21 June 2019
?
07:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Millions of Dell PCs Vulnerable to Flaw in Third-Party Component ❌

A component in SupportAssist software pre-installed on Dell PCs - and other OEM devices - opens systems up to DLL hijacking attacks.

πŸ“– Read

via "Threatpost".
?
08:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” OEM diagnostic software used by Dell and other manufacturers has a serious security flaw πŸ”

SupportAssist, which comes pre-installed on millions of Dell PCs, is based on a platform called PC-Doctor, and it can be abused to give attackers system-level access to hardware and software.

πŸ“– Read

via "Security on TechRepublic".
?
08:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Used Nest cams were letting previous owners spy on you ⚠

Google says it's fixed the issue, but we haven't heard details on how many, and which, products were affected.

πŸ“– Read

via "Naked Security".
08:51
πŸ•΄ Attackers Exploit MSP's Tools to Distribute Ransomware πŸ•΄

Early information suggests threat actors gained access to the managed service provider's remote monitoring and management tools and used them to attack the firm's clients.

πŸ“– Read

via "Dark Reading: ".
?
09:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft uses AI to push Windows 10 upgrade to users ⚠

From November, users running some versions of Windows 10 will be required to upgrade or find themselves unable to receive security updates.

πŸ“– Read

via "Naked Security".
09:19
πŸ” KGB agents' wearables: Watches, cufflinks, shoes, and more πŸ”

The KGB Espionage Museum's curator Agne Urbaityte describes how agents concealed spying devices in what they wore when working in the field.

πŸ“– Read

via "Security on TechRepublic".
?
10:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Apply Military Strategy to Cybersecurity at Black Hat Trainings Virginia πŸ•΄

This special October event in Alexandria, Virginia offers unique, practical courses in everything from data breach response to military strategy for cybersecurity.

πŸ“– Read

via "Dark Reading: ".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mozilla Fixes Second Actively-Exploited Firefox Flaw ❌

Mozilla has patched a second actively-exploited vulnerability in Firefox this week.

πŸ“– Read

via "Threatpost".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Patrolling the New Cybersecurity Perimeter πŸ•΄

Remote work and other developments demand a shift to managing people rather than devices.

πŸ“– Read

via "Dark Reading: ".
12:19
πŸ” The KGB's eavesdropping and spying devices in everyday items πŸ”

The KGB Espionage Museum's curator Agne Urbaityte explains why and how plates and ashtrays were used as eavesdropping and spying devices.

πŸ“– Read

via "Security on TechRepublic".
12:26
πŸ•΄ Startup Raises $13.7M to Stop Breaches with Behavioral Analytics πŸ•΄

TrueFort plans to use the funding to expand sales, marketing, R&D, customer support, and go-to-market initiatives.

πŸ“– Read

via "Dark Reading: ".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-7404

OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.

πŸ“– Read

via "National Vulnerability Database".
?
14:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Pledges to Not Pay Ransomware Hit Reality πŸ•΄

While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay.

πŸ“– Read

via "Dark Reading: ".
?
14:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 6/21 Edition πŸ”

A $600,000 ransom is paid, a phishing attack yields more victims than expected, and a trio of university data breaches - catch up on the week's news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Four CVEs Describe SACKs of Linux and FreeBSD Vulnerabilities πŸ•΄

Four new CVEs present issues that have a potential DoS impact on almost every Linux user.

πŸ“– Read

via "Dark Reading: ".
?
15:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-15694

When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.

πŸ“– Read

via "National Vulnerability Database".
?
15:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyber-Risks Hiding Inside Mobile App Stores πŸ•΄

As the number of blacklisted apps on Google Play continues to drop, attackers find new ways to compromise smartphones.

πŸ“– Read

via "Dark Reading: ".
?
16:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Podcast: Dating App Privacy and NASA Cyberattack ❌

The Threatpost team discusses the top news of the week - from a NASA cyberincident to dating app privacy issues.

πŸ“– Read

via "Threatpost".
?
16:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Outlook for Android Open to XSS Attacks ❌

A spoofing bug (CVE-2019-1105) can open the door to an email attack chain.

πŸ“– Read

via "Threatpost".
?
18:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MobOk Malware Hides in Photo Editors on Google Play, Siphons Cash ❌

Pink Camera apps secretly signed users up for premium subscription services.

πŸ“– Read

via "Threatpost".
?
19:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to view your privacy settings for Microsoft Office 365 πŸ”

You can and should review your privacy settings for Microsoft Office 365. Learn how in this step-by-step tutorial.

πŸ“– Read

via "Security on TechRepublic".
24 June 2019
?
05:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 20 stories of the week ⚠

From Bella Thorne publishing her own nudes to the Yubikey recall - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
07:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook posts reveal your hidden illnesses, say researchers ⚠

The language we use could be indicators of disease and, with patient consent, could be monitored just like physical symptoms.

πŸ“– Read

via "Naked Security".
?
08:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Desjardins’ employee from hell spills 2.9m records ⚠

The leak, carried out by a since-fired rogue employee, affected 2.7 million people and 173,000 businesses - about 41% of its clientele.

πŸ“– Read

via "Naked Security".
08:18
⚠ Mobile apps riddled with high-risk vulnerabilities, warns report ⚠

Be careful before installing that mobile app on your iOS or Android device - many mobile applications are riddled with vulnerabilities.

πŸ“– Read

via "Naked Security".
08:18
⚠ Mozilla patched two Firefox zero-day flaws in one week ⚠

Two emergency zero days affecting a browser in one week counts as unusual - especially when they pop up as separate alerts two days apart.

πŸ“– Read

via "Naked Security".
?
10:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Modern-Day Heist: IP Theft Techniques That Enable Attackers ❌

There's more than one way to get inside a company.

πŸ“– Read

via "Threatpost".
?
10:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Iran Targeting U.S. With Destructive Wipers, Warns DHS ❌

The Department of Homeland Security is warning that U.S. agencies are being targeted by Iranian-backed cyberattacks with destructive wiper malware.

πŸ“– Read

via "Threatpost".
11:08
πŸ•΄ Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks πŸ•΄

The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.

πŸ“– Read

via "Dark Reading: ".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why half of enterprises struggle to keep pace with cloud security πŸ”

SaaS applications are supplanting traditional desktop software, and visibility into cloud workloads is a major problem, according to Symantec.

πŸ“– Read

via "Security on TechRepublic".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Raspberry Pi Used in JPL Breach πŸ•΄

NASA report shows exfiltration totaling more than 100 GB of information since 2009.

πŸ“– Read

via "Dark Reading: ".
15:12
πŸ” Preventing Tax Professional Data Theft Continues to Be a Challenge πŸ”

A committee whose job is to oversee tax administration issues for the IRS says limitations at the agency are fostering cybersecurity risks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook Faces Lawsuit Over Massive 2018 Data Breach ❌

An attempt by Facebook to block a lawsuit, regarding a massive 2018 data breach, has been shot down.

πŸ“– Read

via "Threatpost".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-17945

The ASUS HiVivo aspplication before 5.6.27 for ASUS Watch has Missing SSL Certificate Validation.

πŸ“– Read

via "National Vulnerability Database".
?
18:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Health Insurer Reports Data Breach That Began 9 Years Ago πŸ•΄

Dominion National first spotted something awry in April of 2019.

πŸ“– Read

via "Dark Reading: ".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-9699

The MakerBot Replicator 5G printer runs an Apache HTTP Server with directory indexing enabled. Apache logs, system logs, design files (i.e., a history of print files), and more are exposed to unauthenticated attackers through this HTTP server.

πŸ“– Read

via "National Vulnerability Database".
?
19:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS-for-Hire Services Doubled in Q1 πŸ•΄

Impact of FBI's takedown of 15 'booter' domains last December appears to have been temporary.

πŸ“– Read

via "Dark Reading: ".
?
20:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Socio-Technical Approach to Cybersecurity's Problems πŸ•΄

Researchers explore how modern security problems can be solved with an examination of society, technology, and security.

πŸ“– Read

via "Dark Reading: ".
25 June 2019
?
07:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cop awarded $585K after colleagues snooped on her via license database ⚠

Krekelberg alleged that 58 fellow officers broke a federal privacy law by searching for her driver’s license data without any reason.

πŸ“– Read

via "Naked Security".
07:53
⚠ Government agencies still send sensitive files via hackable .zips ⚠

Senator Ron Wyden has written to NIST asking for guidance and training for government staff in how to share files securely.

πŸ“– Read

via "Naked Security".
07:53
⚠ Presidential text alerts are open to spoofing attacks, warn researchers ⚠

Researchers have shown that it’s technically possible for hackers to target the US Presidential text Alerts system to send fake messages.

πŸ“– Read

via "Naked Security".
?
08:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WeTransfer sends user file links to wrong people ⚠

Popular file transfer service WeTransfer faces embarrassment this week after admitting that it had mailed file links to the wrong users.

πŸ“– Read

via "Naked Security".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Rise of Silence and the Fall of Coinhive πŸ•΄

Cryptomining will exist as long as it remains profitable. One of the most effective ways to disrupt that activity is to make it too expensive to run cryptomining malware in your network.

πŸ“– Read

via "Dark Reading: ".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” FedEx suing Department of Commerce over burden of enforcing Huawei blacklisting πŸ”

Following a series of incidents in which packages were misrouted, and under increasing scrutiny from the Chinese government, FedEx is seeking relief.

πŸ“– Read

via "Security on TechRepublic".
11:44
πŸ” How to custom a template in Enpass πŸ”

Enpass allows you to create your own custom templates for even more efficient usage.

πŸ“– Read

via "Security on TechRepublic".
?
12:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Malspam Emails Blanket LokiBot, NanoCore Malware With ISO Files ❌

A new malicious campaign is spreading LokiBot and NanoCore trojans under the guise of an ISO file claiming to be an invoice.

πŸ“– Read

via "Threatpost".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to install an FTP server and secure it with TLS πŸ”

Gain more security with your open source FTP server with the help of OpenSSL and TLS.

πŸ“– Read

via "Security on TechRepublic".
?
14:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Companies on Watch After US, Iran Claim Cyberattacks πŸ•΄

With the cyber conflict between the United States and Iran ramping up, companies traditionally targeted by the countries - such as those in the oil and gas and financial industries - need to bolster their security efforts, experts say.

πŸ“– Read

via "Dark Reading: ".
?
15:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Avoid Becoming the Next Riviera Beach πŸ•΄

Be prepared by following these five steps so you don't have to pay a ransom to get your data back.

πŸ“– Read

via "Dark Reading: ".
?
15:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Newly-Discovered Malware Targets Unpatched MacOS Flaw ❌

Researchers have found samples of malware that targets a recently-disclosed, unpatched MacOS vulnerability.

πŸ“– Read

via "Threatpost".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why data breaches keep happening πŸ”

Data breaches remain prevalent in the enterprise. Learn what companies are doing right--and wrong--when it comes to prevention.

πŸ“– Read

via "Security on TechRepublic".
16:12
πŸ” Data Breach at Health Insurer May Have Begun Nine Years Ago πŸ”

A data breach at this company may have started as early as nine years ago, in the summer of 2010.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:18
⚠ Serious Security: Rambleed attacks blunted – the OpenSSH way ⚠

Here's a way to keep secrets safe in memory, even in a world of hardware-level leakage due to tricks like Rambleed, Spectre and more.

πŸ“– Read

via "Naked Security".
?
16:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ AWS Makes Control Tower & Security Hub Generally Available πŸ•΄

Security Hub aims to manage security across an AWS environment; Control Tower handles security and compliance for multi-account environments.

πŸ“– Read

via "Dark Reading: ".
?
18:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Adds New Secure Storage Area to OneDrive πŸ•΄

PersonalVault locks down files with MFA and encryption.

πŸ“– Read

via "Dark Reading: ".
?
19:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Global Cyberattack Hit Mobile Carrier Networks πŸ•΄

A nation-state group possibly out of China has attacked cell carrier networks in search of data on high-value individuals.

πŸ“– Read

via "Dark Reading: ".
19:17
πŸ•΄ AWS CISO Talks Risk Reduction, Development, Recruitment πŸ•΄

Steve Schmidt says limiting access to data has dramatically changed the security posture across Amazon Web Services.

πŸ“– Read

via "Dark Reading: ".
?
19:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ SEMrush Plugs Remote Code Execution Bug in Its SaaS Platform ❌

Web analytics firm plugs a hole in its platform that allowed attackers to open a reverse shell that could be used to attack the service.

πŸ“– Read

via "Threatpost".
?
20:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Email Threats Continue to Grow as Attackers Evolve, Innovate πŸ•΄

Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.

πŸ“– Read

via "Dark Reading: ".
26 June 2019
?
07:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google creates educational tools to help kids spot fake news ⚠

Google has expanded its internet safety guide for children with techniques and games to help them be more info-literate online.

πŸ“– Read

via "Naked Security".
07:53
⚠ VLC media player gets biggest security update ever ⚠

Maintainers of the world’s most popular open source media player, VLC, has issued the biggest single set of security fixes in the program’s history.

πŸ“– Read

via "Naked Security".
07:53
⚠ Social engineering forum hacked, user data dumped on rival site ⚠

Social Engineered, dedicated to the β€œArt of Human Hacking,” was gutted, with 55,121 users' details leaked on the same day as the hack.

πŸ“– Read

via "Naked Security".
?
08:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hacker threw Molotov cocktail, dropped USB drive of his DDoS deeds ⚠

Those things drop out of pockets at the worst times. Like, say, when you're hurling a bomb at a brick-and-mortar that you've also DDoSed.

πŸ“– Read

via "Naked Security".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Could Foster Kids Help Solve the Security Skills Shortage? πŸ•΄

Foster Warriors is a new nonprofit initiative focused on helping foster kids find a place in the world, and especially in the world of security. Join us!

πŸ“– Read

via "Dark Reading: ".
11:17
❌ Second Florida City Pays Hackers $500k Post-Ransomware Attack ❌

After being hit by a ransomware attack, the second Florida city this month has opted to pay hackers their requested ransom.

πŸ“– Read

via "Threatpost".
11:19
πŸ” How to create a custom template in Enpass πŸ”

Enpass allows you to create a streamlined template to meet your specific password needs.

πŸ“– Read

via "Security on TechRepublic".
?
11:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FIDO Alliance to Tackle Identity Verification and IoT Authentication πŸ•΄

Standards group forms two new working groups to develop new open specifications.

πŸ“– Read

via "Dark Reading: ".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: FedEx sues DOC, skilled workers are in demand, and how companies stay relevant πŸ”

This week's TechRepublic and ZDNet news stories include a Verizon error leads to massive outages, Apple's plan to hire 2,000 employees, and five ways robots impact our lives.

πŸ“– Read

via "Security on TechRepublic".
12:17
❌ EA Games Patches Account-Hijacking Bug ❌

A bug in the Electronic Arts gaming platform's single sign-on mechanism could have allowed hackers to access game accounts.

πŸ“– Read

via "Threatpost".
?
12:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Docker containers are filled with vulnerabilities: Here's how the top 1,000 fared πŸ”

An analysis of the 1,000 most popular Docker containers uncovered a variety of security vulnerabilities, some of which are critical.

πŸ“– Read

via "Security on TechRepublic".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: FedEx sues the DOC, skilled workers are in demand, and how companies stay relevant πŸ”

This week's TechRepublic and ZDNet news stories include a Verizon error leads to massive outages, Apple's plan to hire 2,000 employees, and five ways robots impact our lives.

πŸ“– Read

via "Security on TechRepublic".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Breaking the Endless Cycle of "Perfect" Cybercrimes πŸ•΄

A two-step strategy for creating an attack environment that is more complex, less profitable, and more likely to expose the attacker.

πŸ“– Read

via "Dark Reading: ".
?
15:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How Texas’ New Data Breach Law Will Affect Businesses πŸ”

Recent changes to data privacy legislation in the Lone Star State will likely affect the incident response plan of any business that does business in the state.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Distributed denial of service (DDoS) attacks: A cheat sheet πŸ”

This comprehensive guide covers different types of denial of service attacks, DDoS protection strategies, as well as why it matters for business.

πŸ“– Read

via "Security on TechRepublic".
16:38
❌ Iranian APT33 Shakes Up Cyberespionage Tactics ❌

After a March report exposed Iran-linked APT33's infrastructure and operations, the cyberespionage group has adopted new tactics and techniques.

πŸ“– Read

via "Threatpost".
?
16:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Warns of Critical Flaws in Data Center Network Manager ❌

Cisco has patched two critical vulnerabilities in its Data Center Network Manager software, which could allow a remote attacker to take over affected devices.

πŸ“– Read

via "Threatpost".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ McAfee Sues 3 Former Staffers Now at Rival Tanium πŸ•΄

Lawsuit alleges sales representatives stole trade secrets from McAfee before joining Tanium.

πŸ“– Read

via "Dark Reading: ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Developers and Security Teams Under Pressure to Collaborate πŸ•΄

The challenges and benefits to getting two traditionally adversarial groups on the same page.

πŸ“– Read

via "Dark Reading: ".
?
18:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Breaking the Endless Cycle of "Perfect" Cybercrimes πŸ•΄

A two-step strategy for creating an attack environment that is more complex, less profitable, and more likely to expose the attacker.

πŸ“– Read

via "Dark Reading: ".
18:47
πŸ•΄ New Linux Worm Attacks IoT Devices πŸ•΄

Silex has 'bricked' more than 2,000 Linux-based IoT devices so far.

πŸ“– Read

via "Dark Reading: ".
?
19:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Announces DNS over HTTPS β€˜General Availability’ ❌

Google finalizes its DNS-over-HTTPS service inching toward a world where DNS request are sent via HTTPS and not UDP or TCP.

πŸ“– Read

via "Threatpost".
?
20:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Malware Coming to a Mac Near You? Yes, Say Security Firms πŸ•΄

While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

πŸ“– Read

via "Dark Reading: ".
20:24
πŸ” TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download πŸ”

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read

via "Security on TechRepublic".
27 June 2019
?
09:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How organizations face risks by relying too much on cloud vendors for security πŸ”

Many enterprises are too dependent on cloud vendors to secure their critical online data rather than adopting security as a shared responsibility, according to a survey from CyberArk.

πŸ“– Read

via "Security on TechRepublic".
?
10:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA πŸ•΄

Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.

πŸ“– Read

via "Dark Reading: ".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Are heart electrocardiograms the next big thing in biometrics? ⚠

After fingers, the iris of the eye, ears and even lips, it was probably inevitable that someone would propose the human heart might be the next big thing in biometric security.

πŸ“– Read

via "Naked Security".
?
10:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FTC crackdown targets operators behind 1 billion robocalls ⚠

It's a drop in the β€œ4.7 billion robocalls placed per month” bucket, but hey, it's better than nothing!

πŸ“– Read

via "Naked Security".
11:02
⚠ YouTube’s antics with kids’ data prompts call for FTC to force change ⚠

Sen. Markey and 2 consumer groups said the Google-owned service must comply with COPPA and should be held accountable for not doing so.

πŸ“– Read

via "Naked Security".
11:07
πŸ•΄ Office 365 Multifactor Authentication Done Right πŸ•΄

Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.

πŸ“– Read

via "Dark Reading: ".
11:13
πŸ” Will mobile devices replace passwords? πŸ”

Mobile devices could provide a more secure, user-friendly mode of account authentication, according to an IDG and MobileIron report.

πŸ“– Read

via "Security on TechRepublic".
?
12:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Tesla 3 navigation system fooled with GPS spoofing ⚠

Cybersecurity researchers have fooled the Tesla Model 3's automatic navigation system into rapidly braking and taking a wrong turn on the highway.

πŸ“– Read

via "Naked Security".
?
13:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Thousands of IoT Devices Bricked By Silex Malware ❌

A 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week. Threatpost talks to the researcher who discovered the malware.

πŸ“– Read

via "Threatpost".
13:23
❌ New Microsoft Excel Attack Vector Surfaces ❌

Researchers have identified security hole in Microsoft Office’s Excel spreadsheet program that allows an attacker to trigger a malware attack on remote systems.

πŸ“– Read

via "Threatpost".
13:29
ATENTIONβ€Ό New - CVE-2018-1893

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152157.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-1892

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152156.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-1828

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150431.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-1827

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150430.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-1826

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150429.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-1760

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148614.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-1758

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148605.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-1734

IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 discloses sensitive information in error messages that may be used by a malicious user to orchestrate further attacks. IBM X-Force ID: 147838.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-15747 (glot-www)

The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.

πŸ“– Read

via "National Vulnerability Database".
?
13:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How does the CVE scoring system work? πŸ”

Have you ever wondered how vulnerabilities are scored? Here's a simplified explanation for an overly complex system.

πŸ“– Read

via "Security on TechRepublic".
14:02
πŸ•΄ More Supply, More Demand: Cybersecurity Skills Gap Remains πŸ•΄

Although the number of programs for training workers in cybersecurity skills has increased, as well as the number of graduates, the gap in supply and demand for cybersecurity-skilled workers is essentially unchanged, leaving companies to struggle.

πŸ“– Read

via "Dark Reading: ".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Understanding & Defending Against Polymorphic Attacks πŸ•΄

Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here's why.

πŸ“– Read

via "Dark Reading: ".
15:29
ATENTIONβ€Ό New - CVE-2018-17478

Incorrect array position calculations in V8 in Google Chrome prior to 70.0.3538.102 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-17460

Insufficient data validation in filesystem URIs in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-16086

Insufficient policy enforcement in extensions API in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-16077

Object lifecycle issue in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass content security policy via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-16075

Insufficient file type enforcement in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to obtain local file data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-16074

Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-16073

Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-16070

Integer overflows in Skia in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-16069

Unintended floating-point error accumulation in SwiftShader in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-16064

Insufficient data validation in Extensions API in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-15557

An issue was discovered in the Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 devices. An attacker can statically set his/her IP to anything on the 169.254.1.0/24 subnet, and obtain root access by connecting to 169.254.1.2 port 23 with telnet/netcat.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2018-15556

The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user "root" and an empty password by using the enabled onboard UART headers.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-5028

Insufficient data validation in V8 in Google Chrome prior to 56.0.2924.76 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
15:35
πŸ” Report: Still Work To Be Done Safeguarding Federal Agencies πŸ”

Many federal agencies are unprepared to "confront the dynamic cyber threats of today," according to a Senate investigation this week.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Hackers Infiltrate Open Source Projects πŸ•΄

The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.

πŸ“– Read

via "Dark Reading: ".
?
16:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Scammers Prey on Instagram Vanity and β€˜Verified Account’ Status ❌

Hackers are stealing Instagram credentials through a tricky phishing scam that asks victims to apply for exclusive verified account status.

πŸ“– Read

via "Threatpost".
?
17:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Ways to Mitigate Supply Chain Attacks πŸ•΄

Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.

πŸ“– Read

via "Dark Reading: ".
17:12
πŸ•΄ Inside MLS, the New Protocol for Secure Enterprise Messaging πŸ•΄

As personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security.

πŸ“– Read

via "Dark Reading: ".
17:18
❌ Leaky Amazon S3 Buckets Expose Data of Netflix, TD Bank ❌

Netflix, TD Bank, and Ford were only a few of the companies whose data was exposed by three leaky Amazon S3 buckets owned by Attunity.

πŸ“– Read

via "Threatpost".
17:22
πŸ•΄ Former Equifax CIO Sentenced to Prison for Insider Trading πŸ•΄

Jun Ying is the second Equifax employee found guilty of insider trading related to the massive 2017 data breach.

πŸ“– Read

via "Dark Reading: ".
?
18:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NIST Issues IoT Risk Guidelines πŸ•΄

A new report offers the first step toward understanding and managing IoT cybersecurity risks.

πŸ“– Read

via "Dark Reading: ".
?
18:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Smart Lock Turns Out to be Not So Smart, or Secure ❌

Pentesters say a keyless smart lock made by U-tec, called Ultraloq, is neither ultra or secure.

πŸ“– Read

via "Threatpost".
?
19:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Chronicle Folds into Google πŸ•΄

Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.

πŸ“– Read

via "Dark Reading: ".
?
20:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Exploit for Microsoft Excel Power Query πŸ•΄

Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.

πŸ“– Read

via "Dark Reading: ".
?
22:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cryptocurrency phish dials back the fear, cranks up the politeness ⚠

Spammers and scammers are getting better at spelling and grammar - so make sure you aren't relying on language alone to spot phishes...

πŸ“– Read

via "Naked Security".
28 June 2019
?
06:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google Maps shortcut turns into 100-car mud pie in farmer’s field ⚠

Trying to save 20 minutes, 100 drivers took a Google Maps shortcut... into a field, where the mud-stuck cars then caused a 2-hour delay.

πŸ“– Read

via "Naked Security".
?
07:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Mozilla’s bizarre robo-surfer project demonstrates ad snooping ⚠

In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that you're someone else.

πŸ“– Read

via "Naked Security".
?
09:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ $50 DeepNude app undresses women with a single click ⚠

"I'm not a voyeur, I'm a technology enthusiast,” says the creator, who combined deepfake AI with a need for cash to get ka-CHING!

πŸ“– Read

via "Naked Security".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Death of the VPN: Enterprise Security Needs New Foundations ❌

Twenty years in, enterprise VPNs occupy a uniquely solid position in a changing landscape.

πŸ“– Read

via "Threatpost".
10:12
πŸ•΄ Black Hat USA's New Micro Summits Deliver Focused, Practical Security Insights πŸ•΄

This year Black Hat USA is introducing special half-day programs focused on important topics that combine subject matter expertise with networking opportunities.

πŸ“– Read

via "Dark Reading: ".
?
10:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How SMBs can better protect sensitive data against cyberattacks πŸ”

Know your enemy and know your risk are two pieces of advice offered in a new report from security company eSentire.

πŸ“– Read

via "Security on TechRepublic".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy πŸ•΄

Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.

πŸ“– Read

via "Dark Reading: ".
?
12:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps ❌

The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S.

πŸ“– Read

via "Threatpost".
12:20
πŸ” Friday Five: 6/28 Edition πŸ”

A $600,000 ransomware payment, statistics on the cybersecurity talent shortage, and more - catch up on the week's news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cloud Provider PCM Suffers Data Breach πŸ•΄

Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.

πŸ“– Read

via "Dark Reading: ".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-15555

On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.

πŸ“– Read

via "National Vulnerability Database".
?
14:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Key Biscayne Hit by Cybersecurity Attack πŸ•΄

Key Biscayne is the third Florida town to be hit by hackers in June.

πŸ“– Read

via "Dark Reading: ".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-15520

Various Lexmark devices have a Buffer Overflow (issue 2 of 2).

πŸ“– Read

via "National Vulnerability Database".
15:34
ATENTIONβ€Ό New - CVE-2018-15519

Various Lexmark devices have a Buffer Overflow (issue 1 of 2).

πŸ“– Read

via "National Vulnerability Database".
15:34
ATENTIONβ€Ό New - CVE-2018-14919

LOYTEC LGATE-902 6.3.2 devices allow XSS.

πŸ“– Read

via "National Vulnerability Database".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to set up multi-factor authentication for an IAM user in AWS πŸ”

MFA protocols are a simple best practice for increasing the overall access security of AWS cloud services and could prevent costly security breaches in your enterprise.

