27 September 2019
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hybrid cloud setup offers relief to some companies while others are still fearful πŸ”

TechRepublic's Karen Roby discusses the findings of a recent FileCloud study concerning enterprise cloud and data issues.

πŸ“– Read

via "Security on TechRepublic".
10:17
⚠ Apple users, patch now! The β€˜bug that got away’ has been fixed ⚠

Apple has now patched the patch that Google said didn't patch the hole it was supposed to.

πŸ“– Read

via "Naked Security".
10:22
⚠ β€˜Fleeceware’ Play store apps quietly charging up to $250 ⚠

SophosLabs researchers discovered at least 15 apps with millions of downloads charging extraordinary prices right under the Google's nose.

πŸ“– Read

via "Naked Security".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Is Your Organization Suffering from Security Tool Sprawl? πŸ•΄

Most companies have too many tools, causing increased costs and security issues.

πŸ“– Read

via "Dark Reading: ".
?
11:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-10396 (epic)

The epic theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to includes/download.php.

πŸ“– Read

via "National Vulnerability Database".
11:38
πŸ•΄ DoorDash Breach Affects 4.9M Merchants, Customers, Workers πŸ•΄

The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.

πŸ“– Read

via "Dark Reading: ".
11:49
❌ Microsoft Blacklists Dozens of New File Extensions in Outlook ❌

In total, Microsoft has now blocked 142 file extensions that it deems as at risk or that are typically sent as malicious attachments in emails.

πŸ“– Read

via "Threatpost".
11:49
❌ Arcane Stealer V Takes Aim at the Low End of the Dark Web ❌

This data-harvesting tool is perfect for the deep well of low-skilled adversaries looking to make their cybercrime mark.

πŸ“– Read

via "Threatpost".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Dunkin’ Donuts Gets Hit with Lawsuit Over 2015 Attack ❌

Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.

πŸ“– Read

via "Threatpost".
?
14:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 9/27 Edition πŸ”

Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
14:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Certification in the Spotlight Again πŸ•΄

Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.

πŸ“– Read

via "Dark Reading: ".
14:34
❌ Masad Spyware Uses Telegram Bots for Command-and-Control ❌

The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.

πŸ“– Read

via "Threatpost".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Apple Patches Multiple Vulnerabilities Across Platforms πŸ•΄

Updates address two separate issues in Apple's desktop and mobile operating systems.

πŸ“– Read

via "Dark Reading: ".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ iOS Exploit β€˜Checkm8’ Could Allow Permanent iPhone Jailbreaks ❌

A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.

πŸ“– Read

via "Threatpost".
?
16:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cloud Vulnerability Could Let One Server Compromise Thousands πŸ•΄

A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.

πŸ“– Read

via "Dark Reading: ".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to install and use the Cryptomator encryption tool πŸ”

Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.

πŸ“– Read

via "Security on TechRepublic".
17:34
πŸ” How to install and use the Cryptomator encryption tool πŸ”

Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.

πŸ“– Read

via "Security on TechRepublic".
17:34
πŸ” Why smart home devices may be an open invitation to hackers πŸ”

Recent breaches in Americans smart home systems have raised the level of concern with IoT devices.

πŸ“– Read

via "Security on TechRepublic".
28 September 2019
?
09:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Etiquette of Respecting Privacy in the Age of IoT πŸ•΄

Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years -- the descendants of Emily Post herself.

πŸ“– Read

via "Dark Reading: ".
?
10:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Best Practices πŸ•΄



πŸ“– Read

via "Dark Reading: ".
30 September 2019
?
06:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 24 stories of the week ⚠

From the fleeceware apps ripping off consumers to Microsoft's emergency IE patch - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
07:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Is the era of social media Likes over? ⚠

Instagram's testing a program to hide the Likes that have created a toxic cyberbullying environment. Now, Facebook is as well.

πŸ“– Read

via "Naked Security".
?
08:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Outlook on the web bans a further 38 file types ⚠

Outlook on the web bans a further 38 file types

πŸ“– Read

via "Naked Security".
?
09:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Most Fortune 500 companies still opaque about security measures πŸ”

A Bitglass survey said 52% of the world's most profitable companies do not have any language on their websites about how they protect the data of customers.

πŸ“– Read

via "Security on TechRepublic".
?
10:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Social media manipulation as a political tool is spreading ⚠

Researchers say 'cyber troops' in 70 countries are using it to automate suppression, mount smear campaigns, or spread disinformation.

