ACIPC-MSOCKET driver allows local privilege escalation via a stack-based buffer overflow. The Samsung ID is SVE-2016-5393 (April 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11046

An issue was discovered on Samsung mobile devices with JBP(4.3), KK(4.4), and L(5.0/5.1) software. Because of a misused whitelist, attackers can reach the radio layer (aka RIL or RILD) to place calls or send SMS messages. The Samsung ID is SVE-2016-5733 (May 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11045

An issue was discovered on Samsung mobile devices with L(5.0/5.1) software. The Gallery library allow memory corruption via a malformed image. The Samsung ID is SVE-2016-5317 (May 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11044

An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) (with Fingerprint support) software. The check of an application's signature can be bypassed during installation. The Samsung ID is SVE-2016-5923 (June 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11043

An issue was discovered on Samsung mobile devices with M(6.0) software. The S/MIME implementation in EAS uses DES (where 3DES is intended). The Samsung ID is SVE-2016-5871 (June 2016).

πŸ“– Read

via "National Vulnerability Database".
11:48
ATENTIONβ€Ό New - CVE-2016-11042

An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) software. There is a SIM Lock bypass. The Samsung ID is SVE-2016-5381 (June 2016).

πŸ“– Read

via "National Vulnerability Database".
?
12:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cyberattacks on the rise since the start of the coronavirus outbreak πŸ”

Phishing is the leading threat exploiting COVID-19, followed by malicious websites, according to a survey of IT professionals from Check Point.

πŸ“– Read

via "Security on TechRepublic".
12:18
ATENTIONβ€Ό New - CVE-2016-11041

An issue was discovered on Samsung mobile devices with KK(4.4) software. Attackers can bypass the lockscreen by sending an AT command over USB. The Samsung ID is SVE-2015-5301 (June 2016).

πŸ“– Read

via "National Vulnerability Database".
?
12:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to install and configure WireGuard VPN on Linux πŸ”

WireGuard has yet to arrive in the Linux kernel, but you can still start testing how this new feature will work.

πŸ“– Read

via "Security on TechRepublic".
?
13:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-18692

An issue was discovered on Samsung mobile devices with M(6.0) and N(7.0) (MSM8939, MSM8996, MSM8998, Exynos7580, Exynos8890, or Exynos8895 chipsets) software. There is a race condition, with a resultant buffer overflow, in the sec_ts touchscreen sysfs interface. The Samsung ID is SVE-2016-7501 (January 2017).

πŸ“– Read

via "National Vulnerability Database".
13:48
ATENTIONβ€Ό New - CVE-2016-11040

An issue was discovered on Samsung mobile devices with L(5.0/5.1) (with USB OTG MyFile2014_L_ESS support) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2015-5068 (June 2016).

πŸ“– Read

via "National Vulnerability Database".
13:48
ATENTIONβ€Ό New - CVE-2016-11039

An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) (AP + CP MDM9x35, or Qualcomm Onechip) software. There is a NULL pointer dereference issue in the IPC socket code. The Samsung ID is SVE-2016-5980 (July 2016).

πŸ“– Read

via "National Vulnerability Database".
13:48
ATENTIONβ€Ό New - CVE-2016-11038

An issue was discovered on Samsung mobile devices with software through 2016-04-05 (incorporating the Samsung Professional Audio SDK). The Jack audio service doesn't implement access control for shared memory, leading to arbitrary code execution or privilege escalation. The Samsung ID is SVE-2016-5953 (July 2016).

πŸ“– Read

via "National Vulnerability Database".
13:48
ATENTIONβ€Ό New - CVE-2016-11037

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6604. Reason: This candidate is a reservation duplicate of CVE-2016-6604. Notes: All CVE users should reference CVE-2016-6604 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
13:48
ATENTIONβ€Ό New - CVE-2016-11036

An issue was discovered on Samsung mobile devices with M(6.0) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2016-6008 (August 2016).

πŸ“– Read

via "National Vulnerability Database".
13:57
πŸ•΄ 71% of Security Pros See Threats Jump Since COVID-19 Outbreak πŸ•΄

Phishing is the top threat, followed by websites offering false information about the pandemic, malware, and ransomware attacks.

πŸ“– Read

via "Dark Reading: ".
?
14:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FIN6 and TrickBot Combine Forces in β€˜Anchor’ Attacks ❌

FIN6 fingerprints were spotted in recent cyberattacks that initially infected victims with the TrickBot trojan, and then eventually downloaded the Anchor backdoor malware.