πŸ“– Read

via "Security on TechRepublic".
?
16:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MongoDB Leak Exposed Millions of Medical Insurance Records ❌

Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com.

πŸ“– Read

via "Threatpost".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Dridex Variant Slips By Anti-Virus Detection ❌

A never-before-seen Dridex variant has been spotted in phishing emails using anti-virus detection evasion tactics.

πŸ“– Read

via "Threatpost".
17:22
πŸ•΄ MageCart Launches Customizable Campaign πŸ•΄

A tool new to MageCart bolsters the group's ability to evade detection and steal data.

πŸ“– Read

via "Dark Reading: ".
17:29
ATENTIONβ€Ό New - CVE-2018-14918

LOYTEC LGATE-902 6.3.2 devices allow Directory Traversal.

πŸ“– Read

via "National Vulnerability Database".
17:29
ATENTIONβ€Ό New - CVE-2018-14916

LOYTEC LGATE-902 6.3.2 devices allow Arbitrary file deletion.

πŸ“– Read

via "National Vulnerability Database".
17:29
ATENTIONβ€Ό New - CVE-2018-14887

Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
17:29
ATENTIONβ€Ό New - CVE-2018-14886

The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.

πŸ“– Read

via "National Vulnerability Database".
17:29
ATENTIONβ€Ό New - CVE-2018-14885

Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.

πŸ“– Read

via "National Vulnerability Database".
17:29
ATENTIONβ€Ό New - CVE-2018-14868

Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.

πŸ“– Read

via "National Vulnerability Database".
17:29
ATENTIONβ€Ό New - CVE-2018-14867

Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.

πŸ“– Read

via "National Vulnerability Database".
29 June 2019
?
19:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-10761

Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing encryption, aka MouseJack.

πŸ“– Read

via "National Vulnerability Database".
1 July 2019
?
06:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 21 stories of the week ⚠

From the controversial DeepNude app to the Molotov-cocktail-throwing hacker who dropped his USB stick - and everything in between.

πŸ“– Read

via "Naked Security".
?
07:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Crave that Instagram verified badge? Don’t fall for this login-stealing scam ⚠

It's yet another way to trick Instagram users out of their login credentials. Don't fall for it, lest your account be hijacked!

πŸ“– Read

via "Naked Security".
?
09:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cloud computing giant PCM hacked ⚠

The attackers allegedly stole admin credentials for Office 365 accounts, and planned to use stolen data to conduct gift card fraud.

πŸ“– Read

via "Naked Security".
?
10:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Too Many Tools? Tidy Up in 'KonMari' Style πŸ•΄

You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Planning a Bug Bounty Program? Follow In Shopify's Footsteps πŸ•΄

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ To Pay or Not To Pay? That Is the (Ransomware) Question πŸ•΄

From Albany, New York, to Atlanta, Georgia, to Del Rio, Texas, cities across the US have been hit with ransomware attacks.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Back to Basics with Log Management, SIEMs & MSSPs πŸ•΄

Still not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Staying Ahead of the Bot Landscape πŸ•΄

Thinking of the bot landscape as homogeneous paints an overly simplistic picture.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ How to Defend Credentials From Automated Attack Tools πŸ•΄

The following recommendations can help both end users and Web defenders mitigate credential abuse attacks.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ 3 Security Imperatives And The Evolving Digital Topology πŸ•΄

No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ DHS's Bob Kolasky Goes All in on Risk Management πŸ•΄

As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Capture the Flag: Training Made Fun πŸ•΄

CTFs require participants to be creative while using their critical-thinking and problem-solving skills to ultimately arrive at a functional solution.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Security Considerations in a BYOD Culture πŸ•΄

The 'bring your own device' movement has put security pros on high alert for a new breed of predator on the hunt to find ways to exploit the ever-expanding attack surface.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ The 10 Essential Basics of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ The Truth About Vulnerabilities in Open Source Code πŸ•΄

The problem isn't with the code itself, experts say.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ Keep Your Eye on Digital Certificates πŸ•΄

X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expiration and must be managed.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ A Security-First Approach to DevOps πŸ•΄

A lack of a security mandate in the development process has given rise to the recognized need for application security.

πŸ“– Read

via "Dark Reading: ".
10:10
πŸ•΄ There's a Security Incident in the Cloud: Who's Responsible? πŸ•΄

It's a valid question, and one many enterprises remain unsure of amid a mass migration that has transformed business over the past few years.

πŸ“– Read

via "Dark Reading: ".
10:11
πŸ•΄ VPNs' Future: Less Reliant on Users, More Transparent, And Smarter πŸ•΄

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the Internet of Things need protection.

πŸ“– Read

via "Dark Reading: ".
10:11
πŸ•΄ What Every Security Team Should Know About Internet Threats πŸ•΄

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

πŸ“– Read

via "Dark Reading: ".
10:11
πŸ•΄ About The Edge πŸ•΄



πŸ“– Read

via "Dark Reading: ".
10:11
πŸ•΄ How to Create Smarter Risk Assessments πŸ•΄

Quantitative measurements - likelihood of loss, hard-dollar financial impact -- are what executives and directors need to make more informed decisions about security risks

πŸ“– Read

via "Dark Reading: ".
10:11
πŸ•΄ Consumer Data, Upcoming Elections Are at Risk, Black Hat Survey Says πŸ•΄

Newly published '2019 Black Hat USA Attendee Survey' recommends users stay off social media and remain wary of products that promise to solve security problems.

πŸ“– Read

via "Dark Reading: ".
?
10:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Too Many Tools? Tidy Up in 'KonMari' Style πŸ•΄

You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.

πŸ“– Read

via "Dark Reading: ".
10:46
πŸ•΄ To Pay or Not To Pay? That Is the (Ransomware) Question πŸ•΄

From Albany, New York, to Atlanta, Georgia, to Del Rio, Texas, cities across the US have been hit with ransomware attacks.

πŸ“– Read

via "Dark Reading: ".
10:46
πŸ•΄ Back to Basics with Log Management, SIEMs & MSSPs πŸ•΄

Still not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.

πŸ“– Read

via "Dark Reading: ".
10:46
πŸ•΄ Staying Ahead of the Bot Landscape πŸ•΄

Thinking of the bot landscape as homogeneous paints an overly simplistic picture.

πŸ“– Read

via "Dark Reading: ".
10:46
πŸ•΄ How to Defend Credentials From Automated Attack Tools πŸ•΄

The following recommendations can help both end users and Web defenders mitigate credential abuse attacks.

πŸ“– Read

via "Dark Reading: ".
10:46
πŸ•΄ 3 Security Imperatives And The Evolving Digital Topology πŸ•΄

No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.

πŸ“– Read

via "Dark Reading: ".
10:46
πŸ•΄ Capture the Flag: Training Made Fun πŸ•΄

CTFs require participants to be creative while using their critical-thinking and problem-solving skills to ultimately arrive at a functional solution.

πŸ“– Read

via "Dark Reading: ".
10:46
πŸ•΄ Keep Your Eye on Digital Certificates πŸ•΄

X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expiration and must be managed.

πŸ“– Read

via "Dark Reading: ".
10:46
πŸ•΄ About The Edge πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ ETERNALBLUE sextortion scam puts your password where your name should be ⚠

Here's a sextortion scam that puts your password right where your name would usually be, to rattle your cage even more than usual.

πŸ“– Read

via "Naked Security".
11:10
πŸ•΄ Building the Future Through Security Internships πŸ•΄

Akamai University, a 12-week internship program, was built from the ground up with the goal of promoting the student not the company.

πŸ“– Read

via "Dark Reading: ".
?
11:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ RDP BlueKeep exploit shows why you really, really need to patch ⚠

A video of the exploit shows CVE-2019-0708 being exploited remotely, without authentication.

πŸ“– Read

via "Naked Security".
?
11:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Create Smarter Risk Assessments πŸ•΄

Quantitative measurements - likelihood of loss, hard-dollar financial impact -- are what executives and directors need to make more informed decisions about security risks

πŸ“– Read

via "Dark Reading: ".
11:50
πŸ•΄ The Truth About Your Software Supply Chain πŸ•΄

Open source components help developers innovate faster, but they sometimes come at a high price.

πŸ“– Read

via "Dark Reading: ".
11:55
πŸ•΄ Planning a Bug Bounty Program? Follow In Shopify's Footsteps πŸ•΄

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

πŸ“– Read

via "Dark Reading: ".
11:55
πŸ•΄ Security Considerations in a BYOD Culture πŸ•΄

The 'bring your own device' movement has put security pros on high alert for a new breed of predator on the hunt to find ways to exploit the ever-expanding attack surface.

πŸ“– Read

via "Dark Reading: ".
11:55
πŸ•΄ The 10 Essential Basics of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".
12:06
πŸ•΄ VPNs' Future: Less Reliant on Users, More Transparent, And Smarter πŸ•΄

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the Internet of Things need protection.

πŸ“– Read

via "Dark Reading: ".
12:06
πŸ•΄ What Every Security Team Should Know About Internet Threats πŸ•΄

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

πŸ“– Read

via "Dark Reading: ".
12:09
❌ Dating App Jack’d Fined After Leaking Users’ Nude Pics ❌

LGBQT dating app Jack'd has been slapped with a $240,000 fine on the heels of a data breach that leaked personal data and nude photos of its users.

πŸ“– Read

via "Threatpost".
12:20
πŸ•΄ Malware Coming to a Mac Near You? Yes, Say Security Firms πŸ•΄

While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

πŸ“– Read

via "Dark Reading: ".
12:20
πŸ•΄ Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA πŸ•΄

Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.

πŸ“– Read

via "Dark Reading: ".
?
14:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Hits Georgia Court System πŸ•΄

The court's IT department is meeting with external agencies to determine the scope and severity of the cyberattack.

πŸ“– Read

via "Dark Reading: ".
14:34
πŸ” 10 tips for dealing with an online impersonator πŸ”

When someone impersonates you online it can be a frightening and stressful experience. Learn how to safeguard your identity and accounts.

πŸ“– Read

via "Security on TechRepublic".
?
15:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” With CCPA 6 Months Away, Advertising Industry Pushes for US Privacy Law πŸ”

An advertising trade group told the FTC last week that it supports a nation-wide data privacy standard that will provide enhanced privacy protections to consumers.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:19
πŸ” You're going to pay more for .org and .info domains following ICANN's lifting of price caps πŸ”

Despite near-universal condemnation of the proposed lifting of price caps during a public comment period, ICANN will allow the operators of .org and .info to raise prices.

πŸ“– Read

via "Security on TechRepublic".
15:29
ATENTIONβ€Ό New - CVE-2016-5236

Cross-Site-Scripting (XSS) vulnerabilities in F5 WebSafe Dashboard 3.9.5 and earlier, aka F5 WebSafe Alert Server, allow privileged authenticated users to inject arbitrary web script or HTML when creating a new user, account or signature.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2016-5235

A Cross Site Scripting (XSS) vulnerability in versions of F5 WebSafe Dashboard 3.9.x and earlier, aka F5 WebSafe Alert Server, allows an unauthenticated user to inject HTML via a crafted alert.

πŸ“– Read

via "National Vulnerability Database".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Warning on Ryuk Ransomware πŸ•΄

Campaign throws in Emotet and Trickbot for good measure, according to the UK's National Cyber Security Centre.

πŸ“– Read

via "Dark Reading: ".
?
17:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook Removes Accounts Used to Infect Thousands With Malware-Laced Links ❌

A widespread malware campaign, ongoing since 2014, was using Facebook accounts and posts to spread malware through URL links.

πŸ“– Read

via "Threatpost".
?
18:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Thousands of Facebook Users Hit in Malware Distribution Campaign πŸ•΄

'Operation Tripoli' is another reminder why users cannot trust every link they see on social media sites.

πŸ“– Read

via "Dark Reading: ".
?
18:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attunity Data Leak Exposes Sensitive Files at Ford, TD Bank πŸ•΄

Three unsecured Amazon S3 storage buckets compromised more than 1TB of data belonging to Attunity and its high-profile clients.

πŸ“– Read

via "Dark Reading: ".
18:35
❌ Finding Beauty In The Architecture ❌

I have a confession to make. I’m a sucker for good architecture. Visiting places like Singapore, London, Rome, Bueno Aires, and New York City, I quickly find myself gravitating towards beautiful archways, spires, and even the voids used in designing some of the world’s most amazing buildings. I also found myself with a similar sense […]

πŸ“– Read

via "Threatpost".
?
18:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why WPA3 is necessary to secure Wi-Fi 6 / 802.11ax networks πŸ”

Following the disclosure of the KRACK vulnerability, WPA3 was developed to prevent "session replay" attacks. Aruba's Jeff Lipton explains the importance of WPA3 to Wi-Fi 6.

πŸ“– Read

via "Security on TechRepublic".
2 July 2019
?
06:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Relatives’ DNA in geneology database leads to murder conviction ⚠

Privacy advocates may question the use of genealogy data in forensics, but defense attorneys in this case did not.

πŸ“– Read

via "Naked Security".
?
07:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Medtronic rushes to replace insulin pumps after flaws found ⚠

Medtronic is immediately recalling of all MiniMed 508 & Paradigm insulin pumps after researchers uncovered serious security flaws.

πŸ“– Read

via "Naked Security".
?
07:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Dating app Jack’d fined $240K for leaving private photos up for a year ⚠

The company behind the gay dating app left users' private photos online for a year in spite of knowing about the security bugs.

πŸ“– Read

via "Naked Security".
?
08:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Scary Granny zombie game slurps credentials, spawns phishing attack ⚠

Halloween came a little early for some Android users this year after a horror-themed computer game was found stealing their account credentials and displaying potentially malicious ads.

πŸ“– Read

via "Naked Security".
?
08:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Thousands of Facebook Users Hit in Malware Distribution Campaign πŸ•΄

'Operation Tripoli' is another reminder why users cannot trust every link they see on social media sites.

πŸ“– Read

via "Dark Reading: ".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why WPA3 is necessary to secure Wi-Fi 6 / 802.11ax networks πŸ”

Following the disclosure of the KRACK vulnerability, WPA3 was developed to prevent "session replay" attacks. Aruba's Jeff Lipton explains the importance of WPA3 to Wi-Fi 6.

πŸ“– Read

via "Security on TechRepublic".
?
09:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 1 in 10 tech employees plan to steal company information before leaving a job πŸ”

Insider threats are more difficult to detect and prevent than external attacks, and are a major threat to businesses, according to Gurucul.

πŸ“– Read

via "Security on TechRepublic".
09:40
πŸ•΄ Ransomware Hits Georgia Court System πŸ•΄

The court's IT department is meeting with external agencies to determine the scope and severity of the cyberattack.

πŸ“– Read

via "Dark Reading: ".
?
11:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cyberwar risk: Utilities fail to patch critical security vulnerabilities often enough πŸ”

The potential risks associated with compromised systems are severe. Given the prospects of a potential cyberwar, utilities should place a greater emphasis on security.

πŸ“– Read

via "Security on TechRepublic".
12:09
πŸ” How organizations can better protect themselves against supply chain security threats πŸ”

Running regular anti-malware scans and blocking malicious IP addresses are two strategies. But organizations need to do more to defend themselves against security risks from supply chain partners, according to (ISC)2.

πŸ“– Read

via "Security on TechRepublic".
?
12:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mac Malware Pushed via Google Search Results, Masquerades as Flash Installer ❌

A new malware is targeting Macs with new tactics to sniff out antivirus and virtual machines.

πŸ“– Read

via "Threatpost".
12:35
πŸ•΄ Lake City Employee Fired Following Ransom Payment πŸ•΄

The Florida city approved its insurer to pay $460,000 in ransom for a cyberattack that shut down servers, email, and phone.

πŸ“– Read

via "Dark Reading: ".
?
13:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Bill Could Ease HIPAA Enforcement πŸ”

A bill passed by a Senate Committee last week could ease Health Insurance Portability and Accountability Act (HIPAA) enforcements by incentivizing healthcare entities to adopt cybersecurity policies.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
14:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Toyota's Car-Hacking Tool Now Available πŸ•΄

'PASTA' hardware and software kit now retails for $28,300.

πŸ“– Read

via "Dark Reading: ".
?
14:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google July Android Security Bulletin Fixes 3 Critical RCE Bugs ❌

Google fixed several critical and high-severity vulnerabilities in its Android operating system.

πŸ“– Read

via "Threatpost".
15:06
πŸ•΄ Poor Communications Slowing DevOps Shift πŸ•΄

Existing functional silos are standing in the way of building a DevOps culture.

πŸ“– Read

via "Dark Reading: ".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ In Cybercrime's Evolution, Active, Automated Attacks Are the Latest Fad πŸ•΄

Staying ahead can feel impossible, but understanding that perfection is impossible can free you to make decisions about managing risk.

πŸ“– Read

via "Dark Reading: ".
15:34
ATENTIONβ€Ό New - CVE-2017-8408

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of setting a SMB folder for the video clippings recorded by the device. It seems that the GET parameters passed in this request (to test if SMB credentials and hostname sent to the device work properly) result in being passed as commands to a "system" API in the function and thus result in command injection on the device. If the firmware version is dissected using binwalk tool, we obtain a cramfs-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "cgibox" is the one that has the vulnerable function "sub_7EAFC" that receives the values sent by the GET request. If we open this binary in IDA-pro we will notice that this follows a ARM little endian format. The function sub_7EAFC in IDA pro is identified to be receiving the values sent in the GET request and the value set in GET parameter "user" is extracted in function sub_7E49C which is then passed to the vulnerable system API call.

πŸ“– Read

via "National Vulnerability Database".
?
17:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 things to know about Europe's SCA rules πŸ”

Europe's Strong Customer Authentication compliance regulations go into effect in September 2019. Tom Merritt explains five things you need to know to get ready for SCA.

πŸ“– Read

via "Security on TechRepublic".
17:04
πŸ” Top 5 things to know about Europe's SCA rules πŸ”

Europe's Strong Customer Authentication compliance regulations go into effect in September 2019. Tom Merritt explains five things you need to know to get ready for SCA.

πŸ“– Read

via "Security on TechRepublic".
?
17:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Human Side-Channels': Behavioral Traces We Leave Behind πŸ•΄

How writing patterns, online activities, and other unintentional identifiers can be used in cyber offense and defense.

πŸ“– Read

via "Dark Reading: ".
17:34
❌ IBM Patches Critical, High-Severity Flaws in Spectrum Protect ❌

IBM has disclosed multiple critical and high-severity flaws across an array of products, the most severe of which exist in its IBM Spectrum Protect tool.

πŸ“– Read

via "Threatpost".
17:34
ATENTIONβ€Ό New - CVE-2017-8411

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of setting a SMB folder for the video clippings recorded by the device. It seems that the POST parameters passed in this request (to test if email credentials and hostname sent to the device work properly) result in being passed as commands to a "system" API in the function and thus result in command injection on the device. If the firmware version is dissected using binwalk tool, we obtain a cramfs-root archive which contains the filesystem set up on the device that contains all the binaries. The library "libmailutils.so" is the one that has the vulnerable function "sub_1FC4" that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows an ARM little endian format. The function sub_1FC4 in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "receiver1" is extracted in function "sub_15AC" which is then passed to the vulnerable system API call. The vulnerable library function is accessed in "cgibox" binary at address 0x00023BCC which calls the "Send_mail" function in "libmailutils.so" binary as shown below which results in the vulnerable POST parameter being passed to the library which results in the command injection issue.

πŸ“– Read

via "National Vulnerability Database".
17:34
ATENTIONβ€Ό New - CVE-2017-8407

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross-site request forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface to change the user's password.

πŸ“– Read

via "National Vulnerability Database".
17:34
ATENTIONβ€Ό New - CVE-2017-8404

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of setting a SMB folder for the video clippings recorded by the device. It seems that the POST parameters passed in this request (to test if email credentials and hostname sent to the device work properly) result in being passed as commands to a "system" API in the function and thus result in command injection on the device. If the firmware version is dissected using binwalk tool, we obtain a cramfs-root archive which contains the filesystem set up on the device that contains all the binaries. The library "libmailutils.so" is the one that has the vulnerable function "sub_1FC4" that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows an ARM little endian format. The function sub_1FC4 in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "receiver1" is extracted in function "sub_15AC" which is then passed to the vulnerable system API call. The vulnerable library function is accessed in "cgibox" binary at address 0x0008F598 which calls the "mailLoginTest" function in "libmailutils.so" binary as shown below which results in the vulnerable POST parameter being passed to the library which results in the command injection issue.

πŸ“– Read

via "National Vulnerability Database".
?
18:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Experts Worry About Satellite & Space Systems πŸ•΄

As nation-states and rogue actors increasingly probe critical infrastructure, policy and technology experts worry that satellite and space systems are on the front lines.

πŸ“– Read

via "Dark Reading: ".
?
18:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Security Camera Firm Arlo Zaps High-Severity Bugs ❌

Bugs in Arlo Technologies’ equipment allow a local attacker to take control of Alro wireless home video security cameras.

πŸ“– Read

via "Threatpost".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-8417

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device requires that a user logging into the device provide a username and password. However, the device allows D-Link apps on the mobile devices and desktop to communicate with the device without any authentication. As a part of that communication, the device uses custom version of base64 encoding to pass data back and forth between the apps and the device. However, the same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third party to retrieve the device's password without any authentication by sending just 1 UDP packet with custom base64 encoding. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8416

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device runs a custom daemon on UDP port 5978 which is called "dldps2121" and listens for broadcast packets sent on 255.255.255.255. This daemon handles custom D-Link UDP based protocol that allows D-Link mobile applications and desktop applications to discover D-Link devices on the local network. The binary processes the received UDP packets sent from any device in "main" function. One path in the function traverses towards a block of code that processing of packets which does an unbounded copy operation which allows to overflow the buffer. The custom protocol created by Dlink follows the following pattern: Packetlen, Type of packet; M=MAC address of device or broadcast; D=Device Type;C=base64 encoded command string;test=1111 We can see at address function starting at address 0x0000DBF8 handles the entire UDP packet and performs an insecure copy using strcpy function at address 0x0000DC88. This results in overflowing the stack pointer after 1060 characters and thus allows to control the PC register and results in code execution. The same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third-party application on the device to execute commands on the device without any authentication by sending just 1 UDP packet with custom base64 encoding.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8415

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device has a custom telnet daemon as a part of the busybox and retrieves the password from the shadow file using the function getspnam at address 0x00053894. Then performs a crypt operation on the password retrieved from the user at address 0x000538E0 and performs a strcmp at address 0x00053908 to check if the password is correct or incorrect. However, the /etc/shadow file is a part of CRAM-FS filesystem which means that the user cannot change the password and hence a hardcoded hash in /etc/shadow is used to match the credentials provided by the user. This is a salted hash of the string "admin" and hence it acts as a password to the device which cannot be changed as the whole filesystem is read only.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8414

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary orthrus in /sbin folder of the device handles all the UPnP connections received by the device. It seems that the binary performs a sprintf operation at address 0x0000A3E4 with the value in the command line parameter "-f" and stores it on the stack. Since there is no length check, this results in corrupting the registers for the function sub_A098 which results in memory corruption.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8413

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device runs a custom daemon on UDP port 5978 which is called "dldps2121" and listens for broadcast packets sent on 255.255.255.255. This daemon handles custom D-Link UDP based protocol that allows D-Link mobile applications and desktop applications to discover D-Link devices on the local network. The binary processes the received UDP packets sent from any device in "main" function. One path in the function traverses towards a block of code that handles commands to be executed on the device. The custom protocol created by D-Link follows the following pattern: Packetlen, Type of packet; M=MAC address of device or broadcast; D=Device Type;C=base64 encoded command string;test=1111. If a packet is received with the packet type being "S" or 0x53 then the string passed in the "C" parameter is base64 decoded and then executed by passing into a System API. We can see at address 0x00009B44 that the string received in packet type subtracts 0x31 or "1" from the packet type and is compared against 0x22 or "double quotes". If that is the case, then the packet is sent towards the block of code that executes a command. Then the value stored in "C" parameter is extracted at address 0x0000A1B0. Finally, the string received is base 64 decoded and passed on to the system API at address 0x0000A2A8 as shown below. The same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third-party application on the device to execute commands on the device without any authentication by sending just 1 UDP packet with custom base64 encoding.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8412

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device has a custom binary called mp4ts under the /var/www/video folder. It seems that this binary dumps the HTTP VERB in the system logs. As a part of doing that it retrieves the HTTP VERB sent by the user and uses a vulnerable sprintf function at address 0x0000C3D4 in the function sub_C210 to copy the value into a string and then into a log file. Since there is no bounds check being performed on the environment variable at address 0x0000C360 this results in a stack overflow and overwrites the PC register allowing an attacker to execute buffer overflow or even a command injection attack.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8410

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary performs a memcpy operation at address 0x00011E34 with the value sent in the "Authorization: Basic" RTSP header and stores it on the stack. The number of bytes to be copied are calculated based on the length of the string sent in the RTSP header by the client. As a result, memcpy copies more data then it can hold on stack and this results in corrupting the registers for the caller function sub_F6CC which results in memory corruption. The severity of this attack is enlarged by the fact that the same value is then copied on the stack in the function 0x00011378 and this allows to overflow the buffer allocated and thus control the PC register which will result in arbitrary code execution on the device.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8409

An issue was discovered on D-Link DCS-1130 devices. The device requires that a user logging to the device to provide a username and password. However, the device does not enforce the same restriction on a specific URL thereby allowing any attacker in possession of that to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8406

An issue was discovered on D-Link DCS-1130 devices. The device provides a crossdomain.xml file with no restrictions on who can access the webserver. This allows an hosted flash file on any domain to make calls to the device's webserver and pull any information that is stored on the device. In this case, user's credentials are stored in clear text on the device and can be pulled easily. It also seems that the device does not implement any cross-site scripting forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a cross-site flashing attack on the user's browser and execute any action on the device provided by the web management interface which steals the credentials from tools_admin.cgi file's response and displays it inside a Textfield.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-8405

An issue was discovered on D-Link DCS-1130 and DCS-1100 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary loads at address 0x00012CF4 a flag called "Authenticate" that indicates whether a user should be authenticated or not before allowing access to the video feed. By default, the value for this flag is zero and can be set/unset using the HTTP interface and network settings tab as shown below. The device requires that a user logging to the HTTP management interface of the device to provide a valid username and password. However, the device does not enforce the same restriction by default on RTSP URL due to the checkbox unchecked by default, thereby allowing any attacker in possession of external IP address of the camera to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-11580

Blipcare Wifi blood pressure monitor BP700 10.1 devices allow memory corruption that results in Denial of Service. When connected to the "Blip" open wireless connection provided by the device, if a large string is sent as a part of the HTTP request in any part of the HTTP headers, the device could become completely unresponsive. Presumably this happens as the memory footprint provided to this device is very small. According to the specs from Rezolt, the Wi-Fi module only has 256k of memory. As a result, an incorrect string copy operation using either memcpy, strcpy, or any of their other variants could result in filling up the memory space allocated to the function executing and this would result in memory corruption. To test the theory, one can modify the demo application provided by the Cypress WICED SDK and introduce an incorrect "memcpy" operation and use the compiled application on the evaluation board provided by Cypress semiconductors with exactly the same Wi-Fi SOC. The results were identical where the device would completely stop responding to any of the ping or web requests.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-11579

In the most recent firmware for Blipcare, the device provides an open Wireless network called "Blip" for communicating with the device. The user connects to this open Wireless network and uses the web management interface of the device to provide the user's Wi-Fi credentials so that the device can connect to it and have Internet access. This device acts as a Wireless Blood pressure monitor and is used to measure blood pressure levels of a person. This allows an attacker who is in vicinity of Wireless signal generated by the Blipcare device to easily sniff the credentials. Also, an attacker can connect to the open wireless network "Blip" exposed by the device and modify the HTTP response presented to the user by the device to execute other attacks such as convincing the user to download and execute a malicious binary that would infect a user's computer or mobile device with malware.