πŸ“– Read

via "Naked Security".
10:13
πŸ•΄ 8 Microsegmentation Pitfalls to Avoid πŸ•΄

Don't fall victim to these common mistakes on the path to developing better security boundaries and limiting the blast radius of security incidents.

πŸ“– Read

via "Dark Reading: ".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Harvesting Attacks' & the Quantum Revolution πŸ•΄

Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now.

πŸ“– Read

via "Dark Reading: ".
?
11:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Exim Flaw Opens Servers to Remote Code Execution ❌

A fix has been issued for a critical Exim flaw that could lead to servers crashing or remote code execution attacks being launched.

πŸ“– Read

via "Threatpost".
?
12:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Checkm8 jailbreak and AltStore put cracks in Apple’s walled garden ⚠

People are taking different tacks to get around Apple's tightly controlled phone rules.

πŸ“– Read

via "Naked Security".
12:13
πŸ•΄ 218M Words with Friends Players Compromised in Data Breach πŸ•΄

The same attacker was reportedly behind the Collection #1 and Collection #2 data dumps earlier this year.

πŸ“– Read

via "Dark Reading: ".
?
12:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Senate Passes Bill Aimed At Combating Ransomware Attacks ❌

New legislation has been approved by the U.S. senate aimed at protecting local cities and schools from ransomware attacks.

πŸ“– Read

via "Threatpost".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Bug Found in NSA’s Ghidra Tool ❌

Flaw in National Security Agency's Ghidra reverse-engineering tools allows hackers to execute code in vulnerable systems.

πŸ“– Read

via "Threatpost".
?
15:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Battery Manufacturer Alleges Scientist Took Trade Secrets to China πŸ”

In a new lawsuit, a U.S. based battery company is alleging one of its former employees brazenly took its trade secrets and infringed its patents.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Baltimore Reportedly Had No Data Backup Process for Many Systems πŸ•΄

City lost key data in a ransomware attack earlier this year that's already cost more than $18.2 million in recovery and related expenses.

πŸ“– Read

via "Dark Reading: ".
?
17:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to avoid the dreaded Google Calendar malicious invite issue πŸ”

Watch out for suspicious Google Calendar invites and learn how to prevent them from making their way to your calendar.

πŸ“– Read

via "Security on TechRepublic".
?
18:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Announces Ability to Force TLS Version Compliance πŸ•΄

Transport Layer Security (TLS) can be critical for security, but it must be deployed in a current version. Microsoft now provides a mechanism for administrators to guarantee the right version in their network.

πŸ“– Read

via "Dark Reading: ".
1 October 2019
?
05:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Private-Mail Review πŸ•΅


πŸ“– Read

via "VPNpro".
?
06:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Darknet hosting provider busted in underground NATO bunker ⚠

Police overcame not only digital defenses of the "bulletproof" provider CyberBunker but also barbed wire fences and surveillance cams.

πŸ“– Read

via "Naked Security".
?
07:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ China’s 500 megapixel camera is capable of mega-facial-recognition ⚠

The 'super camera' can identifying people dozens of meters away using facial recognition.

πŸ“– Read

via "Naked Security".
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Malvertising Attack Hijacks 1B+ Sessions With Webkit Exploit ❌

The eGobbler threat actor is back with a new malvertising campaign that has hijacked more than 1 billion sessions.

πŸ“– Read

via "Threatpost".
08:40
⚠ Hacking 2020 voting systems is a β€˜piece of cake’ ⚠

That's how Senator Wyden described the results of DefCon's Voting Village, where all of 100 voting systems were easily picked apart by hackers.

πŸ“– Read

via "Naked Security".
?
09:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Targeted Cybercrime On a Tear πŸ•΄

CrowdStrike threat hunting data shows major increase in targeted financially motivated attacks in the first six months of 2019.

πŸ“– Read

via "Dark Reading: ".
09:13
πŸ•΄ 5 Disruptive Trends Transforming Cybersecurity πŸ•΄

Everything about IT has changed, but our security measures are still built around how we used to design software and systems. Where does security need to catch up with digital transformation...and how?

πŸ“– Read

via "Dark Reading: ".
?
09:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Best Practices πŸ•΄



πŸ“– Read

via "Dark Reading: ".
10:06
πŸ” Why military minds should fill cybersecurity seats on corporate boards πŸ”

A cybersecurity expert with the US Navy believes military personnel understand operational risk and should be appointed to corporate boards.