πŸ“– Read

via "Threatpost".
14:16
❌ xHelper: The Russian Nesting Doll of Android Malware ❌

Ultimately delivering the Triada payload, xHelper goes to great lengths to become virtually indestructible once installed on a smartphone.

πŸ“– Read

via "Threatpost".
14:18
ATENTIONβ€Ό New - CVE-2016-11035

An issue was discovered on Samsung mobile devices with software through 2016-05-27 (Exynos AP chipsets). A local graphics user can cause a Kernel Crash via the fb0(DECON) frame buffer interface. The Samsung ID is SVE-2016-7011 (October 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11034

An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) software. The decode function in Qjpeg in Qt 5.7 allows attackers to trigger a system crash via a malformed image. The Samsung ID is SVE-2016-6560 (October 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11033

An issue was discovered on Samsung mobile devices with M(6.0) software. There is a heap-based buffer overflow in tlc_server. The Samsung IDs are SVE-2016-7220 and SVE-2016-7225 (November 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11032

An issue was discovered on Samsung mobile devices with M(6.0) software. An attacker can disable all Sound functionality by broadcasting an unprotected intent. The Samsung IDs are SVE-2016-7179 and SVE-2016-7182 (November 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11031

An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) software. AntService allows a system_server crash and reboot. The Samsung ID is SVE-2016-7044 (November 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11030

An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) (with Hrm sensor support) software. The sysfs of the MAX86902 sensor driver does not prevent concurrent access, leading to a race condition and resultant heap-based buffer overflow. The Samsung ID is SVE-2016-7341 (December 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11029

An issue was discovered on Samsung mobile devices with L(5.0/5.1), M(6.0), and N(7.0) software. Attackers can read the password of the Mobile Hotspot in the log because of an unprotected intent. The Samsung ID is SVE-2016-7301 (December 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11028

An issue was discovered on Samsung mobile devices with software through 2016-09-13 (Exynos AP chipsets). There is a stack-based buffer overflow in the OTP TrustZone trustlet. The Samsung IDs are SVE-2016-7173 and SVE-2016-7174 (December 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11027

An issue was discovered on Samsung mobile devices with M(6.0) software. In the Shade Locked state, a physically proximate attacker can read notifications on the lock screen. The Samsung ID is SVE-2016-7132 (December 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11026

An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) software. BootReceiver allows attackers to trigger a system crash because of incorrect exception handling. The Samsung ID is SVE-2016-7118 (December 2016).

πŸ“– Read

via "National Vulnerability Database".
14:18
ATENTIONβ€Ό New - CVE-2016-11025

An issue was discovered on Samsung mobile devices with software through 2016-09-13 (Exynos AP chipsets). There is a memcpy heap-based buffer overflow in the OTP service. The Samsung ID is SVE-2016-7114 (December 2016).

πŸ“– Read

via "National Vulnerability Database".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Experts question abrupt decision by New York City to ban Zoom from use in all public schools πŸ”

The hotly debated move does little to address underlying issues many teachers and parents are having with the platform and other tools, educators say.

πŸ“– Read

via "Security on TechRepublic".
?
15:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Coronavirus & Cybersecurity: 3 Areas of Exploitation πŸ•΄

Criminal, political, and strategic factors are combining to create a perfect storm of cyber infections that target the global supply chain.

πŸ“– Read

via "Dark Reading: ".
?
15:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-18647

An issue was discovered on Samsung mobile devices with M(6,x) and N(7.0) software. The TA Scrypto v1.0 implementation in Secure Driver has a race condition with a resultant buffer overflow. The Samsung IDs are SVE-2017-8973, SVE-2017-8974, and SVE-2017-8975 (November 2017).

πŸ“– Read

via "National Vulnerability Database".
15:48
πŸ” NYDFS Postpones Cybersecurity Certification of Compliance Deadline πŸ”

The New York Department of Financial Services has extended its usual April 15 cybersecurity Certification of Compliance deadline for entities experiencing issues arising from COVID-19

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:57
πŸ•΄ Mature DevOps Teams Are Secure DevOps Teams πŸ•΄

New research shows the relationship between mature DevOps processes, secure applications, and happy developers.

πŸ“– Read

via "Dark Reading: ".
?
16:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Do I Make Sure My Work-From-Home Users Install Updates? πŸ•΄

Most enterprise endpoint solutions will support policies to enforce recommended updates.

πŸ“– Read

via "Dark Reading: ".