πŸ“– Read

via "National Vulnerability Database".
19:29
ATENTIONβ€Ό New - CVE-2017-11578

It was discovered as a part of the research on IoT devices in the most recent firmware for Blipcare device that the device allows to connect to web management interface on a non-SSL connection using plain text HTTP protocol. The user uses the web management interface of the device to provide the user's Wi-Fi credentials so that the device can connect to it and have Internet access. This device acts as a Wireless Blood pressure monitor and is used to measure blood pressure levels of a person. This allows an attacker who is connected to the Blipcare's device wireless network to easily sniff these values using a MITM attack.

πŸ“– Read

via "National Vulnerability Database".
19:42
πŸ•΄ New MacOS Malware Discovered πŸ•΄

A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.

πŸ“– Read

via "Dark Reading: ".
3 July 2019
?
06:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Patch Android! July 2019 update fixes 9 critical flaws ⚠

Depending on when users receive it, this week’s Android’s July patch update will fix 33 security vulnerabilities, including 9 marked critical, and 24 marked high.

πŸ“– Read

via "Naked Security".
?
07:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Miami police body cam videos up for sale on the darkweb ⚠

Videos from Miami Police Department body cams were leaked and stored in unprotected, internet-facing databases, then sold on the darkweb.

πŸ“– Read

via "Naked Security".
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Georgia’s court system hit by ransomware ⚠

There's a hint that it might involve Ryuk ransomware. If so, it might be the fourth Ryuk attack against state and local agencies since May.

πŸ“– Read

via "Naked Security".
08:36
⚠ IoT vendor Orvibo gives away treasure trove of user and device data ⚠

Researchers at web privacy review service vpnMentor discovered the data in an exposed ElasticSearch server online. It contains two billion items of log data from devices sold by Shenzen, China-based smart IoT device manufacturer Orvibo.

πŸ“– Read

via "Naked Security".
?
09:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ TA505 Group Launches New Targeted Attacks πŸ•΄

Russian-speaking group has sent thousands of emails containing new malware to individuals working at financial institutions in the US, United Arab Emirates, and Singapore.

πŸ“– Read

via "Dark Reading: ".
?
10:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Q&A: Understanding NSA's Quest to Open Source Ghidra πŸ•΄

National Security Agency researcher Brian Knighton previews his October Black Hat USA talk on the evolution of Ghidra.

πŸ“– Read

via "Dark Reading: ".
?
10:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Burned Out? πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” UK Sees Steep Jump in Cyber Attacks on Financial Services Firms πŸ”

According to a regulator, retail banks in the region took the biggest hit last year.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
11:12
πŸ•΄ Disarming Employee Weaponization πŸ•΄

Human vulnerability presents a real threat for organizations. But it's also a remarkable opportunity to turn employees into our strongest cyber warriors.

πŸ“– Read

via "Dark Reading: ".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” DevOps will fail unless security and developer teams communicate better πŸ”

DevOps initiatives have become important for 74% of organizations over the past year, but communication must improve for DevOps to be successful, according to Trend Micro.

πŸ“– Read

via "Security on TechRepublic".
11:44
❌ Amazon Admits Alexa Voice Recordings Saved Indefinitely ❌

Amazon's acknowledgment that it saves Alexa voice recordings - even sometimes after consumers manually delete their interaction history - has thrust voice assistant privacy policies into the spotlight once again.

πŸ“– Read

via "Threatpost".
11:56
⚠ Serious Security: Beware eBay scrapers promising to help you with β€˜viral promotions’ ⚠

Selling items online? Watch our for people who suddenly offer to help!

πŸ“– Read

via "Naked Security".
?
12:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Amazon Prime Day, EA gaming service's vulnerabilities, and the basics of multicloud πŸ”

This week's TechRepublic and ZDNet news stories include the brand battle between Apple and Microsoft, Word documents containing malicious links, and the future of on-premises databases.

πŸ“– Read

via "Security on TechRepublic".
12:59
❌ Apple Transparency Report Now Includes App Store Takedown Requests ❌

Apple report now includes data on requests by governments to take down apps from the tech giant's app store.

πŸ“– Read

via "Threatpost".
?
13:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: Amazon Prime Day, EA gaming service's vulnerabilities, and the basics of multicloud πŸ”

This week's TechRepublic and ZDNet news stories include the brand battle between Apple and Microsoft, Word documents containing malicious links, and the future of on-premises databases.

πŸ“– Read

via "Security on TechRepublic".
13:29
ATENTIONβ€Ό New - CVE-2018-11427

CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.

πŸ“– Read

via "National Vulnerability Database".
13:29
ATENTIONβ€Ό New - CVE-2018-11426

A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.

πŸ“– Read

via "National Vulnerability Database".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 20 Questions to Ask During a Real (or Manufactured) Security Crisis πŸ•΄

There are important lessons to be learned from a crisis, even the ones that are more fiction than fact.

πŸ“– Read

via "Dark Reading: ".
?
14:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ More Than Half of SMB Devices Run Outdated Operating Systems πŸ•΄

66% of devices in small-to midsized businesses are based on expired or about-to-expire Microsoft OS versions, Alert Logic study found.

πŸ“– Read

via "Dark Reading: ".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Sodin Ransomware Exploits Windows Privilege Escalation Bug πŸ•΄

Exploitation of CVE-2018-8453 grants attackers the highest level of privileges on a target system.

πŸ“– Read

via "Dark Reading: ".
?
15:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-9327

Secret data of processes managed by CM is not secured by file permissions.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-9326

The keystore password for the Spark History Server may be exposed in unsecured files under the /var/run/cloudera-scm-agent directory managed by Cloudera Manager. The keystore file itself is not exposed.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-9325

The provided secure solrconfig.xml sample configuration does not enforce Sentry authorization on /update/json/docs.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-6900

An issue was discovered in Riello NetMan 204 14-2 and 15-2. The issue is with the login script and wrongpass Python script used for authentication. When calling wrongpass, the variables $VAL0 and $VAL1 should be enclosed in quotes to prevent the potential for Bash command injection. Further to this, VAL0 and VAL1 should be sanitised to ensure they do not contain malicious characters. Passing it the username of '-' will cause it to time out and log the user in because of poor error handling. This will log the attacker in as an administrator where the telnet / ssh services can be enabled, and the credentials for local users can be reset. Also, login.cgi accepts the username as a GET parameter, so login can be achieved by browsing to the /cgi-bin/login.cgi?username=-%20a URI.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-6216

novaksolutions/infusionsoft-php-sdk v2016-10-31 is vulnerable to a reflected XSS in the leadscoring.php resulting code execution

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-18346

SQL injection vulnerability in /wbg/core/_includes/authorization.inc.php in CMS Web-Gooroo through 2013-01-19 allows remote attackers to execute arbitrary SQL commands via the wbg_login parameter.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2017-17972

packages/subjects/pub/subjects.php in Archon 3.21 rev-1 has XSS in the referer parameter in an index.php?subjecttypeid=xxx request, aka Open Bug Bounty ID OBB-466362.

πŸ“– Read

via "National Vulnerability Database".
?
16:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New 'WannaHydra' Malware a Triple Threat to Android πŸ•΄

The latest variant of WannaLocker is a banking Trojan, spyware tool, and ransomware.

πŸ“– Read

via "Dark Reading: ".
?
18:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Military Warns Companies to Look Out for Iranian Outlook Exploits πŸ•΄

Microsoft patched a serious vulnerability in the Microsoft Outlook client in 2017, but an Iranian group continues to exploit the flaw.

πŸ“– Read

via "Dark Reading: ".
?
19:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-8230

On Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices, the users on the device are divided into 2 groups "admin" and "user". However, as a part of security analysis it was identified that a low privileged user who belongs to the "user" group and who has access to login in to the web administrative interface of the device can add a new administrative user to the interface using HTTP APIs provided by the device and perform all the actions as an administrative user by using that account. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable functions that performs the various action described in HTTP APIs. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function at address 0x00429084 in IDA pro is the one that processes the HTTP API request for "addUser" action. If one traces the calls to this function, it can be clearly seen that the function sub_ 41F38C at address 0x0041F588 parses the call received from the browser and passes it to the "addUser" function without any authorization check.

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2017-8229

Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function sub_436D6 in IDA pro is identified to be setting up the configuration for the device. If one scrolls to the address 0x000437C2 then one can see that /current_config is being set as an ALIAS for /mnt/mtd/Config folder on the device. If one TELNETs into the device and navigates to /mnt/mtd/Config folder, one can observe that it contains various files such as Account1, Account2, SHAACcount1, etc. This means that if one navigates to http://[IPofcamera]/current_config/Sha1Account1 then one should be able to view the content of the files. The security researchers assumed that this was only possible only after authentication to the device. However, when unauthenticated access tests were performed for the same URL as provided above, it was observed that the device file could be downloaded without any authentication.

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2017-8228

Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices mishandle reboots within the past two hours. Amcrest cloud services does not perform a thorough verification when allowing the user to add a new camera to the user's account to ensure that the user actually owns the camera other than knowing the serial number of the camera. This can allow an attacker who knows the serial number to easily add another user's camera to an attacker's cloud account and control it completely. This is possible in case of any camera that is currently not a part of an Amcrest cloud account or has been removed from the user's cloud account. Also, another requirement for a successful attack is that the user should have rebooted the camera in the last two hours. However, both of these conditions are very likely for new cameras that are sold over the Internet at many ecommerce websites or vendors that sell the Amcrest products. The successful attack results in an attacker being able to completely control the camera which includes being able to view and listen on what the camera can see, being able to change the motion detection settings and also be able to turn the camera off without the user being aware of it. Note: The same attack can be executed using the Amcrest Cloud mobile application.

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2017-8227

Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have a timeout policy to wait for 5 minutes in case 30 incorrect password attempts are detected using the Web and HTTP API interface provided by the device. However, if the same brute force attempt is performed using the ONVIF specification (which is supported by the same binary) then there is no account lockout or timeout executed. This can allow an attacker to circumvent the account protection mechanism and brute force the credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that performs the credential check in the binary for the ONVIF specification. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function at address 00671618 in IDA pro is parses the WSSE security token header. The sub_ 603D8 then performs the authentication check and if it is incorrect passes to the function sub_59F4C which prints the value "Sender not authorized."

πŸ“– Read

via "National Vulnerability Database".
19:30
ATENTIONβ€Ό New - CVE-2017-8226

Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have default credentials that are hardcoded in the firmware and can be extracted by anyone who reverses the firmware to identify them. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro, one will notice that this follows a ARM little endian format. The function sub_3DB2FC in IDA pro is identified to be setting up the values at address 0x003DB5A6. The sub_5C057C then sets this value and adds it to the Configuration files in /mnt/mtd/Config/Account1 file.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2017-13719

The Amcrest IPM-721S Amcrest_IPC-AWXX_Eng_N_V2.420.AC00.17.R.20170322 allows HTTP requests that permit enabling various functionalities of the camera by using HTTP APIs, instead of the web management interface that is provided by the application. This HTTP API receives the credentials as base64 encoded in the Authorization HTTP header. However, a missing length check in the code allows an attacker to send a string of 1024 characters in the password field, and allows an attacker to exploit a memory corruption issue. This can allow an attacker to circumvent the account protection mechanism and brute force the credentials. If the firmware version Amcrest_IPC-AWXX_Eng_N_V2.420.AC00.17.R.20170322 is dissected using the binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that has many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that performs the credential check in the binary for the HTTP API specification. If we open this binary in IDA Pro we will notice that this follows an ARM little-endian format. The function at address 00415364 in IDA Pro starts the HTTP authentication process. This function calls another function at sub_ 0042CCA0 at address 0041549C. This function performs a strchr operation after base64 decoding the credentials, and stores the result on the stack, which results in a stack-based buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2015-3907

CodeIgniter Rest Server (aka codeigniter-restserver) 2.7.1 allows XXE attacks.

πŸ“– Read

via "National Vulnerability Database".
4 July 2019
?
00:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ D-Link Agrees to Strengthen Device Security πŸ•΄

A settlement with the FTC should mean comprehensive security upgrades for D-Link routers and IP camera.

πŸ“– Read

via "Dark Reading: ".
?
07:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ TikTok investigated (again) over how it handles children’s data and safety ⚠

It's already gotten hit with the biggest-ever US child privacy fine, and now it might be facing a fine for GDPR violations.

πŸ“– Read

via "Naked Security".
07:41
⚠ Facebook should put a stop to Libra for now, says Congress ⚠

Could Facebook's Libra cryptocurrency undermine the security of the global financial ecosystem?

πŸ“– Read

via "Naked Security".
07:46
⚠ Facebook’s down-ranking those β€˜miracle cure’ health posts we all hate ⚠

Clickbait health/nutrition posts will sink in page rankings due to two ranking updates, Facebook announced.

πŸ“– Read

via "Naked Security".
07:51
⚠ Open Sesame! Zipato’s smart hub hacked to open front doors ⚠

The Zipato controller has three critical security flaws which could be used together by hackers to open your home’s doors for you, according to researchers.

πŸ“– Read

via "Naked Security".
?
12:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Why are they β€œsmart” locks if more money buys you less security? ⚠

Smart locks are cool and useful - but they are also a great reminder that cybersecurity is all about value, not cost.

πŸ“– Read

via "Naked Security".
5 July 2019
?
06:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Deepfake revenge porn now a crime in Virginia ⚠

It's the first state to enact a deepfakes ban, but it's not going to be the last: laws are being considered in many other states.

πŸ“– Read

via "Naked Security".
?
07:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Mannequin Challenge videos teach computers to see ⚠

An internet craze could change the way computers see, thanks to research published by Google.

πŸ“– Read

via "Naked Security".
?
08:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Bitcoin eats as much energy as Switzerland ⚠

That's around seven gigawatts, equal to 0.21% of the world's supply: as much power as generated by seven Dungeness nuclear power plants.

πŸ“– Read

via "Naked Security".
?
08:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ OpenPGP experts targeted by long-feared β€˜poisoning’ attack ⚠

Somebody out there has taken a big dislike to Robert J. Hansen (β€˜rjh’) and Daniel Kahn Gillmor (β€˜dkg’), two well-regarded experts in the specialised world of OpenPGP email encryption.

πŸ“– Read

via "Naked Security".
?
10:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 7/5 Edition πŸ”

Cracking a five year Facebook malware campaign, this week's CDN outage, and an app fined for leaking users' photos - catch up on the week's news with this recap!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
11:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Your GDPR Implementation Plan Needs CISOs & 'Legal Engineers' to Work Together πŸ•΄

Lawyers must step into the shoes of technical roles and craft legal guidance that can be easily put into use.

πŸ“– Read

via "Dark Reading: ".
11:46
⚠ 5 tips to stay secure on social media ⚠

Social media isn't for everyone, but lots of us love it - so here's how to be in it and win it.

πŸ“– Read

via "Naked Security".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ PGP Ecosystem Targeted in β€˜Poisoning’ Attacks ❌

Two researchers are being singled out in what are called PGP poisoning or flood attacks that render the authentication tool unusable for victims.

πŸ“– Read

via "Threatpost".
?
15:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Intelligent Authentication Market Grows to Meet Demand πŸ•΄

Confidence in user identity is critical to prevent fraud and theft, and companies are looking for new ways to get the necessary assurance.

πŸ“– Read

via "Dark Reading: ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WordPress Plugin WP Statistics Patches XSS Flaw ❌

A cross-site scripting vulnerability in WordPress plugin WP Statistics could have enabled full website takeover.

πŸ“– Read

via "Threatpost".
?
16:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ UK Forensics Firm Paid Ransom in Cyberattack πŸ•΄

Victim firm Eurofins Scientific handles more than 70,000 criminal cases per year in the UK.

πŸ“– Read

via "Dark Reading: ".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Data Breach Lessons from the Trenches ❌

How companies can identify their own insecure data, remediate data breaches and proactively secure data against future attacks.

πŸ“– Read

via "Threatpost".
8 July 2019
?
07:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 23 stories of the week ⚠

From RDP BlueKeep's message for admins to Medtronic's recall of hackable insulin pumps - and everything in between.

πŸ“– Read

via "Naked Security".
07:12
⚠ New Year’s eve gaming DDoSer lulz himself into a 27-month sentence ⚠

Back in 2014, @DerpTrolling said he attacked sites simply based on requests from people who tweeted suggested targets.

πŸ“– Read

via "Naked Security".
?
08:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ ISPs call Mozilla β€˜Internet Villain’ for promoting DNS privacy ⚠

ISPA has shortlisted Mozilla for the sort of award that, on the face of it, no tech company should be keen to win - 2019’s Internet Villain.

πŸ“– Read

via "Naked Security".
?
08:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Hot Cybersecurity Trends to Be Highlighted at Black Hat πŸ•΄

Just some of the research and ideas worth checking out at this year's 'security summer camp.'

πŸ“– Read

via "Dark Reading: ".
?
09:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Privacy and security risks as Sign In with Apple tweaks Open ID protocol ⚠

An open letter from the OpenID Foundation says that Apple introduced potential risks when it diverged from the OpenID Connect protocol.

πŸ“– Read

via "Naked Security".
?
09:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to use multiplexing to speed up the SSH πŸ”

Improve the speed SSH can run commands on remote servers with the help of multiplexing.

πŸ“– Read

via "Security on TechRepublic".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers hack VR worlds ⚠

Hackers just infiltrated virtual reality, enabling them to manipulate users' immersive 3D worlds.

πŸ“– Read

via "Naked Security".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” British Airways hit with Β£183M GDPR fineβ€”could your business be next? πŸ”

GDPR fines are finally coming down, and companies must be prepared to comply with the regulations or pay up.

πŸ“– Read

via "Security on TechRepublic".
11:04
❌ Post-Data Breach, British Airways Slapped With Record $230M Fine ❌

A proposed $230 million fine on British Airways after a data breach would be the biggest GDPR penalty yet.

πŸ“– Read

via "Threatpost".
11:16
πŸ” Why Apple should follow Microsoft's move to get rid of passwords πŸ”

Apple is testing biometric authentication as a new way of signing in to iCloud.com.

πŸ“– Read

via "Security on TechRepublic".
11:17
πŸ•΄ Smash-and-Grab Crime Threatens Enterprise Security πŸ•΄

Getting your company smartphone or laptop stolen from your car isn't just a hassle; it can have large regulatory ramifications, too. Visibility is the answer.

πŸ“– Read

via "Dark Reading: ".
?
11:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-11563

An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.7. A carefully constructed email could be used to inject and execute arbitrary stylesheet or JavaScript code in a logged in customer's browser in the context of the OTRS customer panel application.

πŸ“– Read

via "National Vulnerability Database".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Patches iMessage Bug That Bricks iPhones with Out-of-Date Software ❌

Google Project Zero finds Apple iMessage bug that bricks iPhones running older versions of the company's iOS software.

πŸ“– Read

via "Threatpost".
?
13:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Broadcom Moves Forward on Symantec Acquisition πŸ•΄

Reports indicate a deal could be made by mid-July as Broadcom secures financing for the purchase.

πŸ“– Read

via "Dark Reading: ".
?
15:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-8408 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of setting a SMB folder for the video clippings recorded by the device. It seems that the GET parameters passed in this request (to test if SMB credentials and hostname sent to the device work properly) result in being passed as commands to a "system" API in the function and thus result in command injection on the device. If the firmware version is dissected using binwalk tool, we obtain a cramfs-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "cgibox" is the one that has the vulnerable function "sub_7EAFC" that receives the values sent by the GET request. If we open this binary in IDA-pro we will notice that this follows a ARM little endian format. The function sub_7EAFC in IDA pro is identified to be receiving the values sent in the GET request and the value set in GET parameter "user" is extracted in function sub_7E49C which is then passed to the vulnerable system API call.

πŸ“– Read

via "National Vulnerability Database".
?
15:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ GoBotKR Targets Pirate Torrents to Build a DDoS Botnet ❌

The authors have tweaked a known piece of malware to specifically target Korean TV fans.

πŸ“– Read

via "Threatpost".
15:57
πŸ•΄ NIST Sets Draft Guidelines for Government AI πŸ•΄

This is the first formal step in writing the standards that will guide the implementation of AI technologies within the federal government.

πŸ“– Read

via "Dark Reading: ".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Britain Looks to Levy Record GDPR Fine Against British Airways πŸ•΄

The penalty is a sign of things to come, say experts.

πŸ“– Read

via "Dark Reading: ".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Rules-Based Policy Approaches Need to Go ❌

A zero-trust model is the only way to keep up with today's digital complexities.

πŸ“– Read

via "Threatpost".
?
17:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-8417 (dcs-1100_firmware, dcs-1130_firmware)

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device requires that a user logging into the device provide a username and password. However, the device allows D-Link apps on the mobile devices and desktop to communicate with the device without any authentication. As a part of that communication, the device uses custom version of base64 encoding to pass data back and forth between the apps and the device. However, the same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third party to retrieve the device's password without any authentication by sending just 1 UDP packet with custom base64 encoding. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
17:35
ATENTIONβ€Ό New - CVE-2017-8404 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of setting a SMB folder for the video clippings recorded by the device. It seems that the POST parameters passed in this request (to test if email credentials and hostname sent to the device work properly) result in being passed as commands to a "system" API in the function and thus result in command injection on the device. If the firmware version is dissected using binwalk tool, we obtain a cramfs-root archive which contains the filesystem set up on the device that contains all the binaries. The library "libmailutils.so" is the one that has the vulnerable function "sub_1FC4" that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows an ARM little endian format. The function sub_1FC4 in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "receiver1" is extracted in function "sub_15AC" which is then passed to the vulnerable system API call. The vulnerable library function is accessed in "cgibox" binary at address 0x0008F598 which calls the "mailLoginTest" function in "libmailutils.so" binary as shown below which results in the vulnerable POST parameter being passed to the library which results in the command injection issue.

πŸ“– Read

via "National Vulnerability Database".
17:48
❌ GE Aviation Passwords, Source Code Exposed in Open Jenkins Server ❌

A DNS misconfiguration resulted in an open Jenkins server being available to all.

πŸ“– Read

via "Threatpost".
17:49
πŸ” Airline Facing Record Breaking $229 Million GDPR Fine πŸ”

The fine would be the largest against a company post-GDPR and roughly 1.5 percent of the company's annual revenue.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Android App Publishers Won't Take 'No' for an Answer on Personal Data πŸ•΄

Researchers find more than 1,000 apps in the Google Play store that gather personal data even when the user has denied permission.

πŸ“– Read

via "Dark Reading: ".
?
19:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Poke Holes in Siemens Simatic S7 PLCs πŸ•΄

Black Hat USA session will reveal how they reverse-engineered the proprietary cryptographic protocol to attack the popular programmable logic controller.

πŸ“– Read

via "Dark Reading: ".
9 July 2019
?
06:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple aims privacy billboard at Google’s controversial smart-city ⚠

It's outside of Sidewalk Labs HQ in Toronto, where Google's sister company is working on stuffing the city with data-collecting sensors.

πŸ“– Read

via "Naked Security".
?
06:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox to include tracker blocking report feature ⚠

Mozilla has introduced a lot of tracker blocking protections into Firefox lately. Now, it is planning a new feature that will let you see how many online snoopers you’ve successfully evaded. A new feature called the Tracking Protections Panel (aka the Protection Report) will tell users how many trackers Firefox blocked in the prior week, […]

πŸ“– Read

via "Naked Security".
?
07:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google suspends Trends emails after revealing murder suspect’s name ⚠

People subscribed to Google Trends in New Zealand were emailed the murder suspect's name in violation of a New Zealand court's order.

πŸ“– Read

via "Naked Security".
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Rapid Incident Response Now Available through Cynet’s Free IR Service Providers Offering ❌

Cynet's 360 platform is ready out-of-the-box, for fast, easy deployment across all endpoints.

πŸ“– Read

via "Threatpost".
10:09
πŸ” How financial services companies can protect against mobile threats πŸ”

Financial services organizations face a variety of cyber threats. But mobile risks represent a major Achilles' heel for the industry, says a new report from Wandera.

πŸ“– Read

via "Security on TechRepublic".
?
10:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybersecurity incidents cost businesses $45B last year πŸ”

Ransomware, cryptojacking, and business email compromise attacks all ramped up the financial losses due to cyber breaches, according to the Online Trust Alliance.

πŸ“– Read

via "Security on TechRepublic".
10:52
πŸ•΄ DevOps' Inevitable Disruption of Security Strategy πŸ•΄

Black Hat USA programming will dive into the ways DevOps-driven shifts in practices and tools are introducing both new vulnerabilities and new ways of securing enterprises.

πŸ“– Read

via "Dark Reading: ".
?
11:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Insider Threats: An M&A Dealmaker's Nightmare πŸ•΄

Because data has never been more portable, taking it has never been easier. And that's a huge problem during mergers and acquisitions.

πŸ“– Read

via "Dark Reading: ".
11:20
⚠ Backdoor discovered in Ruby strong_password library ⚠

An eagle-eyed developer has discovered a backdoor recently sneaked into a library (or β€˜gem’) used by Ruby on Rails (RoR) web apps to check password strength.

πŸ“– Read

via "Naked Security".
?
11:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to secure your Zoom conference line from hackers πŸ”

A Zero Day vulnerability allows any website to open up a video-enabled call on a Mac with the Zoom app installed. Here's how to patch it.

πŸ“– Read

via "Security on TechRepublic".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zoom Zero-Day Bug Opens Mac Users to Webcam Hijacking ❌

The vulnerability can be exploited on a drive-by basis by a malicious website.

πŸ“– Read

via "Threatpost".
?
13:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Marriott Hit With $123M Fine For Massive 2018 Data Breach ❌

The data breach fine against Marriott by the Information Commissioner's Office comes a day after British Airways was also penalized.

πŸ“– Read

via "Threatpost".
13:17
πŸ•΄ Marriott Faces $124 Million GDPR Fine in UK πŸ•΄

The proposed penalty is for a data breach beginning in 2014 that affected more than 500 million customers worldwide.

πŸ“– Read

via "Dark Reading: ".
13:27
πŸ•΄ Cybercriminals Target Budding Cannabis Retailers πŸ•΄

Companies in the young, rapidly growing industry are targeted for sensitive information they store and immature security practices.