πŸ“– Read

via "Security on TechRepublic".
10:06
πŸ” Why military minds should fill cybersecurity seats on corporate boards πŸ”

A cybersecurity expert with the US Navy believes military personnel understand operational risk and should be appointed to corporate boards.

πŸ“– Read

via "Security on TechRepublic".
10:10
⚠ Cloudflare adds VPN features to 1.1.1.1 privacy app ⚠

As promised in April, Cloudflare has finally launched Warp, a consumer mobile privacy app that looks a lot like a VPN without actually being one.

πŸ“– Read

via "Naked Security".
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ AIOps: The State of Full Packet Capture Enters the Age of Practicality πŸ•΄

How machine learning and artificial intelligence are changing the game of acting on large volumes of network data in near real time.

πŸ“– Read

via "Dark Reading: ".
?
12:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Play Malicious Apps Racked Up 335M+ Installs in September ❌

A total of 172 malicious apps were detected on Google Play in September, with more than 330 million installations.

πŸ“– Read

via "Threatpost".
?
12:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Focus on More Disruptive Ransomware Infections πŸ•΄

Details from a campaign tracked over the past five months shows how cybercriminals are continuing to refine their strategies and attempting to adjust to victims' resolve to not pay ransoms.

πŸ“– Read

via "Dark Reading: ".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Europe 2019 Debuts First Sessions & Offers Early Reg Discount πŸ•΄

You can now register to attend Black Hat Europe at a discounted rate but move quickly: the early bird discount period ends this Friday, October 4th!

πŸ“– Read

via "Dark Reading: ".
13:43
πŸ•΄ Cost of Data Breach Hits $1.4M, Security Budgets Near $19M πŸ•΄

Researchers report businesses with an internal SOC suffer half the average financial damage.

πŸ“– Read

via "Dark Reading: ".
13:48
πŸ” Data breaches now cost companies an average of $1.41 million πŸ”

IT security budgets now average $18.9 million, up from $8.9 million, with savings credited to internal cybersecurity, according to new Kaspersky report.

πŸ“– Read

via "Security on TechRepublic".
?
14:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hackers Turn to OpenDocument Format to Avoid AV Detection ❌

Malware laced OpenDocument files target Microsoft Office, OpenOffice and LibreOffice users.

πŸ“– Read

via "Threatpost".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Navigating Your First Month as a New CISO πŸ•΄

The single most important thing you can do is to start building the relationships and political capital you'll need to run your security program. Here's how.

πŸ“– Read

via "Dark Reading: ".
15:23
πŸ•΄ 'Father of Identity Theft' Convicted on 13 Federal Counts πŸ•΄

James Jackson, a 58-year-old Memphis resident, used the identities of deceased individuals to steal money from banks and the estates of the dead.

πŸ“– Read

via "Dark Reading: ".
?
15:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to Find and Retain Skilled Cybersecurity Talent πŸ”

To kickoff this year’s National Cybersecurity Awareness Month we asked our VP of Cybersecurity what organizations can do to find and retain skilled cybersecurity talent.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware Attacks Leave U.S. Hospitals Turning Away Patients ❌

Ransomware attacks have crippled hospitals worldwide, forcing them to turn away patients and cancel surgeries.

πŸ“– Read

via "Threatpost".
?
17:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Malware Campaign Targets US Petroleum Companies πŸ•΄

Attackers are using an obfuscated version of Adwind Remote Access Trojan for stealing data, Netskope says.

πŸ“– Read

via "Dark Reading: ".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 tips to prevent ransomware πŸ”

Ransomware continues to present a real cybersecurity threat. Tom Merritt offers five ways you can prevent it from affecting your business.

πŸ“– Read

via "Security on TechRepublic".
17:43
πŸ” Top 5 tips to prevent ransomware πŸ”

Ransomware continues to present a real cybersecurity threat. Tom Merritt offers five ways you can prevent it from affecting your business.

πŸ“– Read

via "Security on TechRepublic".
?
18:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cisco Webex & Zoom Bug Lets Attackers Spy on Conference Calls πŸ•΄

The "Prying-Eye" vulnerability could let intruders scan for unprotected meeting IDs and snoop on conference calls.