πŸ“– Read

via "Dark Reading: ".
13:35
ATENTIONβ€Ό New - CVE-2018-14866 (odoo)

Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.

πŸ“– Read

via "National Vulnerability Database".
13:35
ATENTIONβ€Ό New - CVE-2018-14833

Intuit Lacerte 2017 has Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
13:35
ATENTIONβ€Ό New - CVE-2017-8407 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross-site request forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface to change the user's password.

πŸ“– Read

via "National Vulnerability Database".
13:40
⚠ Zoom flaw could force Mac users into meetings, expose video feed ⚠

Its local web server reportedly also automatically reinstalls Zoom if a user removes the app and joins a meeting.

πŸ“– Read

via "Naked Security".
13:42
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 1,300 Popular Android Apps Access Data Without Proper Permissions ❌

Study finds Android apps circumvented privacy opt-in rules and collected sensitive user information against user permission.

πŸ“– Read

via "Threatpost".
?
15:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cloud Security and Risk Mitigation πŸ•΄

Just because your data isn't on-premises doesn't mean you're not responsible for security.

πŸ“– Read

via "Dark Reading: ".
?
15:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-11307

An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2017-8414 (dcs-1100_firmware, dcs-1130_firmware)

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary orthrus in /sbin folder of the device handles all the UPnP connections received by the device. It seems that the binary performs a sprintf operation at address 0x0000A3E4 with the value in the command line parameter "-f" and stores it on the stack. Since there is no length check, this results in corrupting the registers for the function sub_A098 which results in memory corruption.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2017-8410 (dcs-1100_firmware, dcs-1130_firmware)

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary performs a memcpy operation at address 0x00011E34 with the value sent in the "Authorization: Basic" RTSP header and stores it on the stack. The number of bytes to be copied are calculated based on the length of the string sent in the RTSP header by the client. As a result, memcpy copies more data then it can hold on stack and this results in corrupting the registers for the caller function sub_F6CC which results in memory corruption. The severity of this attack is enlarged by the fact that the same value is then copied on the stack in the function 0x00011378 and this allows to overflow the buffer allocated and thus control the PC register which will result in arbitrary code execution on the device.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2017-8409 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device requires that a user logging to the device to provide a username and password. However, the device does not enforce the same restriction on a specific URL thereby allowing any attacker in possession of that to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2017-8406 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device provides a crossdomain.xml file with no restrictions on who can access the webserver. This allows an hosted flash file on any domain to make calls to the device's webserver and pull any information that is stored on the device. In this case, user's credentials are stored in clear text on the device and can be pulled easily. It also seems that the device does not implement any cross-site scripting forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a cross-site flashing attack on the user's browser and execute any action on the device provided by the web management interface which steals the credentials from tools_admin.cgi file's response and displays it inside a Textfield.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2017-8405 (dcs-1100_firmware, dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 and DCS-1100 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary loads at address 0x00012CF4 a flag called "Authenticate" that indicates whether a user should be authenticated or not before allowing access to the video feed. By default, the value for this flag is zero and can be set/unset using the HTTP interface and network settings tab as shown below. The device requires that a user logging to the HTTP management interface of the device to provide a valid username and password. However, the device does not enforce the same restriction by default on RTSP URL due to the checkbox unchecked by default, thereby allowing any attacker in possession of external IP address of the camera to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
15:39
πŸ” How to securely and completely delete files in Windows 10 without third-party software πŸ”

Deleting files in Windows 10 does not really delete the file. Security best practice requires deleted files to be completely overwritten more than once.

πŸ“– Read

via "Security on TechRepublic".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hotel Chain Fined $123 Million in Second Major GDPR Fine of Week πŸ”

The massive fine comes one day after the ICO's fine of British Airways.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What the AppSec Penetration Test Found πŸ•΄

New data drills down on the types of security misconfigurations and challenges dogging application developers.

πŸ“– Read

via "Dark Reading: ".
17:08
❌ Microsoft Patches A Pair of Zero-Days Under Active Attack ❌

The software giant also addressed 15 critical flaws and advised on the recently disclosed Linux Kernel "SACK Panic" bug.

πŸ“– Read

via "Threatpost".
?
17:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-11427 (oncell_g3150-hspa-t_firmware, oncell_g3150-hspa_firmware)

CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.

πŸ“– Read

via "National Vulnerability Database".
17:37
πŸ•΄ Microsoft Patches Zero-Day Vulnerabilities Under Active Attack πŸ•΄

Microsoft issued fixes for 77 unique vulnerabilities this Patch Tuesday, including two zero-day privilege escalation vulnerabilities seen exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
?
18:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Zoom Client for Mac Exposing Users to Serious Risks πŸ•΄

Videoconferencing software maker downplays risks and says mitigations are on the way.

πŸ“– Read

via "Dark Reading: ".
18:07
πŸ•΄ Coast Guard Warns Shipping Firms of Maritime Cyberattacks πŸ•΄

A commercial vessel suffered a significant malware attack in February, prompting the US Coast Guard to issues an advisory to all shipping companies: Here be malware.

πŸ“– Read

via "Dark Reading: ".
?
18:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Financial Impact of Cybercrime Exceeded $45B in 2018 πŸ•΄

Cybersecurity analysts explore a range of industry research to examine trends around cyber incidents and their financial impact.

πŸ“– Read

via "Dark Reading: ".
18:57
πŸ•΄ Organizations Are Adapting Authentication for Cloud Applications πŸ•΄

Companies see the changing demands of cloud identity management but are mixed in their responses to those demands.

πŸ“– Read

via "Dark Reading: ".
?
20:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intel Patches High-Severity Flaw in Processor Diagnostic Tool ❌

Intel issued patches for a high-severity flaw in its processor diagnostic tool as well as a fix for a medium-severity vulnerability in its data center SSD lineup.

πŸ“– Read

via "Threatpost".
10 July 2019
?
07:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Instagram asks bullies, β€˜Are you sure you want to say that?’ ⚠

A new anti-bullying feature uses AI to recognize mean words in comments and warns users before they post them.

πŸ“– Read

via "Naked Security".
07:40
⚠ Rogue Android apps ignore your permissions ⚠

New research has revealed that apps are snooping on data such as location and unique ID number - even when users haven't given permission.

πŸ“– Read

via "Naked Security".
?
08:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Two zero days and 15 critical flaws fixed in July’s Patch Tuesday ⚠

Patch Tuesday July 2019 offers fixes for a total of 77 vulnerabilities, including 15 marked critical, rounded out by two zero-day flaws.

πŸ“– Read

via "Naked Security".
?
09:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Corporate users struggle to identify phishing attacks, other security threats πŸ”

An audit of security awareness conducted by Proofpoint found that users on average answered 22% of security-related questions incorrectly.

πŸ“– Read

via "Security on TechRepublic".
?
10:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 10 Ways to Keep a Rogue RasPi From Wrecking Your Network πŸ•΄

A Raspberry Pi attached to the network at NASA JPL became the doorway for a massive intrusion and subsequent data loss. Here's how to keep the same thing from happening to your network.

πŸ“– Read

via "Dark Reading: ".
?
10:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Agent Smith Malware Infects 25M Android Phones to Push Rogue Ads ❌

Researchers say malware infects phones in order to sneak ads on devices for profit.

πŸ“– Read

via "Threatpost".
?
11:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Reasons Why SOC Superstars Quit πŸ•΄

Security analysts know they are a hot commodity in the enviable position of writing their own ticket. Here's how to keep them engaged, challenged, and happy.

πŸ“– Read

via "Dark Reading: ".
?
11:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-12626

An issue was discovered in Eventum 3.5.0. /htdocs/popup.php has XSS via the cat parameter.

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2018-12625

An issue was discovered in Eventum 3.5.0. /htdocs/validate.php has XSS via the values parameter.

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2018-12623

An issue was discovered in Eventum 3.5.0. htdocs/switch.php has XSS via the current_page parameter.

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2018-12622

An issue was discovered in Eventum 3.5.0. htdocs/ajax/update.php has XSS via the field_name parameter.

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2018-11423 (oncell_g3150-hspa-t_firmware, oncell_g3150-hspa_firmware)

There is Memory corruption in the web interface Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior, different vulnerability than CVE-2018-11420.

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2018-11420 (oncell_g3150-hspa-t_firmware, oncell_g3150-hspa_firmware)

There is Memory corruption in the web interface of Moxa OnCell G3100-HSPA Series version 1.5 Build 17042015 and prio,r a different vulnerability than CVE-2018-11423.

πŸ“– Read

via "National Vulnerability Database".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Latest FinSpy Modules Lift Data from Secure Messaging Apps ❌

The espionage tool is capable of eavesdropping on calls and messages sent via Signal, Telegram, WhatsApp and more.

πŸ“– Read

via "Threatpost".
13:08
πŸ•΄ Intel Releases Updates for Storage & Diagnostic Tools πŸ•΄

CISA released an alert telling users about the updates to firmware in Intel SSD and Processor Diagnostic products.

πŸ“– Read

via "Dark Reading: ".
?
13:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zoom Pushes Emergency Patch for Webcam Hijack Flaw ❌

After media scrutiny, the collaboration service has decided to address the zero-day after initially dismissing its severity.

πŸ“– Read

via "Threatpost".
13:35
ATENTIONβ€Ό New - CVE-2017-7189

main/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen('127.0.0.1:80', 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input.

πŸ“– Read

via "National Vulnerability Database".
13:35
ATENTIONβ€Ό New - CVE-2017-6217

paypal/adaptivepayments-sdk-php v3.9.2 is vulnerable to a reflected XSS in the SetPaymentOptions.php resulting code execution

πŸ“– Read

via "National Vulnerability Database".
13:35
ATENTIONβ€Ό New - CVE-2017-12652

libpng before 1.6.32 does not properly check the length of chunks against the user limit.

πŸ“– Read

via "National Vulnerability Database".
?
14:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Vulnerability Found in GE Anesthesia Machines πŸ•΄

GE Healthcare has released a statement claiming the bug is not in the machine itself and does not pose direct risk to patients.

πŸ“– Read

via "Dark Reading: ".
?
15:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why You Need a Global View of IT Assets πŸ•΄

It may seem obvious, but many companies lose sight of the fact that they can't protect what they don't know they even have.

πŸ“– Read

via "Dark Reading: ".
?
15:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-10531

An issue was discovered in the America's Army Proving Grounds platform for the Unreal Engine. With a false packet sent via UDP, the application server responds with several bytes, giving the possibility of DoS amplification, even being able to be used in DDoS attacks.

πŸ“– Read

via "National Vulnerability Database".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” US Coast Guard Issues Cybersecurity Best Practices for Ships πŸ”

In addition to a list of best practices, the Coast Guard confirmed in an alert this week that malware affected the shipboard network of a vessel in February.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Ransomware Targets QNAP's Network-Attached Storage Devices πŸ•΄

More than 19,000 systems in the US are potentially at risk from eCh0raix.

πŸ“– Read

via "Dark Reading: ".
?
18:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bug in Anesthesia Respirators Allows Cyber-Tampering ❌

GE Healthcare said an attacker could modify gas composition parameters within the devices' respirator function.

πŸ“– Read

via "Threatpost".
18:22
πŸ•΄ Financial Firms Face Threats from Employee Mobile Devices πŸ•΄

A new report says that phishing and man-in-the-middle attacks are major risks to financial institutions - via mobile devices in the hands of their employees.

πŸ“– Read

via "Dark Reading: ".
18:27
πŸ•΄ Industry Insight: Checking Up on Healthcare Security πŸ•΄

Modern threats putting healthcare organization at risk, how they're improving their security posture, and where many fall short.

πŸ“– Read

via "Dark Reading: ".
?
22:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€œMozilla aren’t villains after all” – ISPs back down after public outcry ⚠

Mozilla was nominated for an "Internet Villain" award - and The People Of The Internet were not pleased

πŸ“– Read

via "Naked Security".
11 July 2019
?
08:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ GDPR superpowers lead to whopper ICO fines for BA, Marriott ⚠

The ICO isn't pulling its punches: The penalty for BA's data breach is about 367 times higher than the previous record-setting fine.

πŸ“– Read

via "Naked Security".
?
09:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cyberattack lands ship in hot water ⚠

Less than two months after warning of cybersecurity problems on ships, the US Coast Guard has revealed that a large international vessel has suffered a cyberattack.

πŸ“– Read

via "Naked Security".
09:03
πŸ•΄ Persistent Threats Can Last Inside SMB Networks for Years πŸ•΄

The average dwell time for riskware can be as much as 869 days.

πŸ“– Read

via "Dark Reading: ".
?
09:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybersecurity: Malware lingers in SMBs for an average of 800 days before discovery πŸ”

Small and medium-sized businesses lack the IT staff needed to run comprehensive security detection and response, according to Infocyte.

πŸ“– Read

via "Security on TechRepublic".
09:47
πŸ•΄ Feature πŸ•΄



πŸ“– Read

via "Dark Reading: ".
09:48
❌ Implementing Bug Bounty Programs: The Right and Wrong Approaches ❌

Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs.

πŸ“– Read

via "Threatpost".
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facial recognition surveillance must be banned, says Fight for the Future ⚠

β€œWe don’t need to regulate it, we need to ban it entirely.”

πŸ“– Read

via "Naked Security".
10:07
πŸ•΄ Learn the Unique Weaknesses of Apple Devices at Black Hat USA πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
10:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Disables Walkie-Talkie App Due to Eavesdropping Flaw ❌

Apple has disabled the Walkie Talkie app from its Apple Watch products after a vulnerability was discovered enabling bad actors to eavesdrop on iPhone conversations.

πŸ“– Read

via "Threatpost".
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Issues Silent Update Removing Zoom’s Hidden Server ❌

The tech giant addressed a widely publicized Zoom bug with an automatic update mechanism usually reserved for removing malware.

πŸ“– Read

via "Threatpost".
11:14
πŸ” Gone phishing: Why summer brings increased security threats to the enterprise πŸ”

Employees working away from the office, including over vacation, could increase the chance of network compromise.

πŸ“– Read

via "Security on TechRepublic".
?
11:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Security of Cloud Applications πŸ•΄

Despite the great success of the cloud over the last decade, misconceptions continue to persist. Here's why the naysayers are wrong.

πŸ“– Read

via "Dark Reading: ".
?
13:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Summer: A Time for Vacations & Cyberattacks? πŸ•΄

About a third of cybersecurity professionals believe that their companies see more cyberattacks during the summer, but the survey data does not convince on the reasons for the perception of a summer bump.

πŸ“– Read

via "Dark Reading: ".
13:29
πŸ” Wannacry ransomware attack: Industry experts offer their tips for prevention πŸ”

Wannacry remains a significant threat for companies. Learn how your organization can guard against it.

πŸ“– Read

via "Security on TechRepublic".
?
14:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Will mobile devices replace passwords? πŸ”

Mobile devices could provide a more secure, user-friendly mode of account authentication, according to an IDG and MobileIron report.

πŸ“– Read

via "Security on TechRepublic".
14:57
πŸ•΄ Monroe College Hit with Ransomware Attack πŸ•΄

All campuses are affected, with attackers demanding $2 million in Bitcoin in exchange for decryption keys.

πŸ“– Read

via "Dark Reading: ".
15:03
πŸ•΄ Most Organizations Lack Cyber Resilience πŸ•΄

Despite increasing threats, many organizations continue to run with only token cybersecurity and resilience.

πŸ“– Read

via "Dark Reading: ".
15:09
πŸ” How to run a command that requires sudo via SSH πŸ”

With SSH you can run commands on remote machines, even if the command requires sudo privileges.

πŸ“– Read

via "Security on TechRepublic".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Alliance Aims to Boost Industrial Cybersecurity Awareness πŸ”

The group hopes to increase cybersecurity awareness, education, and knowledge sharing around industrial cybersecurity concerns.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Software Engineer Charged for Taking Stolen Trade Secrets to China πŸ•΄

Xudong Yao reportedly stole proprietary information from his employer and brought it to China, where he is believed to currently reside.

πŸ“– Read

via "Dark Reading: ".
?
17:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Home Silently Captures Recordings of Domestic Violence and More ❌

Google is under fire after a report found that Google Home and Google Assistant records user audio, even when no wake-up word is used.

πŸ“– Read

via "Threatpost".
?
18:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Catch a Phish: Where Employee Awareness Falls Short πŸ•΄

Advanced phishing techniques and poor user behaviors that exacerbate the threat of successful attacks.

πŸ“– Read

via "Dark Reading: ".
?
19:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ APT Groups Make Quadruple What They Spend on Attack Tools πŸ•΄

Some advanced persistent threat actors can spend north of $1 million on attacks, but the return on that investment can be huge.

πŸ“– Read

via "Dark Reading: ".
?
19:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-3798

The Windows Guest Tools in Citrix XenServer 6.2 SP1 and earlier allows remote attackers to cause a denial of service (guest OS crash) via a crafted Ethernet frame.

πŸ“– Read

via "National Vulnerability Database".
?
20:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Data Center Changes Push Cyber Risk to Network's Edge πŸ•΄

Changes in fundamental enterprise architectures coupled with shifts in human resources mean that companies are considering new risks to their infrastructure.

πŸ“– Read

via "Dark Reading: ".
12 July 2019
?
06:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple Watch’s Walkie-Talkie app goes radio silent due to vulnerability ⚠

Apple disabled the app after somebody reported a bug - not exploited yet - that could allow an eavesdropper to listen in on another iPhone.

πŸ“– Read

via "Naked Security".
?
07:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Windows 7 users upset by unwanted Patch Tuesday telemetry ⚠

This is either a minor controversy blown out of proportion, or the latest example of Microsoft’s disregard for its users’ wishes.

πŸ“– Read

via "Naked Security".
?
07:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hey, Google, why are your contractors listening to me? ⚠

Humans are listening to our recordings - some made by mistake - to improve speech recognition. But they're not as anonymous as Google says.

πŸ“– Read

via "Naked Security".
07:55
⚠ IT pros: we’re understaffed, under-resourced and under pressure ⚠

Increasingly complex attacks coupled with a shortage in skills and budget are worrying IT managers across the globe.

πŸ“– Read

via "Naked Security".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat USA Arsenal Serves Up A Smorgasbord of Cybersecurity Tools πŸ•΄

Visit the Arsenal this August to go hands-on with hackable gadgets and catch live demos of open-source security tools from some of the best in the business.

πŸ“– Read

via "Dark Reading: ".
?
10:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hacked Hair Straighteners Can Threaten Homes ❌

A lack of a Bluetooth Low Energy (BLE) pairing mechanism leaves the smart IoT devices open to malicious manipulation.

πŸ“– Read

via "Threatpost".
?
12:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to tell if any of your website passwords may have been hacked πŸ”

If you're worried a password you use to log in to a site was leaked during a data breach, read about two websites and a Chrome extension that can alert you if this happens.

πŸ“– Read

via "Security on TechRepublic".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Unusual Linux Ransomware Targets NAS Servers ❌

QNAPCrypt continues to spread via brute-force attacks.

πŸ“– Read

via "Threatpost".
?
13:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 7/12 Edition πŸ”

Android malware, peeling back the layers on the GandCrab malware, and a recruiting website leak - catch up on the week's news with this week's Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Lawyer's Guide to Cyber Insurance: 4 Basic Tips πŸ•΄

The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.

πŸ“– Read

via "Dark Reading: ".
?
15:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Competing Priorities Mean Security Risks for Small Businesses πŸ•΄

Small business IT professionals are trying to balance multiple priorities and finding that the balance often leaves the company with serious security risks.

πŸ“– Read

via "Dark Reading: ".
15:53
πŸ•΄ German Schools Ban Office 365, Cite Privacy Concerns πŸ•΄

The ruling follows years of debate over whether German schools and institutions should use Microsoft tools and services.

πŸ“– Read

via "Dark Reading: ".
?
16:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create an access key for the root user in AWS πŸ”

Performing tasks with root user credentials opens AWS to potentially catastrophic security vulnerabilities. Creating and managing access keys mitigates the risk.

πŸ“– Read

via "Security on TechRepublic".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Heather Mills Gets An Apology and β€˜Substantial’ Settlement in Spyware Case ❌

Rupert Murdoch's News Group has agreed to pay damages to Paul McCartney's ex as part of the massive phone-hacking scandal by UK tabloids.

πŸ“– Read

via "Threatpost".
?
19:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How will Wi-Fi 5 & WPA2 coexist with Wi-Fi 6 and WPA3? πŸ”

The migration to Wi-Fi 6 is the most complex in roughly a decade, as a new authentication standard is necessary to ensure security integrity. How will the two standards coexist?

πŸ“– Read

via "Security on TechRepublic".
13 July 2019
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ In memoriam – Corby CorbatΓ³, MIT computer science pioneer, dies at 93 ⚠

Fernando JosΓ© CorbatΓ³, Turing Award winner, computer scientist extraordinaire, MIT computer lab pioneer, RIP.

πŸ“– Read

via "Naked Security".
14 July 2019
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Exploring the Top 15 Most Common Vulnerabilities with HackerOne and GitHub ❌

Vulnerability experts Michiel Prins and Greg Ose discuss the 15 most common vulnerability types.

πŸ“– Read

via "Threatpost".
16:59
❌ Threatlist: 68% of Overwhelmed IT Managers Can’t Keep Up with Cyberattacks ❌

Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place.

πŸ“– Read

via "Threatpost".
15 July 2019
?
06:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 22 stories of the week ⚠

From a Ruby gem backdoor to the things that keep IT managers awake - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
07:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware attackers, US mayors say you should go jump in a lake ⚠

The US Conference of Mayors has unanimously adopted a resolution not to pay any more ransoms to hackers.

πŸ“– Read

via "Naked Security".
?
08:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FCC underwhelmed by carriers’ sluggish robocall efforts ⚠

The FCC in June called for carriers to provide free, default robocall blocking services. One month later, plans are "far from clear."

πŸ“– Read

via "Naked Security".
08:17
πŸ” How will Wi-Fi 5 & WPA2 coexist with Wi-Fi 6 and WPA3? πŸ”

The migration to Wi-Fi 6 is the most complex in roughly a decade, as a new authentication standard is necessary to ensure security integrity. How will the two standards coexist?

πŸ“– Read

via "Security on TechRepublic".
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple quietly removes Zoom’s hidden web server from Macs ⚠

In the latest twist in the saga of the web-conferencing app, Apple has issued a β€˜silent’ update removing Zoom's hidden web server from Macs.

πŸ“– Read

via "Naked Security".
?
10:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Why Cities Are a Low-Hanging Fruit For Ransomware ❌

In this first part of a two part series, Shawn Taylor with Forescout talks to Threatpost about lessons learned from helping Atlanta remediate and recover from its massive ransomware attack.

πŸ“– Read

via "Threatpost".
10:16
⚠ Bust the password for an air-gapped machine – with its keyboard LEDs ⚠

Researchers have developed a technique for reading data from air-gapped PCs using LEDs. Cue dynamic hacker music now!

πŸ“– Read

via "Naked Security".
10:27
πŸ” Top 5 cybersecurity challenges for CISOs πŸ”

CISOs must drive business strategy amid an expanded attack surface and increasing security complexity, according to Fortinet.

πŸ“– Read

via "Security on TechRepublic".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Is Machine Learning the Future of Cloud-Native Security? πŸ•΄

The nature of containers and microservices makes them harder to protect. Machine learning might be the answer going forward.

πŸ“– Read

via "Dark Reading: ".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-10374

On Fitbit activity-tracker devices, certain addresses never change. According to the popets-2019-0036.pdf document, this leads to "permanent trackability" and "considerable privacy concerns" without a user-accessible anonymization feature. The devices, such as Charge 2, transmit Bluetooth Low Energy (BLE) advertising packets with a TxAdd flag indicating random addresses, but the addresses remain constant. If devices come within BLE range at one or more locations where an adversary has set up passive sniffing, the adversary can determine whether the same device has entered one of these locations.

πŸ“– Read

via "National Vulnerability Database".
11:33
πŸ” Infographic: Why email is your weakest security link πŸ”

Employees receive nearly five phishing emails per work week, according to Avanan.

πŸ“– Read

via "Security on TechRepublic".
11:46
πŸ•΄ Where Businesses Waste Endpoint Security Budgets πŸ•΄

Too many systems, failure to test tools, and fear of replacement drive endpoint complexity and render products less effective.

πŸ“– Read

via "Dark Reading: ".
?
12:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security 101 πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
13:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Researcher Bypasses Instagram 2FA to Hack Any Account ❌

An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process.

πŸ“– Read

via "Threatpost".
?
15:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Instagram bug could have allowed anyone to take over your account ⚠

The good news is that Facebook updated Instagram's server-side defences automatically, so you don't have to do anything to fix this one.

πŸ“– Read

via "Naked Security".
15:26
πŸ•΄ 18% of Enterprises Holding Back on Windows 10 Upgrade πŸ•΄

Microsoft will officially end support for Windows 7 on January 14, 2020. Many large businesses aren't ready.

πŸ“– Read

via "Dark Reading: ".
15:32
πŸ” How to solve the dreaded Wordpress site maintenance error πŸ”

If your Wordpress site is stuck in maintenance mode, there's a simple fix.

πŸ“– Read

via "Security on TechRepublic".
15:42
πŸ” Latest Trade Secret Theft Case Involves Train Manufacturer πŸ”

It's believed the suspect, a software engineer, took the trade secrets with him to China, where he now resides.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:46
πŸ•΄ Software Developers Face Secure Coding Challenges πŸ•΄

Seven in ten developers are expected to write secure code, but less than half receive feedback on security, a survey finds.

πŸ“– Read

via "Dark Reading: ".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FTC Reportedly Ready to Sock Facebook with Record $5 Billion Fine πŸ•΄

The fine, for the social media giant's role in the Cambridge Analytica scandal, would be the largest ever against a tech company.

πŸ“– Read

via "Dark Reading: ".
?
17:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Meet DoppelPaymer, BitPaymer's Ransomware Lookalike πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
18:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Turla APT Returns with New Malware, Anti-Censorship Angle ❌

A dropper called β€œTopinambour" is the first-stage implant, which in turn fetches a spy trojan built in several coding languages.

πŸ“– Read

via "Threatpost".
?
19:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Flaws in Telegram & WhatsApp on Android Put Data at Risk πŸ•΄

App settings combined with Android behavior can put data integrity at risk for WhatsApp and Telegram users.

πŸ“– Read

via "Dark Reading: ".
19:11
❌ Privacy Experts: Facebook’s $5B Fine Unlikely to Do Much ❌

The FTC has levied its biggest fine ever against the social network, but it's unlikely to have much effect.

πŸ“– Read

via "Threatpost".
?
22:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Alan Turing chosen for the UK’s new Β£50 note – a cracking result! ⚠

In case you were wondering, scientists really can change the world, and change it for the better, too.

πŸ“– Read

via "Naked Security".
16 July 2019
?
07:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Asian consortium plans blockchain-based mobile ID system ⚠

A group of Asian companies want to create a blockchain-based service to turn your phone into a mobile ID system.

πŸ“– Read

via "Naked Security".
?
07:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware attackers demand $1.8m from US college ⚠

The school, located in the Bronx and serving around 8,000 students, has declined to say whether it will pay up.