πŸ“– Read

via "Dark Reading: ".
18:36
πŸ›  tcpdump 4.9.3 πŸ› 

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
18:36
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.10 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
18:36
πŸ›  Haveged 1.9.8 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
2 October 2019
?
07:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hack Breaks PDF Encryption, Opens Content to Attackers ❌

PDFex can bypass encryption and password protection in most PDF readers and online validation services

πŸ“– Read

via "Threatpost".
07:41
πŸ” Two enterprise-worthy password managers: LastPass and RoboForm πŸ”

Everyone in your company needs a password manager -- and there are lots of great options. But two cross-platform tools rise above the rest, thanks to their excellent support for enterprise networks.

πŸ“– Read

via "Security on TechRepublic".
07:46
⚠ Yahoo engineer pleads guilty to hacking 6,000 women’s accounts ⚠

Reyes Daniel Ruiz went after younger women's accounts, including those of his personal friends and work colleagues, he admitted.

πŸ“– Read

via "Naked Security".
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Google: Most people still have terrible password habits πŸ”

Celebrate Cybersecurity Awareness Month by turning on two-factor authentication and replacing your "fido123" password.

πŸ“– Read

via "Security on TechRepublic".
?
09:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ReliaQuest Acquires Threatcare πŸ•΄

Attack simulation tool will be integrated into ReliaQuest's GreyMatter platform.

πŸ“– Read

via "Dark Reading: ".
09:13
πŸ•΄ The Inestimable Values of an Attacker's Mindset & Alex Trebek πŸ•΄

Akamai security architect Marc Pardee tells the story of cutting his security teeth as an NSA intern and why all cybersecurity professionals can benefit from learning how to break things.

πŸ“– Read

via "Dark Reading: ".
09:16
πŸ” Nearly 60% of businesses suffered a data breach in the past 3 years πŸ”

Some 36% of companies who haven't suffered a breach said it is likely they are unknowingly experiencing one now.

πŸ“– Read

via "Security on TechRepublic".
09:25
⚠ 218 million Words With Friends players lose data to hackers ⚠

The serial hacker GnosticPlayers is claiming to have ransacked Zynga's user data - including names, emails and passwords.

πŸ“– Read

via "Naked Security".
09:34
⚠ O.MG! Evil Lightning cable about to hit mass distribution ⚠

This malicious O.MG Lightning cable has come a long way, with extensive work on the kinds of payload it can deliver.

πŸ“– Read

via "Naked Security".
09:34
⚠ Exim suffers another β€˜critical’ remote code execution flaw ⚠

This latest Exim flaw could lead to at least a denial of service crash in the software but also the possibility of remote code execution.

πŸ“– Read

via "Naked Security".
09:43
πŸ•΄ Slide Show πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Controlling Data Leakage in Cloud Test-Dev Environments πŸ•΄

The focus on digital transformation and compressing development release cycles is appealing, but that means security can be left behind. How should security practitioners address this challenge?

πŸ“– Read

via "Dark Reading: ".
?
11:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” MasterMana Botnet targets business users with sophisticated phishing attacks πŸ”

A new botnet known as MasterMana shows a high level of sophistication with a low cost to execute, according a report from cybersecurity firm Prevailion.

πŸ“– Read

via "Security on TechRepublic".
11:58
❌ Google Adds Password Checkup Feature to Chrome Browser ❌

Google's new password checkup tool joins other similar services including Have I Been Pwned and Mozilla's Firefox Monitor.

πŸ“– Read

via "Threatpost".
12:06
πŸ” Yahoo porn hacking breach shows need for better security: 5 ways to protect your company πŸ”

This week, a former Yahoo employee pleaded guilty to hacking into the email accounts of more than 6,000 users, looking for porn. Companies need to protect themselves from similar security breaches. Here's what to do.

πŸ“– Read

via "Security on TechRepublic".
?
12:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to quickly deploy a honeypot with Kali Linux πŸ”

Lure possible attackers into a trap with a Kali Linux honeypot.

πŸ“– Read

via "Security on TechRepublic".
12:46
πŸ” How to quickly deploy a honeypot with Kali Linux πŸ”

Lure possible attackers into a trap with a Kali Linux honeypot.

πŸ“– Read

via "Security on TechRepublic".
?
13:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Private Are You? πŸ•΄

Think twice before posting about ... grits.