πŸ“– Read

via "Naked Security".
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ $5b privacy fine against Facebook seen as β€˜chump change’ ⚠

It's 200x greater than the largest fine ever for breaking a promise to improve privacy practices.

πŸ“– Read

via "Naked Security".
08:26
⚠ Bluetooth LE’s anti-tracking technology beaten ⚠

Researchers have found a way to beat the MAC address randomisation feature used by Bluetooth to protect users from being tracked.

πŸ“– Read

via "Naked Security".
?
09:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
09:27
πŸ•΄ Security 101 πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
10:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Phishing alert: 80% of companies lack DMARC policies to protect against spoofing πŸ”

Despite being the industry standard for email authentication to prevent cyberattacks, DMARC policies aren't implemented by most companies , according to 250ok.

πŸ“– Read

via "Security on TechRepublic".
?
11:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Is 2019 the Year of the CISO? πŸ•΄

The case for bringing the CISO to the C-suite's risk and business-strategy table.

πŸ“– Read

via "Dark Reading: ".
?
12:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ GandCrab ransomware revisited – is it back under a (R)evil new guise? ⚠

Did the GandCrab ransomware gang really 'retire' when they said, or did they never go away?

πŸ“– Read

via "Naked Security".
12:06
❌ JetBlue Bomb Scare Set Off with Apple AirDrop ❌

Someone AirDropped a picture of a suicide vest to multiple people on a JetBlue flight, prompting an evacuation.

πŸ“– Read

via "Threatpost".
12:21
πŸ•΄ US Mayors Commit to Just Saying No to Ransomware πŸ•΄

The group of more than 1,400 top elected municipal officials takes the admirable, recommended stance against paying ransoms. However, can towns and cities secure their information technology infrastructure to withstand attacks?

πŸ“– Read

via "Dark Reading: ".
12:22
πŸ” What is USB Control & Encryption? πŸ”

Learn about USB control & encryption in Data Protection 101, our series that covers the fundamentals of data security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
12:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Symantec Builds Out Cloud Portfolio to Enforce 'Zero Trust' πŸ•΄

New additions to its Integrated Cyber Defense Platform aim to give businesses greater control over access to cloud resources and applications.

πŸ“– Read

via "Dark Reading: ".
?
13:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WhatsApp, Telegram Coding Blunders Can Expose Personal Media Files ❌

The issue, present on Android versions, is similar to the known man-in-the-disk attack vector.

πŸ“– Read

via "Threatpost".
14:01
❌ The Future is Female: A Key to the Cybersecurity Workforce Challenge ❌

With cybersecurity worldwide facing a major applicant shortage, businesses should be courting women and supporting girls.

πŸ“– Read

via "Threatpost".
?
15:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Attackers Infiltrate the Supply Chain & What to Do About It πŸ•΄

With some security best practices, enterprises can significantly reduce the chances that a potential supply chain attack will affect business operations.

πŸ“– Read

via "Dark Reading: ".
?
15:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Publishes GandCrab Decryption Keys πŸ•΄

Publishing the keys should render existing versions of the ransomware far less dangerous for victims.

πŸ“– Read

via "Dark Reading: ".
?
17:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ LenovoEMC Storage Gear Leaks Sensitive Financial Data ❌

Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.

πŸ“– Read

via "Threatpost".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-13442

SolarWinds Network Performance Monitor 12.3 allows SQL Injection via the /api/ActiveAlertsOnThisEntity/GetActiveAlerts TriggeringObjectEntityNames parameter.

πŸ“– Read

via "National Vulnerability Database".
?
18:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Snapshot: OS, Authentication, Browser & Cloud Trends πŸ•΄

New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.

πŸ“– Read

via "Dark Reading: ".
18:31
πŸ•΄ Lenovo NAS Firmware Flaw Exposes Stored Data πŸ•΄

More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.

πŸ“– Read

via "Dark Reading: ".
17 July 2019
?
07:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers hide data in music – and human ears can’t detect it ⚠

It's now possible to secretly transfer data inside music without turning it into unlistenable mush.

πŸ“– Read

via "Naked Security".
?
08:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook rolls out anti-scam reporting tool in UK ⚠

Facebook has coughed up Β£3m to help launch an anti-scam service as well as introducing a tool to report scam ads on its UK site.

πŸ“– Read

via "Naked Security".
08:16
⚠ Microsoft, Google and Apple clouds banned in Germany’s schools ⚠

Citing privacy issues, Germany just banned its schools from using Microsoft Office 365, Google Docs, and Apple's iWork cloud services.

πŸ“– Read

via "Naked Security".
?
09:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The 10 Essentials of Infosec Forensics πŸ•΄

Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

πŸ“– Read

via "Dark Reading: ".
?
09:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Personality Profile πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
10:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ RDP exposed: the wolves already at your door ⚠

While everyone waits for BlueKeep to be exploited, another RDP threat is already at the door, according to new research from Sophos.

πŸ“– Read

via "Naked Security".
10:16
πŸ•΄ Master Next-Level Network Defense Techniques at Black Hat USA πŸ•΄

Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.

πŸ“– Read

via "Dark Reading: ".
10:31
❌ StrongPity APT Returns with Retooled Spyware ❌

The group is using malicious versions of WinRAR and other legitimate software packages to infect targets, likely via watering-hole attacks.

πŸ“– Read

via "Threatpost".
?
10:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 things to consider for your disaster recovery plan πŸ”

You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.

πŸ“– Read

via "Security on TechRepublic".
10:57
πŸ” Top 5 things to consider for your disaster recovery plan πŸ”

You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.

πŸ“– Read

via "Security on TechRepublic".
10:57
πŸ” Why 70% of healthcare orgs have suffered data breaches πŸ”

Digital transformation initiatives bring a slew of data privacy concerns to US health organizations, according to a Thales report.

πŸ“– Read

via "Security on TechRepublic".
?
11:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ For Real Security, Don't Let Failure Be Your Measure of Success πŸ•΄

For too long, we've focused almost exclusively on keeping out the bad guys rather than what to do when they get in (and they will).

πŸ“– Read

via "Dark Reading: ".
11:22
πŸ” Malicious libraries in package repositories reveal a fundamental security flaw πŸ”

The proliferation of malicious packages in repositories for software developers that rely on typosquatting points to a problem: A reliance on flat namespaces.

πŸ“– Read

via "Security on TechRepublic".
11:27
ATENTIONβ€Ό New - CVE-2017-12652 (libpng)

libpng before 1.6.32 does not properly check the length of chunks against the user limit.

πŸ“– Read

via "National Vulnerability Database".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Data Loss, Leakage Top Cloud Security Concerns πŸ•΄

Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers.

πŸ“– Read

via "Dark Reading: ".
12:12
πŸ” Top 5 blockchain challenges businesses face πŸ”

While blockchain technology can offer great opportunities, the hype surrounding it often leads to unrealistic expectations, according to the World Economic Forum.

πŸ“– Read

via "Security on TechRepublic".
?
12:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Massive Malvertising Campaign Reaches 100M Ads, Manipulates Supply Chain ❌

A sophisticated and growing malvertising attacker is partnering with legitimate ad tech platforms to drop malware at scale.

πŸ“– Read

via "Threatpost".
?
13:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-11734 (e107)

In e107 v2.1.7, output without filtering results in XSS.

πŸ“– Read

via "National Vulnerability Database".
?
14:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech news roundup: Amazon Prime Day and the highest-rated workplaces of 2019 πŸ”

This week's TechRepublic and ZDNet stories include a breach of Sprint customers' data, notes from the Duo Security 2019 access report, and how execs are taking charge of digital transformation plans.

πŸ“– Read

via "Security on TechRepublic".
14:27
πŸ” Tech news roundup: Amazon Prime Day and the highest-rated workplaces of 2019 πŸ”

This week's TechRepublic and ZDNet stories include a breach of Sprint customers' data, notes from the Duo Security 2019 access report, and how execs are taking charge of digital transformation plans.

πŸ“– Read

via "Security on TechRepublic".
14:36
❌ Bluetooth Flaws Could Allow Global Tracking of Apple, Windows 10 Devices ❌

Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices -- opening an attack vector.

πŸ“– Read

via "Threatpost".
14:51
❌ Firmware Bugs Plague Server Supply Chain, 7 Vendors Impacted ❌

Lenovo, Acer and five additional server manufacturers are hit with supply-chain bugs buried in motherboard firmware.

πŸ“– Read

via "Threatpost".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Seven CCPA Amendments Advance πŸ”

As the California Consumer Privacy Act (CCPA) continues to take shape, the state's Senate Committee on the Judiciary voted to advance seven amendments to the law last week but not after making some changes.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:16
πŸ•΄ A Password Management Report Card πŸ•΄

New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings.

πŸ“– Read

via "Dark Reading: ".
?
16:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 800K Systems Still Vulnerable to BlueKeep πŸ•΄

Organizations with systems exploitable via the RDP flaw pose an increasing risk to themselves and other organizations, BitSight says.

πŸ“– Read

via "Dark Reading: ".
16:36
πŸ•΄ Sprint Reveals Account Breach via Samsung Website πŸ•΄

The last-June breach exposed data includes names, phone numbers, and account numbers.

πŸ“– Read

via "Dark Reading: ".
?
16:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Bluetooth Bug Enables Tracking on Windows 10, iOS & macOS Devices πŸ•΄

Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access.

πŸ“– Read

via "Dark Reading: ".
?
18:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Wormable BlueKeep Bug Still Threatens Legions of Windows Systems ❌

Two months after the alarm sounded warning of a WannaCry-level event, progress in patching exposed Windows systems varies by country and industry.

πŸ“– Read

via "Threatpost".
?
18:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ MITRE ATT&CK Framework Not Just for the Big Guys πŸ•΄

At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language.

πŸ“– Read

via "Dark Reading: ".
18 July 2019
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Still not using HTTPS? Firefox is about to shame you ⚠

Two years after promising to report all HTTP-based web pages as insecure, Mozilla is about to deliver.

πŸ“– Read

via "Naked Security".
?
08:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google Chrome is ditching its XSS detection tool ⚠

Google's throwing in the towel on XSS Auditor and putting its trust in Trusted Types instead.

πŸ“– Read

via "Naked Security".
09:02
πŸ•΄ Slide Show πŸ•΄



πŸ“– Read

via "Dark Reading: ".
09:16
⚠ Hacked Bluetooth hair straighteners are too hot to handle ⚠

The Glamoriser Smart Bluetooth straightener offers up yet another example of how not to add a risky product to the Internet of Things (IoT).

πŸ“– Read

via "Naked Security".
?
09:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why 70% of healthcare orgs have suffered data breaches πŸ”

Digital transformation initiatives bring a slew of data privacy concerns to US health organizations, according to a Thales report.

πŸ“– Read

via "Security on TechRepublic".
?
10:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Series 2 launch episode – RDP exposed [PODCAST] ⚠

The Naked Security Podcast is back. Listen now, and let us know what you think!

πŸ“– Read

via "Naked Security".
10:53
πŸ” Lateral phishing: Hackers are taking over business accounts to send malicious emails πŸ”

The use of compromised accounts to send phishing emails to contacts inside and outside an organization is an increasing security threat.

πŸ“– Read

via "Security on TechRepublic".
10:58
πŸ” Why 72% of people still recycle passwords πŸ”

Users recycle the same password an average of four times, according to a Security.org report.

πŸ“– Read

via "Security on TechRepublic".
11:11
πŸ•΄ Calculating the Value of Security πŸ•΄

What will it take to align staff and budget to protect the organization?

πŸ“– Read

via "Dark Reading: ".
?
11:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-10763

The CampTix Event Ticketing plugin before 1.5 for WordPress allows XSS in the admin section via a ticket title or body.

πŸ“– Read

via "National Vulnerability Database".
11:28
ATENTIONβ€Ό New - CVE-2016-10762

The CampTix Event Ticketing plugin before 1.5 for WordPress allows CSV injection when the export tool is used.

πŸ“– Read

via "National Vulnerability Database".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 79% of US Consumers Fear Webcams Are Watching πŸ•΄

Widespread privacy concerns have caused 60% of people to cover their laptop webcams - some in creative ways - survey data shows.

πŸ“– Read

via "Dark Reading: ".
?
12:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ke3chang APT Linked to Previously Undocumented Backdoor ❌

The cyberspy group's activities are broader than originally thought.

πŸ“– Read

via "Threatpost".
?
13:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Triples Some Bug Bounty Payouts ❌

Google is announcing much higher bug bounty payouts for Chrome, Chrome OS and Google Play.

πŸ“– Read

via "Threatpost".
?
15:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Capture the Flag Competitions Strengthen the Cybersecurity Workforce πŸ•΄

These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.

πŸ“– Read

via "Dark Reading: ".
15:16
πŸ•΄ Bulgarian Tax Breach Nets All the Records πŸ•΄

An attack by a 'wizard hacker' results in leaked records for virtually every Bulgarian taxpayer.

πŸ“– Read

via "Dark Reading: ".
?
15:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Slack Initiates Mass Password Reset ❌

More victims of a 2015 credential-harvesting incident have come to light.

πŸ“– Read

via "Threatpost".
15:43
πŸ” How businesses could be exposed to security risks from employees using FaceApp πŸ”

The seemingly harmless fun of AI-based apps such as FaceApp can actually subject individuals and businesses to security breaches.

πŸ“– Read

via "Security on TechRepublic".
15:50
❌ Mirai Botnet Sees Big 2019 Growth, Shifts Focus to Enterprises ❌

Mirai activity has nearly doubled between the first quarter of 2018 and the first quarter of 2019.

πŸ“– Read

via "Threatpost".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Legit Tools and Utilities That Cybercriminals Commonly Misuse πŸ•΄

Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.

πŸ“– Read

via "Dark Reading: ".
?
16:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Open Source Hacking Tool Grows Up πŸ•΄

Koadic toolkit gets upgrades - and a little love from nation-state hackers.

πŸ“– Read

via "Dark Reading: ".
17:01
πŸ•΄ RDP Bug Takes New Approach to Host Compromise πŸ•΄

Researchers show how simply connecting to a rogue machine can silently compromise the host.

πŸ“– Read

via "Dark Reading: ".
?
18:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Security Watch: Elon Musk’s NeuraLink Links Brains to iPhones via Bluetooth ❌

Directly linking thoughts to a phone via Bluetooth -- what could go wrong?

πŸ“– Read

via "Threatpost".
?
18:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ BitPaymer Ransomware Operators Wage Custom, Targeted Attacks πŸ•΄

A new framework is allowing the threat group to compile variants of the malware for each victim, Morphisec says.

πŸ“– Read

via "Dark Reading: ".
?
20:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Lessons From a New Programming Language πŸ•΄

A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process.

πŸ“– Read

via "Dark Reading: ".
?
22:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” AMCA Breach Total Hits 22.2 Million Patients πŸ”

An additional 2.2 million patients have had their data compromised by a data breach at AMCA, the now bankrupt medical debt collector.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
19 July 2019
?
07:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FaceApp privacy panic sets internet alight ⚠

You grant FaceApp a perpetual, irrevocable license to use, reproduce, modify and adapt your image. Sounds scary.

πŸ“– Read

via "Naked Security".
07:41
⚠ Shapeshifting Morpheus chip aims to baffle hackers ⚠

Morpheus aims to make hacking so difficult at microprocessor level that attackers will give up long before they can do any damage.

πŸ“– Read

via "Naked Security".
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox to pile on more native privacy features ⚠

Mozilla is integrating its Lockwise password manager directly into the browser and expanding its support for the Have I Been Pwned website.

πŸ“– Read

via "Naked Security".
?
10:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Crack the Defenses of iOS and other Platforms at Black Hat USA πŸ•΄

Get the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference.

πŸ“– Read

via "Dark Reading: ".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike πŸ•΄

Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions.

πŸ“– Read

via "Dark Reading: ".
?
11:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to reverse the cybersecurity staffing shortage: 5 tips πŸ”

CISOs must change the ways they recruit, train, and retain cybersecurity professionals, according to Forrester.

πŸ“– Read

via "Security on TechRepublic".
?
13:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Europol Head Fears 5G Will Give Criminals an Edge πŸ•΄

Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks.

πŸ“– Read

via "Dark Reading: ".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mirai Groups Target Business IoT Devices πŸ•΄

More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.

πŸ“– Read

via "Dark Reading: ".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Malware in PyPI Code Shows Supply Chain Risks πŸ•΄

A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.

πŸ“– Read

via "Dark Reading: ".
?
15:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-7882

Improper handling of LDAP authentication in MongoDB Server versions 3.0.0 to 3.0.6 allows an unauthenticated client to gain unauthorized access.

πŸ“– Read

via "National Vulnerability Database".
?
15:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bug in NVIDIA’s Tegra Chipset Opens Door to Malicious Code Execution ❌

Researcher creates 'Selfblow' proof-of-concept attack for exploiting a vulnerability that exists in "every single Tegra device released so far".

πŸ“– Read

via "Threatpost".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Adult Sites Lack Privacy, Open the Door for Harassment and Tracking ❌

Third-party tracking is rampant on sites like Pornhub, with users' sexual preferences on full view.

πŸ“– Read

via "Threatpost".
?
18:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Iran-Linked APT34 Invites Victims to LinkedIn for Fresh Malware Infections ❌

The group was posing as a researcher from Cambridge, and was found to have added three new malware families to its spy arsenal.

πŸ“– Read

via "Threatpost".
21 July 2019
?
13:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2002-0390

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0639. Reason: This candidate is a reservation duplicate of CVE-2002-0639. Notes: All CVE users should reference CVE-2002-0639 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
22 July 2019
?
06:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 22 stories of the week ⚠

From the RDP exploit already at your door to Chrome's XSS Auditor - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
07:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Stop facial recognition trials now, warns UK committee ⚠

The UK government should suspend trials of automatic facial recognition systems until it can meet regulators’ concerns about the technology, according to a report released Friday.

πŸ“– Read

via "Naked Security".
?
09:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hacked Bulgarian database reaches online forums ⚠

Data on millions of people stolen from the Bulgarian government has already popped up on hacker trading forums.

πŸ“– Read

via "Naked Security".
?
10:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Chrome 76 blocks websites from detecting incognito mode ⚠

Ever bypassed a website paywall using a browser’s privacy mode? It was once a simple hack, however, it no longer works for most websites.

πŸ“– Read

via "Naked Security".
?
11:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Actions that Made GDPR Real in 2019 πŸ•΄

In the wake of recent fines levied against British Airways, Marriott, and Facebook, companies are starting to take data privacy and security more seriously.

πŸ“– Read

via "Dark Reading: ".
11:10
πŸ•΄ CISO Pressures: Why the Role Stinks and How to Fix It πŸ•΄

CISOs spend much less time in their role than other members of the boardroom. It's a serious problem that must be addressed.

πŸ“– Read

via "Dark Reading: ".
?
11:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Equifax to Pay $700 Million in 2017 Data Breach Settlement ❌

Equifax will dish out as much as $700 million on the heels of its infamous 2017 data breach that impacted 150 million customers.

πŸ“– Read

via "Threatpost".
11:49
πŸ•΄ Ex-NSA Contractor Gets 9 Years for Retaining Defense Data πŸ•΄

Law enforcement recovered two decades' worth of stolen material from the home and car of former government contractor Harold Martin.

πŸ“– Read

via "Dark Reading: ".
11:55
πŸ” 4 ways to avoid malware on Android πŸ”

Users can avoid malware on their Android devices if they follow four, easy tips.

πŸ“– Read

via "Security on TechRepublic".
?
13:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Large-Scale Government Hacks Hit Russia, Bulgaria ❌

The Bulgarian attack impacted almost tax information for the entire country.

πŸ“– Read

via "Threatpost".
13:10
πŸ” 40% of enterprises experienced Office 365 credential theft, report finds πŸ”

While 80% of organizations use more than the default security provided by Office 365, additional measures are needed to secure enterprise email.

πŸ“– Read

via "Security on TechRepublic".
?
13:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-2024

IBM QRadar SIEM 7.2 and 7.3 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 155350.

πŸ“– Read

via "National Vulnerability Database".
13:28
ATENTIONβ€Ό New - CVE-2018-13927

Debug policy with invalid signature can be loaded when the debug policy functionality is disabled by using the parallel image loading in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCS404, QCS605, SD 410/12, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SXR1130

πŸ“– Read

via "National Vulnerability Database".
13:28
ATENTIONβ€Ό New - CVE-2018-13924

Lack of check to prevent the buffer length taking negative values can lead to stack overflow. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9150, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA6174A, QCA8081, QCS404, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130

πŸ“– Read

via "National Vulnerability Database".
13:28
ATENTIONβ€Ό New - CVE-2018-13896

XBL_SEC image authentication and other crypto related validations are accessible to a compromised OEM XBL Loader due to missing lock at XBL_SEC stage.. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130

πŸ“– Read

via "National Vulnerability Database".
13:35
❌ Amazon Alexa, Google Home On Collision Course With Regulation ❌

Threatpost talks to Tim Mackey with Synopsys about recent Amazon Echo and Google Home privacy faux pas. Will GDPR and other regulations catch up to the voice assistants?

πŸ“– Read

via "Threatpost".
?
14:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Firmware Vulnerabilities Show Supply Chain Risks πŸ•΄

A recently announced pair of vulnerabilities in server firmware could put enterprise IT at risk.

πŸ“– Read

via "Dark Reading: ".
?
16:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Equifax to Pay Upwards of $700 Million in Data Breach Settlement πŸ”

Once approved, the settlement will be the largest ever paid by a company over a data breach.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tackling the Collaboration Conundrum ❌

Enterprises should recognize the data security risk that Slack, Teams or TeamViewer could introduce and address it.

πŸ“– Read

via "Threatpost".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical RCE Flaw in Palo Alto Gateways Hits Uber ❌

The bug is previously unknown but yet still fixed in later releases. However, many organizations are likely still vulnerable.

πŸ“– Read

via "Threatpost".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Cybercriminals Break into the Microsoft Cloud πŸ•΄

Microsoft and Trimarc researchers explore the most common attacks against the cloud and effective defenses and mitigation.

πŸ“– Read

via "Dark Reading: ".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Equifax to Pay Up to $700mn for Data Breach Damages πŸ•΄

In a settlement with the FTC, consumers affected by the breach are eligible for up to $20,000 in a cash settlement, depending on damages they can prove.

πŸ“– Read

via "Dark Reading: ".
23 July 2019
?
06:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FSB hackers drop files online ⚠

A hacking group that distributed files stolen from a Russian contractor to the media last week has published some of the documents online.

πŸ“– Read

via "Naked Security".
?
07:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Your Android’s accelerometer could be used to eavesdrop on your calls ⚠

Researchers have created an attack called Spearphone that uses the motion sensors in Android phones to listen to phone calls, interactions with your voice assistant, and more.

πŸ“– Read

via "Naked Security".
07:25
⚠ Big password hole in iOS 13 beta spotted by testers ⚠

A security clanger has been spotted in the current beta version of iOS 13 which allows anyone to access a user’s stored web and app passwords without having to authenticate.

πŸ“– Read

via "Naked Security".
?
08:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How organizations and employees can protect themselves against financial email scams πŸ”

Fraudulent emails that try to trick their victims into conducting financial transactions amounted to losses of more than $1.2 billion in 2018, according to a new study from Symantec.

πŸ“– Read

via "Security on TechRepublic".
?
09:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How businesses can reduce the financial impact of data breaches πŸ”

The cost of a data breach has grown 12% over the past 5 years, hitting $3.92 million on average. Organizations can take steps to mitigate the financial damage, according to a new report.

πŸ“– Read

via "Security on TechRepublic".
?
09:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Rapper Who is Very Concerned with Password Security πŸ•΄



πŸ“– Read

via "Dark Reading: ".
09:59
πŸ•΄ Security Considerations in a BYOD Culture πŸ•΄

The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface.

πŸ“– Read

via "Dark Reading: ".
09:59
πŸ•΄ Planning a Bug Bounty Program? Follow Shopify's Example πŸ•΄

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

πŸ“– Read

via "Dark Reading: ".
09:59
πŸ•΄ DHS's Bob Kolasky Goes All in on Risk Management πŸ•΄

As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.

πŸ“– Read

via "Dark Reading: ".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Programmer from hell plants logic bombs to guarantee future work ⚠

At some dark moment, have you ever wondered: what if the programmers are adding the bugs deliberately?

πŸ“– Read

via "Naked Security".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 things to know about service mesh πŸ”

Service mesh helps balance your app infrastructure while still maintaining proper encryption and authentication. Tom Merritt discusses five things you need to know about service mesh.

πŸ“– Read

via "Security on TechRepublic".
11:02
πŸ” Top 5 things to know about service mesh πŸ”

Service mesh helps balance your app infrastructure while still maintaining proper encryption and authentication. Tom Merritt discusses five things you need to know about service mesh.

πŸ“– Read

via "Security on TechRepublic".
11:14
πŸ•΄ The War for Cyber Talent Will Be Won by Retention not Recruitment πŸ•΄

Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.

πŸ“– Read

via "Dark Reading: ".
?
11:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 7/19 Edition πŸ”

Microsoft's new phishing detection feature, an increase in cybersecurity spend, and more - catch up on the week's news with this round up.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
11:35
πŸ” How risk management can help secure industrial IoT and big data πŸ”

Read about approaches your company can take to manage IoT and big data cyber risks.

πŸ“– Read

via "Security on TechRepublic".
?
11:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ VLC Media Player Plagued By Unpatched Critical RCE Flaw ❌

A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution.

πŸ“– Read

via "Threatpost".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-18669

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board title contents" parameter, aka the adm/board_form_update.php bo_subject parameter.

πŸ“– Read

via "National Vulnerability Database".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Popular Samsung, LG Android Phones Open to β€˜Spearphone’ Eavesdropping ❌

A Spearphone attacker can use the accelerometer in LG and Samsung phones to remotely eavesdrop on any audio that's played on speakerphone, including calls, music and voice assistant responses.

πŸ“– Read

via "Threatpost".
14:05
⚠ SharePoint Online scam – sadly, phishing’s not dead ⚠

Not all phishes contain easily spotted errors or obviously dodgy web links - here's how to stay safe...

πŸ“– Read

via "Naked Security".
?
14:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISA Warns Public About the Risks of 5G πŸ•΄

Vulnerabilities include everything from physical risks through the supply chain to business risks.

πŸ“– Read

via "Dark Reading: ".
14:34
πŸ•΄ Russia Attempted to De-Anonymize Tor Browser: Report πŸ•΄

An attempt to crack Tor was one of many projects hackers discovered when they broke into Russian intelligence contractor SyTech.

πŸ“– Read

via "Dark Reading: ".
?
14:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Government Contractor Gets Nine Years for Data Theft πŸ”

The judge is hopeful the sentencing is enough to deter other government employees with security clearances from mishandling secrets.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-18676

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "mobile board tail contents" parameter, aka the adm/board_form_update.php bo_mobile_content_tail parameter.

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2018-18675

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "mobile board title contents" parameter, aka the adm/board_form_update.php bo_mobile_subject parameter.

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2018-18673

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Menu Link" parameter, aka the adm/menu_list_update.php me_link parameter.