πŸ“– Read

via "Dark Reading: ".
?
13:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ MasterMana Botnet Shows Trouble Comes at Low Cost πŸ•΄

For less than $200, attackers were able to infect thousands of systems, stealing user credentials, cryptocurrency wallets, and web histories, an analysis finds.

πŸ“– Read

via "Dark Reading: ".
13:49
❌ Virus Bulletin 2019: Japanese Attacks Highlight Savvy APT Strategy ❌

Multiyear campaigns stretching back to at least 2014 have been seen using zero-days in region-specific software.

πŸ“– Read

via "Threatpost".
?
14:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google's 'Password Checkup' Tool Tells You When Passwords Are Leaked πŸ•΄

The feature will check the strength of saved passwords and alert users when they're compromised in a breach.

πŸ“– Read

via "Dark Reading: ".
14:28
❌ Virus Bulletin 2019: Geost Android Botnet Goes After Millions of Euros ❌

Bad OpSec led to the botnet's discovery -- revealing 800,000 victims in Russia.

πŸ“– Read

via "Threatpost".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Quantum-Safe Cryptography: The Time to Prepare Is Now πŸ•΄

Quantum computing is real and it's evolving fast. Is the security industry up to the challenge?

πŸ“– Read

via "Dark Reading: ".
?
15:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Employee Accessed, Abused Customer Data at American Express πŸ”

An employee - since terminated - at the financial services corporation is being investigated for fraud after accessing and stealing cardholder data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Why This New Cybergang is Heralding a New Age For BEC ❌

Cybergang Silent Starling is taking BEC to the next level by targeting suppliers and going after their customers.

πŸ“– Read

via "Threatpost".
?
17:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Silent Starling Attack Group Puts Spin on BEC πŸ•΄

The West African cybergang has successfully infiltrated more than 500 companies using a tactic dubbed 'vendor email compromise.'

πŸ“– Read

via "Dark Reading: ".
17:28
πŸ•΄ Millions More Embedded Devices Contain Vulnerable IPnet Software πŸ•΄

FDA, DHS issue fresh warnings on easily exploitable URGENT/11 flaws in medical, SCADA systems, industrial controllers, and other devices.

πŸ“– Read

via "Dark Reading: ".
17:32
πŸ›  PDFGrab 0.4.4 πŸ› 

pdfgrab is a python script that analyzes pdf files to extract their metadata. You can direct it to analyze a single file, a directory of pdfs, provide it a url, or have it leverage googlesearch to get pdfs at a target site.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
17:32
πŸ›  Clam AntiVirus Toolkit 0.102.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
17:35
ATENTIONβ€Ό New - CVE-2019-10212

A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.

πŸ“– Read

via "National Vulnerability Database".
?
17:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zendesk Exposes 10,000 Accounts to Unknown Third Party ❌

Zendesk says access occurred in 2016 and that only a small percentage of customers were impacted.

πŸ“– Read

via "Threatpost".
?
18:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Stalkware on the Rise Globally πŸ•΄

Stalkware is being installed on more and more victims' devices, and the trend is only accelerating, according to a new report.

πŸ“– Read

via "Dark Reading: ".
3 October 2019
?
07:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware attacks paralyze, and sometimes crush, hospitals ⚠

New attacks on the perennially besieged sector have crippled hospitals in the US and Australia and caused one health clinic to shut down.

πŸ“– Read

via "Naked Security".
?
08:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How the City of Angels Is Tackling Cyber Devilry πŸ•΄

A new mobile app makes a cybersecurity threat lab available to more small businesses in Los Angeles.

πŸ“– Read

via "Dark Reading: ".
?
09:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google’s Password Manager now checks for breached credentials ⚠

Google has taken the next step in its strategy to secure users' passwords. The search giant has taken a password-checking feature released in February as an extension to its Chrome browser and embedded it directly into its password manager service.

πŸ“– Read

via "Naked Security".
09:13
πŸ•΄ Cartoon Contest: Second Wind πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
09:20
⚠ PDF encryption standard weaknesses uncovered ⚠

Researchers have discovered weaknesses in PDF encryption which could be exploited to reveal the plaintext contents of a file to an attacker.

πŸ“– Read

via "Naked Security".
09:25
⚠ No federal privacy law will make it in the US this year, sources say ⚠

Without one, the companies that collect our data will likely face compliance with California's take-no-prisoners law, in effect 1 January 2020.