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2018-18672

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board head contents" parameter, aka the adm/board_form_update.php bo_content_head parameter.

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2018-18671

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "mobile board head contents" parameter, aka the adm/board_form_update.php bo_mobile_content_head parameter.

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2018-18670

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Extra Contents" parameter, aka the adm/config_form_update.php cf_1~10 parameter.

πŸ“– Read

via "National Vulnerability Database".
15:40
❌ Malware-Loader β€˜Brushaloader’ Grows More Menacing ❌

Dropper malware become more popular as hackers turn to more quiet attack techniques to avoid detection.

πŸ“– Read

via "Threatpost".
?
16:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Bug Bounties Continue to Rise as Google Boosts its Payouts πŸ•΄

Reward for vulnerability research climbed 83% in the past year.

πŸ“– Read

via "Dark Reading: ".
?
16:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WordPress Plugin Flaws Exploited in Ongoing Malvertising Campaign ❌

An ongoing malvertising campaign is exploiting WordPress plugin vulnerabilities to redirect website visitors to malicious pages.

πŸ“– Read

via "Threatpost".
?
17:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Citrix Confirms Password-Spraying Heist of Reams of Internal IP ❌

Security experts say the attack stemmed from weak cybersecurity controls.

πŸ“– Read

via "Threatpost".
?
18:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Business Email Compromise: Thinking Beyond Wire Transfers πŸ•΄

As BEC continues to drive record-high losses, cybercriminals devise new tactics for swindling corporate targets out of millions.

πŸ“– Read

via "Dark Reading: ".
18:08
πŸ•΄ Penetration Test Data Shows Risk to Domain Admin Credentials πŸ•΄

But gaining a foothold on the LAN via vulnerabilities on Internet-facing assets is becoming harder, Rapid7 found in its real-world pen tests.

πŸ“– Read

via "Dark Reading: ".
?
19:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New IPS Architecture Uses Network Flow Data for Analysis πŸ•΄

Can a stream of data intended for network performance monitoring be the basis of network security? One company says the answer is 'yes.'

πŸ“– Read

via "Dark Reading: ".
24 July 2019
?
07:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Malware-based Attacks Dropped 20% Worldwide πŸ•΄

Meanwhile, criminals waged more encrypted, ransomware, and IoT attacks.

πŸ“– Read

via "Dark Reading: ".
07:37
⚠ Facebook admits to Messenger Kids security hole ⚠

A hole in the supposed closed-loop messaging system allowed children to join group chats with people their parents hadn’t approved.

πŸ“– Read

via "Naked Security".
07:37
⚠ Apple’s July patchfest fixes bugs in multiple products ⚠

Apple released fixes for various products this week, including one for a bug that has been public with proof-of-concept code for two months.

πŸ“– Read

via "Naked Security".
?
08:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ VPNs' Future: Less Reliant on Users, More Transparent, And Smarter πŸ•΄

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection.

πŸ“– Read

via "Dark Reading: ".
08:08
πŸ•΄ Travel Security [from J4vv4D] πŸ•΄

Do you travel to dangerous places, like Information Security Conferences?

πŸ“– Read

via "Dark Reading: ".
?
10:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat USA Offers Inside Look at Boeing 787 Security Flaws πŸ•΄

The 787 Dreamliner, WhatsApp, and Windows 10 are all subjects of cutting-edge Reverse Engineering talks at this year's August event.

πŸ“– Read

via "Dark Reading: ".
?
10:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 83% have experienced a DDoS attack in the past two years, survey finds πŸ”

The ease with which DDoS attacks can be waged makes them particularly prevalent, with over half surveyed experiencing multiple attacks waged against their organization.

πŸ“– Read

via "Security on TechRepublic".
?
11:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Protecting Against Ransomware Attacks: A Checklist ❌

In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves.

πŸ“– Read

via "Threatpost".
11:18
πŸ•΄ The Commoditization of Multistage Malware Attacks πŸ•΄

Malware that used to be advanced is now available to everyone. These three actions could help you stay safer.

πŸ“– Read

via "Dark Reading: ".
11:18
πŸ•΄ 7 Stats That Show What it Takes to Run a Modern SOC πŸ•΄

An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).

πŸ“– Read

via "Dark Reading: ".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to prevent unsigned Docker images from being pulled πŸ”

Make sure you're only pulling down signed Docker images with Content Trust enabled.

πŸ“– Read

via "Security on TechRepublic".
12:38
πŸ” How to prevent unsigned Docker images from being pulled πŸ”

Make sure you're only pulling down signed Docker images with Content Trust enabled.

πŸ“– Read

via "Security on TechRepublic".
?
13:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DEF CON Invites Kids to Crack Campaign Finance Portals πŸ•΄

DEF CON's Voting Village and AI Village team up with r00tz Asylum to let kids explore simulated campaign financial disclosure portals and disinformation campaigns.

πŸ“– Read

via "Dark Reading: ".
?
14:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Unique Monokle Android Spyware Self-Signs Certificates ❌

Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election.

πŸ“– Read

via "Threatpost".
?
15:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Highlighting Data Protection Best Practices for IIoT Systems πŸ”

A new paper, released Monday, is designed to act as a best practices guide to IIoT (industrial IoT) systems that connect control systems with enterprise systems and business processes.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack πŸ•΄

IoT botnet-made up mainly of routers-hit a service provider with nearly 300,000 requests-per-second in a 13-day deluge of data.

πŸ“– Read

via "Dark Reading: ".
16:19
πŸ” Tech news roundup: Managing IoT, new iPhones, and phishing concerns πŸ”

This week's stories from TechRepublic and ZDNet include AI's influence on retail, the onslaught of malicious emails, and a look at why 50% of employees aren't satisfied.

πŸ“– Read

via "Security on TechRepublic".
16:19
πŸ” Tech news roundup: Managing IoT, new iPhones, and phishing concerns πŸ”

This week's stories from TechRepublic and ZDNet include AI's influence on retail, the onslaught of malicious emails, and a look at why 50% of employees aren't satisfied.

πŸ“– Read

via "Security on TechRepublic".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NSA to Form New Cybersecurity Directorate πŸ•΄

Anne Neuberger will lead the directorate, which aims to bring together the NSA's offensive and defensive operations.

πŸ“– Read

via "Dark Reading: ".
?
18:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ThreatList: Human Error is Behind One Quarter of Data Breaches ❌

Meanwhile, remediation times are ballooning to a year or more in the case of malicious attacks, according to Ponemon Institute.

πŸ“– Read

via "Threatpost".
18:13
πŸ•΄ With Data Breach Costs, Time is Money πŸ•΄

The sooner a company can detect and respond to an incident, the less likely they are to pay for it, a new IBM-Ponemon study finds.

πŸ“– Read

via "Dark Reading: ".
?
19:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Popular File-Sharing Service WeTransfer Used in Malicious Spam Campaigns ❌

WeTransfer is being used by hackers to circumvent email gateways looking to zap malicious links.

πŸ“– Read

via "Threatpost".
25 July 2019
?
08:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Create Smarter Risk Assessments πŸ•΄

Executives and directors need quantitative measurements - such as likelihood of loss and hard-dollar financial impact - to make more informed decisions about security risks.

πŸ“– Read

via "Dark Reading: ".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ You can probably be identified from your anonymized data ⚠

The idea of de-identifying data has been around for a while. However, a study published this week asserts that it’s even easier to re-identify information than we first thought.

πŸ“– Read

via "Naked Security".
09:09
πŸ•΄ Android Malware 'Triada' Most Active on Telco Networks πŸ•΄

Google in May disclosed that several Android devices had been shipped pre-installed with the RAT.

πŸ“– Read

via "Dark Reading: ".
09:17
⚠ New York City moves to protect citizens’ location data ⚠

New York City is considering a law that could stop cellphone carriers and smartphone app vendors from selling their location data.

πŸ“– Read

via "Naked Security".
?
09:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ In-Depth πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Answer These 9 Questions to Determine if Your Data Is Safe πŸ•΄

Data protection regulations are only going to grow tighter. Make sure you're keeping the customer's best interests in mind.

πŸ“– Read

via "Dark Reading: ".
?
12:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Email persists as a major avenue for cyberattacks in 2019 πŸ”

A new report from Barracuda Networks reveals that email-based attacks are having a major impact on businesses, despite increased confidence in email security systems.

πŸ“– Read

via "Security on TechRepublic".
12:12
⚠ EvilGnome – Linux malware aimed at your laptop, not your servers ⚠

EvilGnome was written to target the comparatively small but committed community who use Linux on their laptops.

πŸ“– Read

via "Naked Security".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 60% of companies experienced insider attacks in the last year πŸ”

Insider attacks are some of the most threatening cyberattacks to data security, according to a Nucleus Cyber report.

πŸ“– Read

via "Security on TechRepublic".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook gets its wrist slapped $5b for fumbling our data, confirms FTC ⚠

The FTC initially wanted a fine worth tens of billions, plus potential jail time for execs.

πŸ“– Read

via "Naked Security".
?
14:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Dutch Data Protection Authority Issues First GDPR Fine πŸ”

The fine, against a large hospital, stems from its apparent lack of internal patient record security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Training That Keeps Up with Modern Development πŸ•΄

Black Hat USA speakers to discuss what it will take to 'shift knowledge left' to build up a corps of security-savvy software engineers.

πŸ“– Read

via "Dark Reading: ".
15:31
ATENTIONβ€Ό New - CVE-2018-13897

Clients hostname gets added to DNS record on device which is running dnsmasq resulting in an information exposure in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660

πŸ“– Read

via "National Vulnerability Database".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Johannesburg Ransomware Attack Leaves Residents in the Dark πŸ•΄

The virus affected the network, applications, and databases at City Power, which delivers electricity to the South African financial hub.

πŸ“– Read

via "Dark Reading: ".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Loader Variant Behind Widespread Malware Attacks ❌

Malware infection technique called TxHollower gets updated with stealthy features.

πŸ“– Read

via "Threatpost".
?
18:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Streamlining Patch Management: Expert Advice ❌

Webinar examines challenges in patch management and offers solutions to streamline the process.

πŸ“– Read

via "Threatpost".
?
18:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Louisiana Declares Cybersecurity State of Emergency πŸ•΄

A series of attacks on school district systems leads the governor to declare the state's first cybersecurity state of emergency.

πŸ“– Read

via "Dark Reading: ".
18:33
πŸ•΄ Russian Threat Group May Have Devised a 'Man-on-the-Side' Attack πŸ•΄

Data from an intrusion last year suggests Iron Liberty group may have a new trick up its sleeve, Secureworks says.

πŸ“– Read

via "Dark Reading: ".
?
19:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Android Spyware Has Ties to Election Interference πŸ•΄

Recently revealed surveillance-ware comes from a consultant with close ties to Russia's GRU who was sanctioned by the US for election-tampering.

πŸ“– Read

via "Dark Reading: ".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Senate Report: US Election Security 'Sorely Lacking' in 2016 πŸ•΄

Senate Intelligence Committee report released today cites weaknesses, but finds no evidence of vote-tampering.

πŸ“– Read

via "Dark Reading: ".
26 July 2019
?
04:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-0202

The Apache Storm Logviewer daemon exposes HTTP-accessible endpoints to read/search log files on hosts running Storm. In Apache Storm versions 0.9.1-incubating to 1.2.2, it is possible to read files off the host's file system that were not intended to be accessible via these endpoints.

πŸ“– Read

via "National Vulnerability Database".
04:11
ATENTIONβ€Ό New - CVE-2018-11779

In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.

πŸ“– Read

via "National Vulnerability Database".
?
07:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep1: FaceApp, logic bombs and stranger danger – Naked Security Podcast ⚠

We’re finally back with Series 2 of the Naked Security Podcast. While you’ve been missing us, we’ve been working out how to improve the show and kitting out a dedicated studio. You’ll now find longer episodes with more opportunities to get involved. Send us your general cybersecurity questions and join the discussion via social media […]

πŸ“– Read

via "Naked Security".
?
08:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Browser plug-ins peddled personal data from over 4m browsers ⚠

Nacho Analytics gathered data like passwords, tax and prescription data from browser add-ons - and those who bought it can keep it.

πŸ“– Read

via "Naked Security".
08:11
ATENTIONβ€Ό New - CVE-2018-20856

An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.

πŸ“– Read

via "National Vulnerability Database".
08:11
ATENTIONβ€Ό New - CVE-2018-20855

An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.

πŸ“– Read

via "National Vulnerability Database".
08:11
ATENTIONβ€Ό New - CVE-2018-20854

An issue was discovered in the Linux kernel before 4.20. drivers/phy/mscc/phy-ocelot-serdes.c has an off-by-one error with a resultant ctrl->phys out-of-bounds read.

πŸ“– Read

via "National Vulnerability Database".
08:18
πŸ•΄ What Every Security Team Should Know About Internet Threats πŸ•΄

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

πŸ“– Read

via "Dark Reading: ".
?
08:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ BlueKeep guides make imminent public exploit more likely ⚠

A public exploit for Microsoft's BlueKeep vulnerability is just days away. In fact, for those with deep pockets, it's already here.

πŸ“– Read

via "Naked Security".
08:53
πŸ•΄ Trends πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
10:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Q&A: Inside the Black Hat NOC πŸ•΄

Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.

πŸ“– Read

via "Dark Reading: ".
?
10:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Happy SysAdminDay 2019! ⚠

Hey sysadmin, nice tee.

πŸ“– Read

via "Naked Security".
?
11:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 3 Takeaways from the First American Financial Breach πŸ•΄

Data leaks from business logic flaws are not well understood and difficult to identify before they reach production environments. Here's how to find and prevent them.

πŸ“– Read

via "Dark Reading: ".
?
11:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-20857

Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name.

πŸ“– Read

via "National Vulnerability Database".
11:43
πŸ•΄ Black Hat Q&A: Inside the Black Hat NOC πŸ•΄

Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.

πŸ“– Read

via "Dark Reading: ".
11:43
πŸ” 66% of SMBs don't believe they are vulnerable to cyberattacks πŸ”

SMBs aren't prioritizing cybersecurity prevention strategies, even though they are at risk of attack, according to a Keeper Security report.

πŸ“– Read

via "Security on TechRepublic".
11:57
⚠ Sysadmins need to know – how DO you pronounce β€œsudo”? ⚠

We take on one of #SysAdminDay's thorny issues.

πŸ“– Read

via "Naked Security".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FormGet Storage Bucket Leaks Passport Scans, Bank Details πŸ•΄

Exposed files include mortgage and loan information, passport and driver's license scans, internal corporate files, and shipping labels.

πŸ“– Read

via "Dark Reading: ".
13:05
πŸ” Friday Five: 7/26 Edition πŸ”

News about a new phishing campaign targeting Office 365 admins, the FTC's big Facebook fine, and the latest data breach statistics are all covered in this week's Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-17210 (central_print_services)

An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. The core components that create and launch a print job do not perform complete verification of the session cookie that is supplied to them. As a result, an attacker with guest/pseudo-guest level permissions can bypass the session checks (that would otherwise logout a low-privileged user) by calling the core print job components directly via crafted HTTP GET and POST requests.

πŸ“– Read

via "National Vulnerability Database".
13:37
❌ β€˜Google’ Sites Are the Latest Ploy by Card-Skimming Thieves ❌

A credit-card skimmer on Magento sites was found loading JavaScript from a legitimate-seeming Google Analytics domain.

πŸ“– Read

via "Threatpost".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs πŸ•΄

New study found that any database containing 15 pieces of demographic data could be used to identify individuals.

πŸ“– Read

via "Dark Reading: ".
?
14:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Complete Personal Fraud Kits Sell for Less Than $40 on Dark Web πŸ•΄

The low cost of records reflects the huge supply of PII after many breaches at hospitals, government agencies, and credit bureaus.

πŸ“– Read

via "Dark Reading: ".
?
15:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Gamers Are Easy Prey for Credential Thieves ❌

Gamers are easy pickings for credential crooks, thanks to lax security hygiene and poor gaming company practices.

πŸ“– Read

via "Threatpost".
?
16:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Rare Steganography Hack Can Compromise Fully Patched Websites ❌

Attackers are hiding PHP scripts in EXIF headers of JPEG images to hack websites, just by uploading an image.

πŸ“– Read

via "Threatpost".
16:23
πŸ•΄ Malware Researcher Hutchins Sentenced to Supervised Release πŸ•΄

Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.

πŸ“– Read

via "Dark Reading: ".
?
16:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Louisiana Gov Declares Emergency After Cyberattacks Plague Schools ❌

Attacks on at least three school districts and likely others have prompted the state's first emergency due to cyberattack.

πŸ“– Read

via "Threatpost".
27 July 2019
?
21:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WannaCry hero gets off lightly, avoids prison – was justice done? ⚠

Wrote malware for money, went straight, got busted, didn't go to prison. Has US cybercrime enforcement gone soft?

πŸ“– Read

via "Naked Security".
?
22:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-18379

In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c.

πŸ“– Read

via "National Vulnerability Database".
22:25
ATENTIONβ€Ό New - CVE-2016-10764

In the Linux kernel before 4.9.6, there is an off by one in the drivers/mtd/spi-nor/cadence-quadspi.c cqspi_setup_flash() function. There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the ">" should be ">=" instead.

πŸ“– Read

via "National Vulnerability Database".
22:25
ATENTIONβ€Ό New - CVE-2015-9289

In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.

πŸ“– Read

via "National Vulnerability Database".
22:25
ATENTIONβ€Ό New - CVE-2012-6712

In the Linux kernel before 3.4, a buffer overflow occurs in drivers/net/wireless/iwlwifi/iwl-agn-sta.c, which will cause at least memory corruption.

πŸ“– Read

via "National Vulnerability Database".
22:25
ATENTIONβ€Ό New - CVE-2011-5327

In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption.

πŸ“– Read

via "National Vulnerability Database".
22:25
ATENTIONβ€Ό New - CVE-2010-5332

In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.

πŸ“– Read

via "National Vulnerability Database".
22:25
ATENTIONβ€Ό New - CVE-2010-5331

In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem.

πŸ“– Read

via "National Vulnerability Database".
22:25
ATENTIONβ€Ό New - CVE-2007-6762

In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array.

πŸ“– Read

via "National Vulnerability Database".
28 July 2019
?
19:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware hits Louisiana schools; state of emergency declared ⚠

The Louisiana Governor declared a state of emergency after three public school districts were seized by ransomware.

πŸ“– Read

via "Naked Security".
29 July 2019
?
06:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 21 stories of the week ⚠

From iOS 13's password hole to logic bombs courtesy of the programmer from hell - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
08:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Security-First Approach to DevOps πŸ•΄

Aware of the risks inherent in software, businesses are recognizing the need for application security.

πŸ“– Read

via "Dark Reading: ".
08:07
πŸ” Is homomorphic encryption ready to deliver confidential cloud computing to enterprises? πŸ”

The ability to keep data encrypted while you use it for computations in the cloud could protect data from attackers and malicious insiders alike. There is still a performance hit, but you can start using open-source libraries to take advantage of that.

πŸ“– Read

via "Security on TechRepublic".
?
09:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Three quarters of gamers suffer hate and harassment online ⚠

Trolling, stalking, sexual harassment, and humiliation have become so bad that one in ten respondents had depressive or suicidal thoughts.

πŸ“– Read

via "Naked Security".
?
10:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 Things That Don't Worry You Today (But Should) πŸ•΄

There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.

πŸ“– Read

via "Dark Reading: ".
10:22
⚠ NAS vendors hit by brute force ransomware attacks ⚠

Cybercriminals are targeting numerous Network Attached Storage vendors with a new wave of ransomware.

πŸ“– Read

via "Naked Security".
10:31
⚠ Russia targeted all 50 states in 2016 election, Senate report says ⚠

The Senate Intelligence Committee doesn't know what Moscow's intentions are, but Robert Mueller says they're still at it.

πŸ“– Read

via "Naked Security".
10:31
❌ β€˜WannaCry Hero’ Avoids Jail Time in Kronos Malware Charges ❌

Marcus Hutchins, also known by his online alias MalwareTech, has been spared jail time in his sentencing for the creation of the Kronos malware.

πŸ“– Read

via "Threatpost".
?
10:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 100+ IT policies at your fingertips, ready for download πŸ”

From BYOD and social media to ergonomics and encryption, TechRepublic has dozens of ready-made, downloadable IT policy templates.

πŸ“– Read

via "Security on TechRepublic".
?
11:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Network Security Mistakes Bound to Bite You πŸ•΄

It's Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help.

πŸ“– Read

via "Dark Reading: ".
11:11
❌ Fearing WannaCry-Level Danger, Enterprises Wrestle with BlueKeep ❌

Fears of a WannaCry-level global attack grow as working exploit info starts to go public.

πŸ“– Read

via "Threatpost".
?
12:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜URGENT/11’ Critical Infrastructure Bugs Threaten EternalBlue-Style Attacks ❌

Researchers have uncovered easy-to-exploit bugs that can impact physical safety, utilities, healthcare, critical infrastructure and more, setting the stage for widespread worm attacks.

πŸ“– Read

via "Threatpost".
?
12:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Vulnerability in VxWorks RTOS allows attackers to control internal networks πŸ”

Internet-connected devices powered by VxWorks 6.5 and newer are affected by a vulnerability that allows remote attackers full control over targeted devices.

πŸ“– Read

via "Security on TechRepublic".
?
15:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cloud Security Concerns Loom for 93% of Businesses Adopting Apps and BYOD ❌

Threatpost talks to Jacob Serpa with Bitglass about how more enterprises are struggling with a cloud security conundrum when it comes to public cloud vs on prem.

πŸ“– Read

via "Threatpost".
?
15:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-10766

edx-platform before 2016-06-06 allows CSRF.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2016-10765

edx-platform before 2016-06-10 allows account activation with a spoofed e-mail address.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2015-9288

The Unity Web Player plugin before 4.6.6f2 and 5.x before 5.0.3f2 allows attackers to read messages or access online services via a victim's credentials

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2015-6960

edx-platform before 2015-09-17 allows XSS via a team name.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2015-6253

edx-platform before 2015-08-17 allows XSS in the Studio listing of courses.

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2015-5601

edx-platform before 2015-07-20 allows code execution by privileged users because the course import endpoint mishandles .tar.gz files.

πŸ“– Read

via "National Vulnerability Database".
?
16:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What's the Cost of a Data Breach in 2019? πŸ”

The answer ultimately depends on the country and industry but in general, can span anywhere from $1.25 million to $8.19 million.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Sephora Offers Monitoring Services in Wake of Data Breach πŸ•΄

The data breach compromised data belonging to customers in parts of Southeast Asia, Australia, and New Zealand.

πŸ“– Read

via "Dark Reading: ".
17:01
❌ ThreatList: DMARC Adoption Nonexistent at 80% of Orgs ❌

Standard email authentication to prevent spoofing and phishing remains elusive for most.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-17213

An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. A user without valid credentials can bypass the authentication process, obtaining a valid session cookie with guest/pseudo-guest level privileges. This cookie can then be further used to perform other attacks.

πŸ“– Read

via "National Vulnerability Database".
17:34
ATENTIONβ€Ό New - CVE-2018-17211

An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. An unauthenticated attacker can view details about the printers associated with CPS via a crafted HTTP GET request.

πŸ“– Read

via "National Vulnerability Database".
17:34
ATENTIONβ€Ό New - CVE-2018-11774

Apache VCL versions 2.1 through 2.5 do not properly validate form input when adding and removing VMs to and from hosts. The form data is then used in SQL statements. This allows for an SQL injection attack. Access to this portion of a VCL system requires admin level rights. Other layers of security seem to protect against malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.

πŸ“– Read

via "National Vulnerability Database".
17:34
ATENTIONβ€Ό New - CVE-2018-11773

Apache VCL versions 2.1 through 2.5 do not properly validate form input when processing a submitted block allocation. The form data is then used as an argument to the php built in function strtotime. This allows for an attack against the underlying implementation of that function. The implementation of strtotime at the time the issue was discovered appeared to be resistant to a malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.

πŸ“– Read

via "National Vulnerability Database".
17:34
ATENTIONβ€Ό New - CVE-2018-11772

Apache VCL versions 2.1 through 2.5 do not properly validate cookie input when determining what node (if any) was previously selected in the privilege tree. The cookie data is then used in an SQL statement. This allows for an SQL injection attack. Access to this portion of a VCL system requires admin level rights. Other layers of security seem to protect against malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.

πŸ“– Read

via "National Vulnerability Database".
?
18:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Deutsche Bank Email Vulnerability Left Ex-Employees with Access πŸ•΄

Failures in computer and control systems are being blamed.

πŸ“– Read

via "Dark Reading: ".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Series of Zero-Day Vulnerabilities Could Endanger 200 Million Devices πŸ•΄

Vulnerabilities in VxWorks' TCP stack could allow an attacker to execute random code, launch a DoS attack, or use the vulnerable system to attack other devices.

πŸ“– Read

via "Dark Reading: ".
?
21:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-18570

Planon before Live Build 41 has XSS.

πŸ“– Read

via "National Vulnerability Database".
30 July 2019
?
04:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Can We Stop Ransomware From Spreading? πŸ•΄

Here's how to stop them - or at least limit the systems it can reach.

πŸ“– Read

via "Dark Reading: ".
?
08:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Farewell, Dear Password? The Future of Identity and Authorization πŸ•΄

Many organizations, along with their tech teams, are questioning whether eliminating passwords as an authentication tool might augment their overall security posture.

πŸ“– Read

via "Dark Reading: ".
?
09:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Sextortion Email Scams Rise Sharply πŸ•΄

Cybercriminals are increasingly trying to trick people into paying ransoms by threatening to expose compromising activities to friends and family.

πŸ“– Read

via "Dark Reading: ".
09:08
πŸ” It's 2019, and one third of businesses still have active Windows XP deployments πŸ”

As end of support for the still-popular Windows 7 draws near, risks of unpatched operating systems are likely to be a significant security concern in the near future.

πŸ“– Read

via "Security on TechRepublic".
09:14
πŸ•΄ Best Practices πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
10:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 12 reasons why data breaches still happen πŸ”

Half of IT security leaders don't know if their cybersecurity tools are working, according to a report from the Ponemon Institute and AttackIQ.

πŸ“– Read

via "Security on TechRepublic".
10:14
❌ Former AWS Engineer Arrested as Capital One Admits Massive Data Breach ❌

More than 100 million customers have had their data compromised by a hacker after a cloud misconfiguration at Capital One.

πŸ“– Read

via "Threatpost".
10:14
πŸ•΄ Black Hat Q&A: Cracking Apple's T2 Security Chip πŸ•΄

Duo Labs' Mikhail Davidow and Jeremy Erickson speak about their research on the Apple T2 security chip, and why they're sharing it at Black Hat USA.

πŸ“– Read

via "Dark Reading: ".
10:21
⚠ Post-Equifax settlement, NY updates data breach notification laws ⚠

Equifax is fined $675 million, while New York data breach notification law now covers biometrics, passwords, and more.

πŸ“– Read

via "Naked Security".
10:26
⚠ US chases fraudulent bitcoin exchange BTC-e for $100m ⚠

Two years ago, the US government fined an international cybercriminal and his fraudulent bitcoin exchange over $100m. Now, it's going after them for the money.

πŸ“– Read

via "Naked Security".
10:31
⚠ Listening in: Humans hear the private info Siri accidentally records ⚠

Apple Watch and HomePod have the highest rate of inadvertent recordings, a whistleblower says.

πŸ“– Read

via "Naked Security".
?
10:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hackers target Telegram accounts through voicemail backdoor ⚠

As politicians should know by now, secure messaging apps such as Telegram can quickly become a double-edged sword.

πŸ“– Read

via "Naked Security".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-18380

edx-platform before 2017-08-03 allows attackers to trigger password-reset e-mail messages in which the reset link has an attacker-controlled domain name.

πŸ“– Read

via "National Vulnerability Database".
11:27
ATENTIONβ€Ό New - CVE-2015-9290

In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.

πŸ“– Read

via "National Vulnerability Database".
11:39
πŸ•΄ CISOs Must Evolve to a Data-First Security Program πŸ•΄

Such a program will require effort and reprioritization, but it will let your company fight modern-day threats and protect your most important assets.

πŸ“– Read

via "Dark Reading: ".
?
11:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Suffering SOC Saga Continues πŸ•΄

New study exposes low confidence among security professionals in their security operations centers.

πŸ“– Read

via "Dark Reading: ".
12:04
❌ Nation-State Actors Go All-In on Mobile Malware ❌

Even though mobile data security is less mature than its desktop equivalent, the quality of the information on offer is top-tier.

πŸ“– Read

via "Threatpost".
?
12:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your corporate bank account after the Capital One breach: 10 tips πŸ”

A Capital One data breach put the data of 106 million people at risk, including social security numbers and banking information.

πŸ“– Read

via "Security on TechRepublic".
?
12:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Capital One breach – 100 million users’ data stolen ⚠

Global financial services company Capital One has just announced a massive data breach.

πŸ“– Read

via "Naked Security".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ BlueKeep Exploits Appear as Security Firms Continue to Worry About Cyberattack πŸ•΄

The lack of an attack has puzzled some security experts, but the general advice remains that companies should patch their vulnerable systems more quickly.

πŸ“– Read

via "Dark Reading: ".
13:29
πŸ•΄ DHS Warns About Security Flaws in Small Airplanes πŸ•΄

Rapid7 researchers found holes in CAN bus networks that an attacker could exploit to sabotage its operation.

πŸ“– Read

via "Dark Reading: ".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Android Ransomware Spreads Via β€˜Sex Simulation Game’ Links on Reddit, SMS ❌

A new strain of ransomware is being distributed to Android users via online forums and SMS messages.

πŸ“– Read

via "Threatpost".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Transforming 'Tangible Security' into a Competitive Advantage πŸ•΄

Today's consumers want to see and touch security. Meeting this demand will be a win-win for everyone, from users to vendors to security teams.

πŸ“– Read

via "Dark Reading: ".
15:19
πŸ•΄ Capital One Breach Affects 100M US Citizens, 6M Canadians πŸ•΄

The breach exposed credit card application data, Social Security numbers, and linked bank accounts, among other information.

πŸ“– Read

via "Dark Reading: ".
15:32
ATENTIONβ€Ό New - CVE-2018-16871

A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.

πŸ“– Read

via "National Vulnerability Database".
15:39
πŸ•΄ Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking πŸ•΄

Lack of security in the default settings of Internet-enabled video cameras make co-opting video feeds not just a movie-hacker technique, but a reality for millions of cameras.

πŸ“– Read

via "Dark Reading: ".
15:48
πŸ” New York Updates Data Breach Notification Law πŸ”

The law, which updates data breach notification requirements in the state, was one of two forms of legislation signed last week to better protect New York residents against security breaches.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:02
πŸ•΄ Suffering SOC Saga Continues πŸ•΄

New study exposes low confidence among security professionals in their security operations centers.

πŸ“– Read

via "Dark Reading: ".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple iMessage Allows Remote Attackers to Read iPhone Messages, Images ❌

Remote exploitation can be achieved with no user interaction.

πŸ“– Read

via "Threatpost".
16:34
πŸ•΄ Apple iOS Flaw Could Give Attacker Access via iMessage πŸ•΄

Google Project Zero researchers found an iOS vulnerability that could let an attacker snoop on a victim's phone remotely.

πŸ“– Read

via "Dark Reading: ".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-18381

The installation process in Open edX before 2017-01-10 exposes a MongoDB instance to external connections with default credentials.

πŸ“– Read

via "National Vulnerability Database".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DHS Warning: Small Aircraft are Ripe for Hacking ❌

Hackers with physical access to small aircraft can easily hack the plane's CAN bus system and take control of key navigation systems.

πŸ“– Read

via "Threatpost".
18:19
πŸ•΄ New AT&T Cybersecurity Managed Threat Detection and Response service πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
20:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Container Security Is Falling Behind Container Deployments πŸ•΄

Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey.

πŸ“– Read

via "Dark Reading: ".
31 July 2019
?
07:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cyberattacks on connected cars could gridlock entire cities ⚠

It would require taking over and stranding 20% of a city's cars to freeze traffic, and only 10% to impede ambulances, physicists calculate.

πŸ“– Read

via "Naked Security".
?
08:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Keep Your Eye on Digital Certificates πŸ•΄

X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.

πŸ“– Read

via "Dark Reading: ".
?
09:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” SanDisk's SSD Dashboard uses hardcoded password, lacks encrypted updates πŸ”

Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution.

πŸ“– Read

via "Security on TechRepublic".
09:19
πŸ•΄ Best Practices πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
09:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” iOS and Android patched 440 security vulnerabilities in 2019, so far πŸ”

Android patched more CVEs than Apple did, according to a Zimperium report.

πŸ“– Read

via "Security on TechRepublic".
09:47
πŸ” Capital One is not alone: 3.5B malicious login attacks target banks and customers πŸ”

Phishing and credential stuffing attacks are top threats to financial services organizations and customers, according to Akamai.

πŸ“– Read

via "Security on TechRepublic".
?
10:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Black Hat USA 2019 Preview ❌

Threatpost editors discuss the top trends, keynotes and sessions that they look forward to at Black Hat USA and DEF CON 2019.

πŸ“– Read

via "Threatpost".
10:16
⚠ Georgia hit with malware yet again ⚠

The Department of Public Safety says it won't pay, but given the umpteen times the state's agencies have been hit, somebody's not listening.

πŸ“– Read

via "Naked Security".
?
10:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ iMessage bug could have allowed attackers to read data from any iPhone ⚠

Google's Project Zero has unveiled details of a bug in Apple's iMessage that lets attackers read data from an iPhone without any user interaction.

πŸ“– Read

via "Naked Security".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 5 experimental cybersecurity trends your business needs to know about πŸ”

These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights.

πŸ“– Read

via "Security on TechRepublic".
11:14
πŸ•΄ The Attribution Trap: A Waste of Precious Time & Money πŸ•΄



πŸ“– Read

via "Dark Reading: ".
11:14
πŸ•΄ 8 Free Tools to Be Showcased at Black Hat and DEF CON πŸ•΄

Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.

πŸ“– Read

via "Dark Reading: ".
?
11:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Trivial Bug Turns Home Security Cameras Into Listening Posts ❌

Anyone can listen to the camera's audio over the internet.

πŸ“– Read

via "Threatpost".
?
13:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Chrome 76 Dumps Default Adobe Flash Player Support ❌

In addition, Google’s latest Chrome version implements 43 new security fixes.

πŸ“– Read

via "Threatpost".
13:32
ATENTIONβ€Ό New - CVE-2018-16860

A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.

πŸ“– Read

via "National Vulnerability Database".
?
13:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€˜Urgent/11’ flaws affect 200 million devices – from routers to elevators ⚠

There are 11 security flaws affecting VxWorks: β€œthe most widely used operating system you may never have heard about”.

πŸ“– Read

via "Naked Security".
14:04
πŸ•΄ More Companies Don't Rely on Passwords Alone Anymore πŸ•΄

New research shows how enterprises are adding additional layers of authentication.

πŸ“– Read

via "Dark Reading: ".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Former Twitter CISO Launches Startup to Secure Cloud Collaboration πŸ•΄

Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing.

πŸ“– Read

via "Dark Reading: ".
?
14:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Bill Aims to Better Secure U.S. IP, Supply Chain Security πŸ”

The legislation, which cites a rash of Chinese IP theft, would develop a national strategy to prevent risks to U.S. tech.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:02
πŸ” Enterprises may be clouding up their security future πŸ”

Security is hard enough without adding multiple clouds into the mix.

πŸ“– Read

via "Security on TechRepublic".
15:09
πŸ•΄ Why the Network Is Central to IoT Security πŸ•΄

Is there something fishy about your network activity? Better make sure all of your IoT devices are under control.

πŸ“– Read

via "Dark Reading: ".
?
15:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Honda’s Security β€˜Soft Spots’ Exposed in Unsecured Database ❌

A researcher said that he found a Honda ElasticSearch database exposing 40GB of internal system and device data.

πŸ“– Read

via "Threatpost".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Apple Device Management Firm Jamf Acquires Digita Security πŸ•΄

Digita Security's Apple Mac endpoint protection solutions will join Jamf's MDM suite for iOS and MacOS.

πŸ“– Read

via "Dark Reading: ".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2007-6763

SAS Drug Development (SDD) before 32DRG02 mishandles logout actions, which allows a user (who was previously logged in) to access resources by pressing a back or forward button in a web browser.

πŸ“– Read

via "National Vulnerability Database".
?
17:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware ❌

The RIG exploit kit and Safari redirects are both in the adversaries' bag of tricks.

πŸ“– Read

via "Threatpost".
17:59
πŸ•΄ Flaws in SanDisk SSD Dashboard Present Malware & Data Loss Risks πŸ•΄

Organizations using the utility should immediately install the latest version of the software, security vendor Trustwave says.

πŸ“– Read

via "Dark Reading: ".
?
21:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Cloud Debuts New Security Capabilities πŸ•΄

Updates include Advanced Protection Program for the enterprise and general availability of password vaulted apps in Cloud Identity and G Suite.

πŸ“– Read

via "Dark Reading: ".
?
21:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-5297

An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
1 August 2019
?
07:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Five Eyes nations demand access to encrypted messaging ⚠

The alliance wants tech companies to build backdoor access to users’ encrypted data, by force if necessary.

πŸ“– Read

via "Naked Security".
?
08:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ North Carolina county falls for BEC scam, to the tune of $1,728,083 ⚠

The county could only claw back some of the $2,504,601 it paid to a scammer posing as a contractor working on building a new high school.

πŸ“– Read

via "Naked Security".
08:19
πŸ•΄ A Realistic Path Forward for Security Orchestration and Automation πŸ•΄

Security teams often look to technology to solve their security challenges. Yet sometimes investing in new products can create more issues.

πŸ“– Read

via "Dark Reading: ".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers hack camera in fake video attack ⚠

Tampering with surveillance cameras is a common activity for Hollywood heroes and criminals alike. Now, researchers have shown how they can do it in real life.

πŸ“– Read

via "Naked Security".
09:07
πŸ” Top 10 IoT security risks for businesses πŸ”

Organizations must adopt a security-by-design approach to best combat threats created by the Internet of Things, according to Deloitte.

πŸ“– Read

via "Security on TechRepublic".
?
11:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SecOps Success Through Employee Retention πŸ•΄

To keep your turnover low, focus on these areas: compensation, advancement opportunities, training, and environment.

πŸ“– Read

via "Dark Reading: ".
11:24
❌ For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software ❌

The complaint claims the networking giant knowingly sold bug-riddled software to federal and state governments, that would allow complete network compromise.

πŸ“– Read

via "Threatpost".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” On Sharing Data While Maintaining Compliance in the U.K. πŸ”

The U.K.'s data protection authority recently issued new draft guidelines to sharing data while maintaining compliance.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
12:14
❌ Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger ❌

Researchers are warning that unpatched flaws found in the Hickory Smart BlueTooth Enabled Deadbolt allow an attacker with access to a victim's phone to break into their houses.

πŸ“– Read

via "Threatpost".
12:19
❌ Brand-New SystemBC Proxy Malware Spotted Using SOCKS5 for Stealth ❌

The proxy is being distributed by the RIG and Fallout exploit kits.

πŸ“– Read

via "Threatpost".
12:22
πŸ” How to build a vulnerability response plan: 6 tips πŸ”

Cybersecurity vulnerabilities continue to increase, and automated scanners can't always detect the most critical ones, according to Bugcrowd.

πŸ“– Read

via "Security on TechRepublic".
?
13:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-10852

cPanel before 11.54.0.4 lacks ACL enforcement in the AppConfig subsystem (SEC-85).

πŸ“– Read

via "National Vulnerability Database".
13:27
ATENTIONβ€Ό New - CVE-2016-10851

cPanel before 11.54.0.4 allows self XSS in the WHM PHP Configuration editor interface (SEC-84).

πŸ“– Read

via "National Vulnerability Database".
13:27
ATENTIONβ€Ό New - CVE-2016-10850

cPanel before 11.54.0.4 allows arbitrary code execution via scripts/synccpaddonswithsqlhost (SEC-83).

πŸ“– Read

via "National Vulnerability Database".
13:27
ATENTIONβ€Ό New - CVE-2015-9291

cPanel before 11.52.0.13 does not prevent arbitrary file-read operations via get_information_for_applications (CPANEL-1221).

πŸ“– Read

via "National Vulnerability Database".
13:27
ATENTIONβ€Ό New - CVE-2015-7559

It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.

πŸ“– Read

via "National Vulnerability Database".
13:27
ATENTIONβ€Ό New - CVE-2014-8183

It was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resources. An attacker with access to the API and knowledge of the resource name can access resources in other organizations.

πŸ“– Read

via "National Vulnerability Database".
13:27
ATENTIONβ€Ό New - CVE-2013-7474

Windu CMS 2.2 allows XSS via the name parameter to admin/content/edit or admin/content/add, or the username parameter to admin/users.

πŸ“– Read

via "National Vulnerability Database".
13:27
ATENTIONβ€Ό New - CVE-2013-7473

Windu CMS 2.2 allows CSRF via admin/users/?mn=admin.message.error to add an admin account.

πŸ“– Read

via "National Vulnerability Database".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to use a Yubikey on Linux with an encrypted drive πŸ”

Looking to use a Yubikey for added security on your encrypted Linux drives? With a few quick commands, you'll enjoy that added layer of security.

πŸ“– Read

via "Security on TechRepublic".
15:14
πŸ•΄ Demystifying New FIDO Standards & Innovations πŸ•΄

Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the burden.

πŸ“– Read

via "Dark Reading: ".
15:14
πŸ•΄ Researcher Find Open 'Road Map' to Honda Computers πŸ•΄

An unprotected database, now secured, contained information on every computer owned by the automobile giant.

πŸ“– Read

via "Dark Reading: ".
15:27
ATENTIONβ€Ό New - CVE-2016-10824

cPanel before 55.9999.141 allows unauthenticated arbitrary code execution via DNS NS entry poisoning (SEC-90).

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2016-10823

cPanel before 55.9999.141 allows arbitrary code execution in the context of the root account because of MakeText interpolation (SEC-89).

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2016-10822

cPanel before 55.9999.141 allows self XSS in X3 Reseller Branding Images (SEC-88).

πŸ“– Read

via "National Vulnerability Database".
?
17:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 1M Payment Cards Exposed in South Korea Breach πŸ•΄

South Korea is the largest victim of card present data theft at a time when criminals are ramping up cyberattacks in the Asia-Pacific region.

πŸ“– Read

via "Dark Reading: ".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-10815

cPanel before 57.9999.54 allows arbitrary file-read operations for Webmail accounts via Branding APIs (SEC-120).

πŸ“– Read

via "National Vulnerability Database".
17:32
ATENTIONβ€Ό New - CVE-2016-10814

cPanel before 57.9999.54 allows demo-mode escape via show_template.stor (SEC-119).

πŸ“– Read

via "National Vulnerability Database".
17:32
ATENTIONβ€Ό New - CVE-2016-10813

cPanel before 57.9999.54 allows self XSS during ftp account creation under addon domains (SEC-118).

πŸ“– Read

via "National Vulnerability Database".
?
18:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ PCI Security Council, Retail ISAC Warn Retailers on Magecart Attacks πŸ•΄

Online card-skimming activities grew sharply this summer fueled by the availability of attack kits and other factors, Malwarebytes says.

πŸ“– Read

via "Dark Reading: ".
?
18:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DARPA to Bring its Smart Ballot Boxes to DEF CON for Hacking πŸ•΄

The agency this week will share the source code and hardware specifications for the secure voting system prototypes.

πŸ“– Read

via "Dark Reading: ".
?
19:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cisco Pays $8.6M in First False Claims Suit for Vulnerabilities in Security Product πŸ•΄

A security consultant reported vulnerabilities in Cisco's Video Surveillance Manager in 2009 - but the company ignored the issues and fired the consultant.

πŸ“– Read

via "Dark Reading: ".
?
19:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 47% of Android Anti-Malware Apps Are Flawed πŸ•΄

Protection failures come at a time when malicious Android software is becoming more of a problem.

πŸ“– Read

via "Dark Reading: ".
2 August 2019
?
08:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Every Organization Needs an Incident Response Plan πŸ•΄

OK, perhaps that's self-evident, so how come it far too often still takes an incident to trigger planning?

πŸ“– Read

via "Dark Reading: ".
?
08:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook is working on mind-reading ⚠

The completely non-evil-genius goal: a wearable, noninvasive device that could translate thoughts into text, for the speech impaired or VR.

πŸ“– Read

via "Naked Security".
08:46
⚠ Anime filter glitches, exposing face of one extremely smart vlogger ⚠

Pretending to be a hot young thing brought in beaucoup bucks. Last laugh department: "world's best granny" now has more followers than ever.

πŸ“– Read

via "Naked Security".
?
09:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Club Penguin Rewritten breach caused by rogue admin backdoor ⚠

The hugely popular gaming site Club Penguin Rewritten suffered a data breach that exposed 4m user accounts.

πŸ“– Read

via "Naked Security".
09:02
⚠ Space agency uses Raspberry Pi to solve satellite encryption puzzle ⚠

The European Space Agency thinks it's found a much cheaper way to control a small module - and it's built around a tiny Raspberry Pi Zero board.

πŸ“– Read

via "Naked Security".
?
10:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Suspends Siri Program After Privacy Backlash ❌

Apple's Siri follows Amazon Alexa and Google Home in facing backlash for its data retention policies.

πŸ“– Read

via "Threatpost".
10:53
❌ 90% of Enterprise iPhone Users Open to iMessage Spy Attack ❌

Vast majority of Apple iOS users haven't updated to iOS 12.4, leaving themselves wide open to a public exploit.

πŸ“– Read

via "Threatpost".
?
11:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat: A Summer Break from the Mundane and Uncontrollable πŸ•΄

Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.

πŸ“– Read

via "Dark Reading: ".
?
11:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-8184

A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.

πŸ“– Read

via "National Vulnerability Database".
?
11:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat: A Summer Break from the Mundane and Controllable πŸ•΄

Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.

πŸ“– Read

via "Dark Reading: ".
?
12:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 8/2 Edition πŸ”

A trio of breaches, the plight of IT budgets in the U.K., and hackers hitting school districts - catch up on the week's news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
12:21
⚠ S2 Ep2: EvilGnome, leaky browser add-ons and BlueKeep – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
?
12:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Capital One: What We Should Learn This Time πŸ•΄

Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.

πŸ“– Read

via "Dark Reading: ".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Nation-State APTs Target U.S. Utilities With Dangerous Malware ❌

Researchers spotted the never-before-seen LookBack malware being used in spearphishing campaigns against three U.S. utilities.

πŸ“– Read

via "Threatpost".
?
14:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Bug in Android Antivirus Exposes Address Books ❌

Comprehensive testing of 21 free Android antivirus apps revealed big security vulnerabilities and privacy concerns; especially for AEGISLAB, BullGuard, dfndr and VIPRE.

πŸ“– Read

via "Threatpost".
?
15:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Learn to Safeguard Critical Industrial Targets at Black Hat USA πŸ•΄

Cybersecurity experts will share their latest insights and strategies for protecting industrial sites and equipment, from electric motors to satellites.

πŸ“– Read

via "Dark Reading: ".
16:12
πŸ•΄ US Utilities Hit with Phishing Attack πŸ•΄

An email phishing attack, thought to be from a nation-state actor, claims that engineers have failed licensing exams.

πŸ“– Read

via "Dark Reading: ".
4 August 2019
?
14:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat: A Summer Break from the Mundane and Controllable πŸ•΄

Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.

πŸ“– Read

via "Dark Reading: ".
5 August 2019
?
06:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 20 stories of the week ⚠

From NAS targeted by brute force ransomware attacks to the humans who hear your Siri recordings, catch with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
08:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Do I Scan for Malicious Insiders? πŸ•΄



πŸ“– Read

via "Dark Reading: ".
08:25
πŸ•΄ How to Keep Your Web Servers Secure πŸ•΄

The good news is that Web servers have come a long way in terms of security. But to err is human, even for IT and security people.

πŸ“– Read

via "Dark Reading: ".
?
08:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Do I Scan for Malicious Insiders? πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
09:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Dark Reading News Desk Live at Black Hat USA 2019 πŸ•΄

Watch right here for more than 30 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.

πŸ“– Read

via "Dark Reading: ".
09:08
❌ MegaCortex Ransomware Revamps for Mass Distribution ❌

Manual steps have been replaced by automation.

πŸ“– Read

via "Threatpost".
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to prevent destructive malware attacks on your business: 7 tips πŸ”

Destructive attacks cost multinational companies $239 million on average, far more than the cost of a data breach, according to IBM X-Force.

πŸ“– Read

via "Security on TechRepublic".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Head-Turning Ransomware Attacks to Hit City Governments πŸ•΄

Hackers know vulnerable systems when they see them, and they also know this: Many government systems are decades old, running Windows 7 and even Windows XP.

πŸ“– Read

via "Dark Reading: ".
11:06
⚠ FileZilla fixes show how far we’ve come since Heartbleed ⚠

What have seven security fixes in FileZilla got to do with 2014's Heartbleed bug?

πŸ“– Read

via "Naked Security".
?
11:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hackers exploit SMS gateways to text millions of US numbers ⚠

Receive any strange SMS text messages recently? If you live in the US, there’s a small chance you might have received an SMS with the following text in the last few days from someone called β€˜j3ws3r on Twitter’: I’m here to warn the masses about SMS email gateways. Please look up how to disable it […]

πŸ“– Read

via "Naked Security".
11:26
⚠ Google and Apple suspend contractor access to voice recordings ⚠

Apple and Google have announced that they will limit the way audio recorded by their voice assistants, Siri and Google Assistant, are accessed internally by contractors.

πŸ“– Read

via "Naked Security".
11:35
ATENTIONβ€Ό New - CVE-2016-10774

cPanel before 60.0.25 allows self XSS in the tail_ea4_migration.cgi interface (SEC-172).

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2016-10773

cPanel before 60.0.25 allows format-string injection in exception-message handling (SEC-171).

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2016-10772

cPanel before 60.0.25 does not enforce feature-list restrictions when calling the multilang adminbin (SEC-168).

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2016-10771

cPanel before 60.0.25 allows file-create and file-chmod operations during ModSecurity Audit logfile processing (SEC-165).

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2016-10770

cPanel before 60.0.25 allows arbitrary file-overwrite operations during a Roundcube update (SEC-164).

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2016-10769

cPanel before 60.0.25 allows an open redirect via /cgi-sys/FormMail-clone.cgi (SEC-162).

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2016-10768

cPanel before 60.0.25 allows file-overwrite operations during preparation for MySQL upgrades (SEC-161).

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2016-10767

cPanel before 60.0.25 allows stored XSS in the WHM Repair Mailbox Permissions interface (SEC-159).

πŸ“– Read

via "National Vulnerability Database".
11:36
πŸ•΄ Fighting Back Against Mobile Fraudsters πŸ•΄

The first step toward identifying and preventing mobile fraud threats is acknowledging that mobile security requires a unique solution.

πŸ“– Read

via "Dark Reading: ".
?
11:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google and ARM Tackle Android Bugs with Memory-Tagging ❌

Buffer overflows, race conditions, use-after-free and more account for more than half of all vulnerabilities in the Android platform.

πŸ“– Read

via "Threatpost".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Lab Offers $300K For Working Azure Exploits ❌

Microsoft says its Azure Security Lab will allow researchers to attack its cloud environment in a customer-safe way.

πŸ“– Read

via "Threatpost".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-10766 (edx-platform)

edx-platform before 2016-06-06 allows CSRF.

πŸ“– Read

via "National Vulnerability Database".
?
14:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Puzzling Gwmndy Botnet Focuses on Low-Volume Proxy Connections ❌

After infecting Fiberhome routers, its sole purpose seems to be setting up SOCKS5 proxies.

πŸ“– Read

via "Threatpost".
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Opens Azure Security Lab, Raises Top Azure Bounty to $40K πŸ•΄

Microsoft has invited security experts to 'come and do their worst' to mimic cybercriminals in the Azure Security Lab.

πŸ“– Read

via "Dark Reading: ".
15:10
πŸ•΄ Database of 200M-Plus Potential 'Sextortion' Victims Published πŸ•΄

Researchers have discovered a botnet (and the database it feeds on) dedicated to extortion schemes.

πŸ“– Read

via "Dark Reading: ".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ E3 Website Leaks Private Addresses for Thousands of Journalists ❌

Personal data of 2,000 journalists was found publicly accessible on a spreadsheet on the website for popular trade show E3.

πŸ“– Read

via "Threatpost".
?
18:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Destructive Malware Attacks Up 200% in 2019 πŸ•΄

Organizations hit with destructive malware can lose more than 12,000 machines and face $200 million or more in costs, IBM X-Force reports.

πŸ“– Read

via "Dark Reading: ".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Used in Multimillion-Dollar Attacks Gets More Automated πŸ•΄

The authors of MegaCortex appear to have traded security for convenience and speed, say researchers at Accenture iDefense.

πŸ“– Read

via "Dark Reading: ".
6 August 2019
?
06:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mimecast Rejected Over 67 Million Emails. Here's What It Learned πŸ•΄

New research warns that security pros must guard against updates to older malware and more manipulative social-engineering techniques.

πŸ“– Read

via "Dark Reading: ".
?
08:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Securing DevOps Is About People and Culture πŸ•΄

Preconceived notions and divisions make building security into the software development life cycle an uphill battle for many organizations.

πŸ“– Read

via "Dark Reading: ".
?
09:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Attackers ransom bookseller’s exposed MongoDB database ⚠

Another database has fallen to extortion hackers, this time containing 2.1 million records belonging to Mexican bookseller, LibrerΓ­a PorrΓΊa.

πŸ“– Read

via "Naked Security".
09:21
⚠ GitHub β€˜encourages’ hacking, says lawsuit following Capital One breach ⚠

The class action charges Capital One and GitHub, charging it with being "friendly" (at least) toward hacking and for the hackers' posts.