πŸ“– Read

via "Naked Security".
?
10:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WhatsApp Flaw Opens Android Devices to Remote Code Execution ❌

A double-free bug could allow an attacker to achieve remote code execution; users are encouraged to update to a patched version of the messaging app.

πŸ“– Read

via "Threatpost".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How FISMA Requirements Relate to Firmware Security πŸ•΄

Federal guidelines can help all organizations pragmatically and meaningfully improve their firmware security.

πŸ“– Read

via "Dark Reading: ".
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 20M Russians' Personal Tax Records Exposed in Data Leak πŸ•΄

An unprotected Elasticsearch cluster contained personally identifiable information on Russian citizens from 2009 to 2016.

πŸ“– Read

via "Dark Reading: ".
?
13:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Foxit PDF Reader Vulnerable to 8 High-Severity Flaws ❌

Eight high-severity vulnerabilities exist in the Foxit Reader tool for editing PDF files.

πŸ“– Read

via "Threatpost".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Black Hat 2019: Monitoring network operations and managing digital risks πŸ”

Black Hat's Network Operations team members discuss looking for the "bad within the bad." Also, RSA's CTO talks about managing risks to prevent an individual problem from becoming a societal problem.

πŸ“– Read

via "Security on TechRepublic".
14:46
πŸ” How to protect your organization against insider threats πŸ”

Whether intentionally or unintentionally, employees can pose a significant security risk to company data, according to a new report from data protection firm Code42.

πŸ“– Read

via "Security on TechRepublic".
14:57
πŸ” California Privacy Rights and Enforcement Act Would Further Reign in Data Privacy πŸ”

On top of the forthcoming California Consumer Privacy Act, a new ballot initiative seeks to tamp down data privacy even further in the state.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:08
πŸ•΄ Common Pitfalls of Security Monitoring πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
15:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Black Hat 2019: Monitoring network operations and managing digital risks πŸ”

Black Hat's Network Operations team members discuss looking for the "bad within the bad." Also, RSA's CTO talks about managing risks to prevent an individual problem from becoming a societal problem.

πŸ“– Read

via "Security on TechRepublic".
15:32
ATENTIONβ€Ό New - CVE-2018-16452

The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-16451

The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-16301

libpcap, as used in tcpdump before 4.9.3, has a buffer overflow and/or over-read.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-16300

The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-16230

The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-16229

The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-16228

The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-16227

The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14882

The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14881

The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14880

The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14879

The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14470

The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14469

The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14468

The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14467

The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14466

The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14465

The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14464

The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2018-14463

The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print().

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2018-14462

The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2018-14462

The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2018-14461

The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2018-10105

tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).

πŸ“– Read

via "National Vulnerability Database".
15:35
ATENTIONβ€Ό New - CVE-2018-10103

tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).

πŸ“– Read

via "National Vulnerability Database".
15:48
πŸ•΄ American Express Insider Breaches Security πŸ•΄

The ex-employee accessed cardholder personal information in an apparent attempt to commit fraud.

πŸ“– Read

via "Dark Reading: ".
15:58
πŸ•΄ American Express Insider Breaches Cardholder Information πŸ•΄

The ex-employee accessed names, Social Security numbers, card numbers, and more in an attempt to commit fraud.

πŸ“– Read

via "Dark Reading: ".
?
17:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Link Magecart Group 4 to Cobalt Group πŸ•΄

Their findings demonstrate how Group 4 is likely conducting server-side skimming in addition to client-side activity.

πŸ“– Read

via "Dark Reading: ".
?
18:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create and export a GPG keypair on macOS πŸ”

Find out how to create and export a GPG keypair from the macOS command line.

πŸ“– Read

via "Security on TechRepublic".
18:06
πŸ” How to create and export a GPG keypair on macOS πŸ”

Find out how to create and export a GPG keypair from the macOS command line.

πŸ“– Read

via "Security on TechRepublic".
?
18:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Facebook Patches Critical WhatsApp Security Flaw πŸ•΄

Bug gives attackers a way to use GIF images to steal data from Android devices running the message app.

πŸ“– Read

via "Dark Reading: ".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Reductor Malware Hijacks HTTPS Traffic ❌

Dubbed Reductor, this malware can manipulate HTTPS traffic by tweaking a browser’s random numbers generator.

πŸ“– Read

via "Threatpost".
4 October 2019
?
06:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Virus Bulletin 2019: Magecart Infestations Saturate the Web ❌

There are dozens of known groups, hundreds of C2 servers and millions of victim websites.