πŸ“– Read

via "Naked Security".
09:25
πŸ•΄ Hollywood-Style Hacker Fight πŸ•΄

What movies much? Here's what happens when two hackers try to outhack each other.

πŸ“– Read

via "Dark Reading: ".
09:26
⚠ Fake Dell support rep admits to talking US colleges out of $874,000 ⚠

His victims: UCSD and a Pennsylvania university. He hid out in Kenya for nearly 8 months before being nabbed.

πŸ“– Read

via "Naked Security".
?
10:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Baldr malware unpicked with a little help from crooks’ bad opsec ⚠

New research from Sophos takes an exhaustive look at the Baldr password stealer.

πŸ“– Read

via "Naked Security".
?
11:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security & the Infinite Capacity to Rationalize πŸ•΄

To improve the security posture of our organizations, we must open our eyes to rationalization and put an end to it with logic. Here's how.

πŸ“– Read

via "Dark Reading: ".
11:31
⚠ NVIDIA patches high-severity bugs in Windows GPUs and SHIELD ⚠

NVIDIA has patched five bugs in its Windows GPU display driver, three of which could allow an attacker to execute code on the system.

πŸ“– Read

via "Naked Security".
11:35
ATENTIONβ€Ό New - CVE-2016-10782

cPanel before 60.0.25 allows self stored XSS in postgres API1 listdbs (SEC-181).

πŸ“– Read

via "National Vulnerability Database".
11:35
ATENTIONβ€Ό New - CVE-2016-10781

cPanel before 60.0.25 allows self XSS in the UI_confirm API (SEC-180).

πŸ“– Read

via "National Vulnerability Database".
11:35
πŸ•΄ Mimecast Rejected Over 67 Billion Emails. Here's What It Learned πŸ•΄

New research warns that security pros must guard against updates to older malware and more manipulative social-engineering techniques.

πŸ“– Read

via "Dark Reading: ".
11:40
ATENTIONβ€Ό New - CVE-2016-10780

cPanel before 60.0.25 allows stored XSS in the ftp_sessions API (SEC-180).

πŸ“– Read

via "National Vulnerability Database".
11:40
ATENTIONβ€Ό New - CVE-2016-10779

cPanel before 60.0.25 allows stored XSS in api1_listautoresponders (SEC-179).

πŸ“– Read

via "National Vulnerability Database".
11:40
ATENTIONβ€Ό New - CVE-2016-10778

cPanel before 60.0.25 allows self stored XSS in the listftpstable API (SEC-178).

πŸ“– Read

via "National Vulnerability Database".
11:40
ATENTIONβ€Ό New - CVE-2016-10777

cPanel before 60.0.25 allows self XSS in WHM Tweak Settings for autodiscover_host (SEC-177).

πŸ“– Read

via "National Vulnerability Database".
11:40
ATENTIONβ€Ό New - CVE-2016-10776

cPanel before 60.0.25 allows stored XSS during the homedir removal phase of WHM Account termination (SEC-174).

πŸ“– Read

via "National Vulnerability Database".
11:53
πŸ” How to prevent the top 11 threats in cloud computing πŸ”

The latest risks involved in cloud computing point to problems related to configuration and authentication rather than the traditional focus on malware and vulnerabilities, according to a new Cloud Security Alliance report.

πŸ“– Read

via "Security on TechRepublic".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Slack's new security features give enterprise admins more control over data πŸ”

Slack's Enterprise Grid product now helps admins limit which people and devices can access Slack, and how Slack can be used.

πŸ“– Read

via "Security on TechRepublic".
12:10
πŸ” What is Data Security? πŸ”

Learn about data security and the role it plays in many data protection solutions in Data Protection 101, our series on the fundamentals of data security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
12:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Millions of Android Smarphones Vulnerable to Trio of Qualcomm Bugs ❌

Flaws in Qualcomm chipset expose millions of Android devices to hacking threat.

πŸ“– Read

via "Threatpost".
12:52
❌ Mass Spoofing Campaign Takes Aim at Walmart ❌

The sites are targeting job-seekers, movie aficionados and shoppers in hopes of harvesting their personal information.

πŸ“– Read

via "Threatpost".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Issues Relationship Fraud/Confidence Scheme Warning πŸ•΄

Criminals are getting increasingly sophisticated in their efforts to commit fraud and recruit 'money mules,' according to the FBI.

πŸ“– Read

via "Dark Reading: ".
?
15:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ When Perceived Cybersecurity Risk Outweighs Reality πŸ•΄

Teams need to manage perceived risks so they can focus on fighting the real fires.

πŸ“– Read

via "Dark Reading: ".
?
16:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cryptolocking WordPress Plugin Locks Up Blog Posts ❌

A new type of malicious plugin has been spotted in the wild with the capability of targeting individual blog posts.

πŸ“– Read

via "Threatpost".
?
17:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Democrats and Doctors Behind Latest Wave of Leaked Data ❌

Patient medical history and over 6 million email addresses tied to Democrats were detailed in a misconfigured storage buckets over the past few weeks.

πŸ“– Read

via "Threatpost".
?
18:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ongoing Campaign Spoofs Walmart, Dating, Movie Sites πŸ•΄

A new investigation detects more than 540 domain names linked to the Walmart brand and camouflaged as career, dating, and entertainment websites.

πŸ“– Read

via "Dark Reading: ".
?
19:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russian Attack Group Uses Phones & Printers to Breach Corporate Networks πŸ•΄

Microsoft spotted Strontium, also known as APT28 or Fancy Bear, using IoT devices to breach businesses and seek high-value data.

πŸ“– Read

via "Dark Reading: ".
?
20:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Air Force Bug Bounty Program Nets 54 Flaws for $123,000 πŸ•΄

The Air Force brought together 50 vetted hackers to find the vulnerabilities in the latest bug-bounty program hosted by a branch of the US military.

πŸ“– Read

via "Dark Reading: ".
?
20:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Speculative Execution Vulnerability Gives CISOs a New Reason to Lose Sleep πŸ•΄

The vulnerability, dubbed SWAPGS, is an undetectable threat to data security, similar in some respects to Spectre and Meltdown.

πŸ“– Read

via "Dark Reading: ".
7 August 2019
?
07:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 6 pillars of DevSecOps your business needs to know πŸ”

Cloud security issues are growing more prevalent in the enterprise, according to the Cloud Security Alliance. Here's how to stay protected.

πŸ“– Read

via "Security on TechRepublic".
?
07:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Latest Android patches fix critical β€˜QualPwn’ Wi-Fi flaws ⚠

The August 2019 security bulletin is out - and two of the critical flaws could allow an attacker to compromise the Android system kernel.

πŸ“– Read

via "Naked Security".
08:02
⚠ Banking PINs exposed in Monzo secure storage slip-up ⚠

When is a secure PIN not a secure PIN? When you accidentally store it in your log files.

πŸ“– Read

via "Naked Security".
08:06
πŸ•΄ The Key to Enterprisewide Encryption πŸ•΄

Security teams have been slow to embrace enterprisewide encryption, and for good reasons. But the truth is, it doesn't have to be an all-or-nothing endeavor.

πŸ“– Read

via "Dark Reading: ".
?
08:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids ❌

Several serious privacy flaws in a kid's tablet were disclosed this year at Black Hat, which could allow a bad actor to track or send messages to children.

πŸ“– Read

via "Threatpost".
08:41
⚠ Don’t fall for fake Equifax settlement sites, warns FTC ⚠

Equifictitious sites popped up within days of Equifax agreeing to pay up to $700m to settle claims over the 2017 data breach.

πŸ“– Read

via "Naked Security".
?
09:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Security Vulnerabilities Are Increasingly Putting Kids at Risk ❌

A kid's tablet with security vulnerabilities is only the latest privacy faux pas in a children's connected device.

πŸ“– Read

via "Threatpost".
09:11
⚠ Scammers recruiting money mules on dating sites is on the rise, says FBI ⚠

It's not longer enough to be wary of flash-in-the-pan "lovers" who ask you to send money; now they're asking you to open accounts for them.

πŸ“– Read

via "Naked Security".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why do so many wireless routers lack basic security protections? πŸ”

Many popular routers include security flaws, but here are some tips on how to secure your wireless router, according to Consumer Reports.

πŸ“– Read

via "Security on TechRepublic".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses ❌

Researchers demonstrate a new side-channel attack that bypass mitigations against Spectre and Meltdown.

πŸ“– Read

via "Threatpost".
11:10
πŸ•΄ Rethinking Website Spoofing Mitigation πŸ•΄

Deception technology is evolving rapidly, making it easier for organizations to turn the tables on their attackers. Here's how.

πŸ“– Read

via "Dark Reading: ".
?
11:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Don’t let the crooks β€˜borrow’ your home router as a hacking server ⚠

Crooks don't have to break *into* your network to benefit - they can bounce *off* it so you take the blame and look like a hacker yourself.

πŸ“– Read

via "Naked Security".
11:28
πŸ” How the Air Force used a bug bounty program to hack its own cloud server πŸ”

The Air Force paid out $123,000 to researchers who found vulnerabilities in the organization's move to the cloud. Here's why.

πŸ“– Read

via "Security on TechRepublic".
11:33
πŸ” Businesses need to patch for BlueKeep to avoid another WannaCry πŸ”

BitSight is sounding an alarm over the potential for patching to taper off, leaving legacy systems at risk for the potentially potent vulnerability.

πŸ“– Read

via "Security on TechRepublic".
?
11:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Smominru Cryptominer Scrapes Credentials for Half-Million Machines ❌

The adversaries have retooled with EternalBlue and credential theft to add a new "access mining" revenue stream.

πŸ“– Read

via "Threatpost".
?
13:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9291 (cpanel)

cPanel before 11.52.0.13 does not prevent arbitrary file-read operations via get_information_for_applications (CPANEL-1221).

πŸ“– Read

via "National Vulnerability Database".
13:35
ATENTIONβ€Ό New - CVE-2015-5297 (pixman)

An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
?
15:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Black Hat 2019: Security’s Powerful Cultural Transformation ❌

Dino Dai Zovi, mobile security lead at Square, discusses ongoing transformation in security's role in the workplace during the keynote.

πŸ“– Read

via "Threatpost".
?
16:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says πŸ•΄

Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.

πŸ“– Read

via "Dark Reading: ".
16:55
πŸ•΄ Enterprises Must Be Wary of Ransomware Targeting Network File Shares &Cloud Assets πŸ•΄

New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.

πŸ“– Read

via "Dark Reading: ".
?
17:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights ❌

From government surveillance to domestic abuse, technology is being used in new and disturbing ways that threaten human rights - how can the security industry fight back?

πŸ“– Read

via "Threatpost".
17:48
πŸ•΄ North Korean Cyber Ops Reportedly Stole $2B to Fund Weapons Programs πŸ•΄

Unlike many nations, North Korea often engages in cyber operations to generate much-needed cash for the country's coffers. In that respect, its hackers have been extremely successful.

πŸ“– Read

via "Dark Reading: ".
?
19:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Buttigieg Campaign Adds a CISO πŸ•΄

Democratic presidential hopeful Pete Buttigieg's campaign reportedly may be the first to bring a security exec on board.

πŸ“– Read

via "Dark Reading: ".
?
20:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hacking for the Greater Good Has Never Been Easier πŸ”

Experts on a panel at Black Hat stressed Wednesday that there's never been a greater need for hackers and public interest technologists to foster a safe digital society.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
21:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Show Vulnerabilities in Facial Recognition πŸ•΄

The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
21:16
πŸ•΄ Black Hat 2019: Security Culture Is Everyone's Culture πŸ•΄

In his Black Hat USA keynote, Square's Dino Dai Zovi discussed lessons learned throughout his cybersecurity career and why culture trumps strategy.

πŸ“– Read

via "Dark Reading: ".
?
21:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks ❌

Academic researchers carry out attacks on high-end commercial devices as well as narrowband IoT sensors.

πŸ“– Read

via "Threatpost".
21:33
❌ Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack ❌

At Black Hat USA 2019, researchers showed how a previously-disclosed flaw on Windows systems that could allow arbitrary code execution could also impact Hyper-V.

πŸ“– Read

via "Threatpost".
8 August 2019
?
07:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft puts another nail in VBScript coffin ⚠

Listen up, VBScript fans: your favourite scripting language's days are numbered.

πŸ“– Read

via "Naked Security".
?
07:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door ❌

A raft of bugs in six popular models can allow a hacker to wreak havoc on a corporate network.

πŸ“– Read

via "Threatpost".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Black Hat 2019: WhatsApp Users Still Open to Message Manipulation ❌

Attack vectors disclosed last year are still fully exploitable, researchers demoed at Black Hat USA 2019.

πŸ“– Read

via "Threatpost".
09:19
⚠ S2 Ep3: Ransomware, surveillance and data theft – Naked Security Podcast ⚠

Episode 3 of the podcast is now live. This week, host Anna Brading is joined by Paul Ducklin, Mark Stockley and Ben Jones.

πŸ“– Read

via "Naked Security".
09:29
⚠ More than 2m AT&T phones illegally unlocked by bribed insiders ⚠

The alleged, now indicted ringleader paid more than $1m in bribes to insiders who planted malware and hardware for remote unlocking.

πŸ“– Read

via "Naked Security".
09:39
⚠ Twitter may have shared your data with its ad partners without your permission ⚠

Some user data, such as country and device type, was exposed to some advertisers for over a year.

πŸ“– Read

via "Naked Security".
09:51
πŸ•΄ Slow Your Roll Before Disclosing a Security Incident πŸ•΄

Transparency rules, but taking the right amount of time to figure out what happened will go a long way toward setting the record straight.

πŸ“– Read

via "Dark Reading: ".
09:54
⚠ Cisco 220 Series Smart Switch owners told to apply urgent patch ⚠

Businesses running any of Cisco’s 220 Series Smart Switches have some urgent patching work on their hands.

πŸ“– Read

via "Naked Security".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ WhatsApp Messages Can Be Intercepted, Manipulated πŸ•΄

Check Point security researchers demonstrate how a dangerous security weakness in the messaging application can be abused to spread fake news and carry out online scams.

πŸ“– Read

via "Dark Reading: ".
10:35
πŸ•΄ Enterprises Must Be Wary of Ransomware Targeting Network File Shares & Cloud Assets πŸ•΄

New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.

πŸ“– Read

via "Dark Reading: ".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Threat in the Cloud: Phishing Abuses Amazon AWS S3 Buckets ❌

An ongoing campaign is hosting its phishing landing pages on enterprise-class public cloud storage services -- a nascent trend meant to throw defenders off.

πŸ“– Read

via "Threatpost".
11:03
❌ Ransomware Sees Triple-Digit Spike in Corporate Detections ❌

A pair of reports released at Black Hat mark the huge shift away from targeting consumers.

πŸ“– Read

via "Threatpost".
11:06
πŸ•΄ Yes, FaceApp Really Could Be Sending Your Data to Russia πŸ•΄

FaceApp has an unprecedented level of access to data from 150 million users. What could its endgame be? We unpack three potential risks.

πŸ“– Read

via "Dark Reading: ".
11:07
πŸ” Russian phishing campaign using AWS to host landing pages designed to avoid detection πŸ”

Assets used as part of phishing campaigns are being hosted on AWS, with heavy XOR obfuscation to limit detection, according to a Proofpoint report.

πŸ“– Read

via "Security on TechRepublic".
11:07
πŸ” Ransomware attacks on businesses up 365% this year πŸ”

Cybercriminals are increasingly targeting businesses with ransomware instead of consumers for a bigger payout, according to Malwarebytes.

πŸ“– Read

via "Security on TechRepublic".
11:10
⚠ Update your iPhone – remote control holes revealed by researchers ⚠

You might not think your phone is as exposed as an internet server - but it's handling plenty of untrusted data from unknown sources!

πŸ“– Read

via "Naked Security".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Researchers Bypass Apple FaceID Using Biometrics β€˜Achilles Heel’ ❌

Researchers were able to bypass Apple's FaceID using a pair of glasses with tape on the lenses.

πŸ“– Read

via "Threatpost".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Huawei doesn't see open source as the fix for spying accusations (but they should) πŸ”

The closed-source, opaque operation of network equipment makes spying accusations difficult to disprove. This could be solved by opening the software stack, but Huawei CSO Andy Purdy disagrees.

πŸ“– Read

via "Security on TechRepublic".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-8184 (liblouis)

A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.

πŸ“– Read

via "National Vulnerability Database".
15:40
πŸ•΄ Siemens S7 PLCs Share Same Crypto Key Pair, Researchers Find πŸ•΄

Researchers at Black Hat USA reveal how security authentication weaknesses in popular Siemens ICS family let them control a PLC.

πŸ“– Read

via "Dark Reading: ".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical RCE Bug Found Lurking in Avaya VoIP Phones ❌

The vulnerability is a decade old with a public exploit, yet remained unpatched in one of the phone giant's most popular models.

πŸ“– Read

via "Threatpost".
17:23
❌ Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says ❌

LAS VEGAS – Supply-chain attacks have nabbed headlines lately thanks to high-profile incidents like the Wipro news last April, where attackers were able to compromise the staffing agency’s network and pivot to their customers. That incident pointed out that supply-chain risk should be thought of in a much more holistic fashion than it usually is, […]

πŸ“– Read

via "Threatpost".
?
18:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ State Farm Falls Victim to Credential-Stuffing Attack ❌

The insurance giant serves at least 83 million U.S. households.

πŸ“– Read

via "Threatpost".
?
18:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Using GDPR Subject Access Requests to Harvest Data πŸ”

In a talk at this year's Black Hat an Oxford University student explained how he used GDPR Access Requests and a Python script to steal a slew of sensitive information on another person.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
19:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Shifts Focus from Consumers to Businesses πŸ•΄

In addition, ransomware seems likely to continue its evolution in the second half of 2019.

πŸ“– Read

via "Dark Reading: ".
19:43
ATENTIONβ€Ό New - CVE-2015-9292

6kbbs 7.1 and 8.0 allows CSRF via portalchannel_ajax.php (id or code parameter) or admin.php (fileids parameter).

πŸ“– Read

via "National Vulnerability Database".
?
20:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Behavioral Data Shaped a Security Training Makeover πŸ•΄

A new program leveraged behavioral data of employees to determine when they excelled at security and where they needed improvement.

πŸ“– Read

via "Dark Reading: ".
?
20:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Equifax CISO: 'Trust Starts and Ends with You' πŸ•΄

Organizational culture is key to good enterprise security posture, Jamil Farshchi told Black Hat attendees.

πŸ“– Read

via "Dark Reading: ".
?
21:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward ❌

Apple is opening its once-private bug bounty program to all researchers, as well as boosting vulnerability payouts and expanding the product scope to include MacOS.

πŸ“– Read

via "Threatpost".
9 August 2019
?
03:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Black Hat 2019: Social media influence campaigns, ATM hacking, and big business πŸ”

TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.

πŸ“– Read

via "Security on TechRepublic".
03:07
πŸ” Black Hat 2019 trends: Social media influence campaigns, big business, ATM hacking πŸ”

TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.

πŸ“– Read

via "Security on TechRepublic".
?
07:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft's new vulnerability tracking service is about IT productivity πŸ”

With so many threats and vulnerabilities to deal with, just knowing which actions you should prioritize can be hard. The new Threat & Vulnerability Management service from Microsoft should help.

πŸ“– Read

via "Security on TechRepublic".
?
09:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Your Skype Translator calls may be heard by humans ⚠

A Skype Translator insider claims it's good because humans are listening in and helping to train its artificial intelligence.

πŸ“– Read

via "Naked Security".
?
09:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Election Security Threats: From Misinformation to Voting Machine Flaws ❌

From insecure voting machines to social media misinformation, governments have alot to think about when it comes to securing elections.

πŸ“– Read

via "Threatpost".
09:59
⚠ Parents, it’s time to delete Pet Chat from your child’s LeapPad ⚠

LeapFrog has done lots to fix the security of the LeapPad. Now all that's left is for parents to scrape Pet Chat off of older tablets.

πŸ“– Read

via "Naked Security".
10:10
⚠ Instagram boots ad partner for location tracking and scraping stories ⚠

A β€œpreferred Facebook Marketing Partner” is alleged to have tracked millions of Instagram users' locations and stories.

πŸ“– Read

via "Naked Security".
?
11:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ It's (Still) the Password, Stupid! πŸ•΄

The best way to protect your identity in cyberspace is the simplest: Use a variety of strong passwords, and never, ever, use "123456" no matter how easy it is to type.

πŸ“– Read

via "Dark Reading: ".
?
11:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Blackmailed for Bitcoin – exchange rebuffs $3.5m ransom demand ⚠

Here's a story of super-sized digital blackmail aimed at one of the biggest cryptocoin exchanges out there.

πŸ“– Read

via "Naked Security".
?
12:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why remote workers are an underrated security risk for small businesses πŸ”

Despite the risk, small businesses are largely unaware of security risks associated with remote employees, according to a Nationwide survey.

πŸ“– Read

via "Security on TechRepublic".
12:58
❌ DEF CON 2019: Researchers Demo Hacking Google Home for RCE ❌

Researchers show how they hacked Google Home smart speakers using the Megellan vulnerability.

πŸ“– Read

via "Threatpost".
?
14:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Significant Vulnerabilities Found in 6 Common Printers Brands πŸ•΄

In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.

πŸ“– Read

via "Dark Reading: ".
?
15:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Significant Vulnerabilities Found in 6 Common Printer Brands πŸ•΄

In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.

πŸ“– Read

via "Dark Reading: ".
?
16:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to automatically deny UAC elevation requests in Windows 10 πŸ”

To install an app in Windows 10, standard level users are prompted for elevated credentials. With a few tweaks, you can change that behavior to deny such requests.

πŸ“– Read

via "Security on TechRepublic".
16:20
πŸ•΄ 7 Online Safety Tips for College Students πŸ•΄

Heading back to campus soon? Here are seven tips that will get your digital house in order and keep you safe online this semester.

πŸ“– Read

via "Dark Reading: ".
?
16:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 8/9 Edition πŸ”

Twitter shares user data without permission, malware attacks are on the rise, and more - catch up on the week’s infosec news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover ❌

The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.

πŸ“– Read

via "Threatpost".
17:23
❌ Hack of High-End Hotel Smart Locks Shows IoT Security Fail ❌

LAS VEGAS – Β A vulnerability in a popular IoT lock key – used chiefly by a high-end hotel in Europe – allowed researchers to break into hotel rooms. The locks in question are dubbed β€œmobile keys” because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and […]

πŸ“– Read

via "Threatpost".
?
18:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ State Farm Reports Credential-Stuffing Attack πŸ•΄

The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.

πŸ“– Read

via "Dark Reading: ".
?
19:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Vulnerability Risk Model Promises More-Efficient Security πŸ•΄

Taking into account more factors than the current CVSS makes for a better assessment of actual danger.

πŸ“– Read

via "Dark Reading: ".
10 August 2019
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo ❌

Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.

πŸ“– Read

via "Threatpost".
?
18:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack ❌

Researchers exploit a SQLite memory corruption issue outside of a browser.

πŸ“– Read

via "Threatpost".
?
20:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster ❌

Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.

πŸ“– Read

via "Threatpost".
11 August 2019
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR ❌

Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.

πŸ“– Read

via "Threatpost".
12 August 2019
?
01:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 10 IT trends of the last 20 years πŸ”

Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how much has changed in the IT office since 2000.

πŸ“– Read

via "Security on TechRepublic".
?
06:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 23 stories of the week ⚠

This week: hijacked home routers, SMS spam and time to update your iPhone. Catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
08:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Modern-Day SOCs: People, Process & Technology πŸ•΄

As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.

πŸ“– Read

via "Dark Reading: ".
08:07
⚠ GDPR privacy can be defeated using right of access requests ⚠

A British researcher has uncovered an ironic, gaping security hole in the EU’s General Data Protection Regulation (GDPR) - right of access requests.

πŸ“– Read

via "Naked Security".
?
08:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook facial recognition: class action suit gets court’s go ahead ⚠

The court said facial recognition could well harm privacy rights, given its β€œdetailed, encyclopedic, and effortlessly compiled” biometrics collection.

πŸ“– Read

via "Naked Security".
08:52
⚠ Apple will hand out unlocked iPhones to vetted researchers ⚠

It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.

πŸ“– Read

via "Naked Security".
?
10:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ This Week in Web Application Attacks and Enterprise Threats πŸ•΄

The latest on the number of attacks, types of attacks, and threats to enterprises' most critical IT infrastructure.

πŸ“– Read

via "Dark Reading: ".
?
10:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ πŸ•΄



πŸ“– Read

via "Dark Reading: ".
10:39
πŸ•΄ Is My Development Environments at Risk? πŸ•΄

Development environments pose a few unique risks to the organization.

πŸ“– Read

via "Dark Reading: ".
10:44
πŸ•΄ Is My Development Environments at Risk? πŸ•΄

Development environments pose a few unique risks to the organization.

πŸ“– Read

via "Dark Reading: ".
?
11:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Security Considerations for Wrangling IoT πŸ•΄

The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.

πŸ“– Read

via "Dark Reading: ".
11:19
πŸ•΄ πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
11:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” The unbelievable life story of Frank Abagnale πŸ”

Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Spielberg's hit Catch Me If You Can, to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.

πŸ“– Read

via "Security on TechRepublic".
?
12:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” The unbelievable life story of Frank Abagnale πŸ”

Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Steven Spielberg's hit movie "Catch Me If You Can," to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.

πŸ“– Read

via "Security on TechRepublic".
12:08
⚠ Hacking 4G hotspots – when did you last update? ⚠

Your 4G hotspot might seem very basic and low risk compared to your phone, but you need to keep it patched just as carefully!

πŸ“– Read

via "Naked Security".
12:19
❌ Gamers Beware: Zero-Day in Steam Client Affects All Windows Users ❌

Valve said it wouldn't fix an elevation-of-privilege bug that allows attackers to run any program on a target machine with high privileges.

πŸ“– Read

via "Threatpost".
?
12:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Black Hat 2019 News Wrap: The Best and Worst of the Show ❌

Threatpost breaks down the highs and lows from Black Hat 2019, from new vulnerabilities and industry collaboration to a scandal around a sponsored session.

πŸ“– Read

via "Threatpost".
?
13:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9306

The wp-ultimate-csv-importer plugin before 3.8.1 for WordPress has XSS.

πŸ“– Read

via "National Vulnerability Database".
13:28
ATENTIONβ€Ό New - CVE-2015-9305

The wp-google-map-plugin plugin before 2.3.7 for WordPress has XSS related to the add_query_arg() and remove_query_arg() functions.

πŸ“– Read

via "National Vulnerability Database".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tips for Successful Zero-Trust Implementation ❌

"Never trust, always verify" is a solid security concept -- but it's important to realize that putting it into practice can be complex.

πŸ“– Read

via "Threatpost".
14:36
πŸ” Apple Opens Bug Bounty Program to All, Changes Payout Structure πŸ”

At Black Hat, the head of Apple’s Security Engineering team announced new enhancements to its bug bounty program, including one vulnerability that could fetch a researcher $1M.

πŸ“– Read

via "Subscriber Blog RSS Feed ".