πŸ“– Read

via "Threatpost".
?
07:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google brings Incognito mode to Maps ⚠

It's good, but also a perfect opportunity for us to remember that Incognito mode doesn't translate to "I'm invisible!"

πŸ“– Read

via "Naked Security".
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hacker’s parents sentenced for selling his cryptocurrency ⚠

"You misguidedly tried to help your son" by moving his cryptocurrency, but it "didn't help him at all," a judge said.

πŸ“– Read

via "Naked Security".
?
08:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ AG Barr, Officials to Facebook: Don’t Encrypt Messaging ❌

Officials say they are concerned about their ability to fight crime and protect citizens, while privacy advocates remain critical of government interference

πŸ“– Read

via "Threatpost".
08:19
πŸ•΄ Time to Put This 'Toon to Bed πŸ•΄

The winning captions for September's cartoon contest are nothing to yawn about.

πŸ“– Read

via "Dark Reading: ".
?
08:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ £3 billion Safari iPhone privacy lawsuit given go-ahead ⚠

A UK class action lawsuit against Google, that represents around 5 million iPhone users, can go ahead, according to the UK Court of Appeal.

πŸ“– Read

via "Naked Security".
?
09:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WhatsApp vulnerability could compromise Android smartphones ⚠

A researcher has released details of a WhatsApp flaw that could be used to compromise the app and the mobile device the app is running on.

πŸ“– Read

via "Naked Security".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Ways Businesses Unknowingly Help Hackers πŸ•΄

From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.

πŸ“– Read

via "Dark Reading: ".
?
10:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep11: Fleeceware, Chrome bug and the sextortion scam that won’t die – Naked Security Podcast ⚠

Listen to the latest episode of our podcast now.

πŸ“– Read

via "Naked Security".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybercrime: AI's Growing Threat πŸ•΄

Cyberecurity incidents expected to rise by nearly 70% and cost $5 trillion annually by 2024.

πŸ“– Read

via "Dark Reading: ".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Buying a new laptop? Here’s how to secure it ⚠

Getting the basics right gives you a lot of protection. Here's how.

πŸ“– Read

via "Naked Security".
11:40
❌ Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier ❌

An attacker whose motives are unclear compromised an Asterisk server in a highly targeted campaign.

πŸ“– Read

via "Threatpost".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Best VPN for Hong Kong in 2019 πŸ•΅


πŸ“– Read

via "VPNpro".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Complex Environments Cause Schools to Struggle for Passing Security Grade πŸ•΄

As ransomware attacks surge against school systems, an analysis of 1,200 K-12 institutions in North America shows complex environments and conflicting security controls.

πŸ“– Read

via "Dark Reading: ".
?
12:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Android 0-Day Seen Exploited in the Wild πŸ•΄

The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices.

πŸ“– Read

via "Dark Reading: ".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Warns of Android Zero-Day Bug Under Active Attack ❌

Flaw impacts 18 Android models including Google’s flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi.

πŸ“– Read

via "Threatpost".
13:25
πŸ” Friday Five: 10/4 Edition πŸ”

News on new vulnerabilities - both in the PDF format and a network protocol, and why fighting cyber crime is a focal point of the U.S. Secret Service.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
14:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-11768

In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.

πŸ“– Read

via "National Vulnerability Database".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Investigates Mobile Voting Intrusion πŸ•΄

A group tried to access West Virginia's mobile voting app in 2018; now, the FBI is looking into what actually happened.

πŸ“– Read

via "Dark Reading: ".
?
16:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage' πŸ•΄

In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?

πŸ“– Read

via "Dark Reading: ".
?
18:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Iran Caught Targeting US Presidential Campaign Accounts πŸ•΄

Microsoft detected the so-called Phosphorus nation-state gang attacking 241 user accounts associated with a US presidential campaign, current and former US government officials, journalists, others.

πŸ“– Read

via "Dark Reading: ".
5 October 2019
?
11:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  WhatWeb Scanner 0.5.0 πŸ› 

WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
11:55
πŸ›  Zeek 3.0.0 (Formerly Known As Bro) πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
7 October 2019
?
07:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 22 stories of the week ⚠

From the hacker's folks who whisked away his stolen crypto to the O.MG! evil lightning cable - and all the top security stories in between.

πŸ“– Read

via "Naked Security".
?
07:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Wi-Fi signals let researchers ID people through walls from their gait ⚠

Police could set up transceivers outside a building and compare spectrograms of suspects walking vs. crime scene footage.

πŸ“– Read

via "Naked Security".
?
08:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Social media platforms can be forced to delete illegal content worldwide ⚠

The EU's top court ruled that platforms like Facebook can be ordered to proactively seek out and delete all copies of illegal content.

πŸ“– Read

via "Naked Security".
?
08:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook urged by governments to halt end-to-end encryption plans ⚠

The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.

πŸ“– Read

via "Naked Security".
08:44
⚠ Android devices hit by zero-day exploit Google thought it had patched ⚠

Android smartphones have recently become vulnerable to a zero-day vulnerability that Google thought it had patched for good two years ago.

πŸ“– Read

via "Naked Security".
?
09:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says ❌

A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign.

πŸ“– Read

via "Threatpost".
?
11:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 10 Steps to Assess SOC Maturity in SMBs πŸ•΄

Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.

πŸ“– Read

via "Dark Reading: ".
?
12:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Shifting allegiances of hackers causing confusion for defense efforts πŸ”

According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.

πŸ“– Read

via "Security on TechRepublic".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Nevada's New Consumer Privacy Law Goes Into Effect πŸ”

Nevada's new privacy law requires websites to post a privacy notice and allow consumers to opt out of the sale of their personal data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Alabama Hospitals Pay Up in Ransomware Attack ❌

A trio of Alabama hospitals have decided to pay for a decryption key.

πŸ“– Read

via "Threatpost".
?
14:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 things to know about the splinternet πŸ”

As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.

πŸ“– Read

via "Security on TechRepublic".
14:02
πŸ” Top 5 things to know about the splinternet πŸ”

As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.

πŸ“– Read

via "Security on TechRepublic".
?
15:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Magecart Skimmers Spotted on 2M Websites πŸ•΄

Researchers say supply chain attacks are responsible for the most significant spikes in Magecart detections.

πŸ“– Read

via "Dark Reading: ".
15:22
❌ D-Link Home Routers Open to Remote Takeover Will Remain Unpatched ❌

CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.

πŸ“– Read

via "Threatpost".
?
16:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Active Directory Security Tips for Your Poor, Neglected AD πŸ•΄

The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.

πŸ“– Read

via "Dark Reading: ".
?
17:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybercriminals using gifs to corrupt Drupal sites πŸ”

Hackers are taking advantage of vulnerabilities in the Drupal CMS platform by using malicious code disguised as gifs.

πŸ“– Read

via "Security on TechRepublic".
17:26
πŸ•΄ Best Practices πŸ•΄



πŸ“– Read

via "Dark Reading: ".
17:37
❌ Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks ❌

Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps.

πŸ“– Read

via "Threatpost".
17:37
❌ California Bans Deepfakes in Elections, Porn ❌

A pair of laws provides recourse for victims of deepfake technology.

πŸ“– Read

via "Threatpost".
?
18:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Drupalgeddon2 Vulnerability Still Endangering CMSes πŸ•΄

A new wave of attacks has been discovered on Drupal-based content management systems that weren't patched for the older flaw.

πŸ“– Read

via "Dark Reading: ".
?
19:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Lack of Role Models, Burnout & Pay Disparity Hold Women Back πŸ•΄

New ISACA data emphasizes a gap between men and women who share their opinions on underrepresentation of women and equal pay in the tech industry.

πŸ“– Read

via "Dark Reading: ".
8 October 2019
?
06:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook’s Libra cryptocurrency dealt blow by PayPal’s departure ⚠

PayPal abruptly announced that it was leaving the Libra Association.

πŸ“– Read

via "Naked Security".
?
07:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Nationwide facial recognition ID program underway in France ⚠

It's coming next month, in spite of a lawsuit and the data regulator's protests about lack of consent, data security and privacy.

πŸ“– Read

via "Naked Security".
?
08:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ GPS tracker from stalked woman’s car led to indictment of 20 mobsters ⚠

Girlfriend found it, girlfriend popped it onto a city bus, gadget got found, multiyear investigation got launched, 20 got indicted.

πŸ“– Read

via "Naked Security".
08:29
⚠ Signal immediately fixed FaceTime-style eavesdropping bug ⚠

Remember the FaceTime bug that allowed a caller to eavesdrop on your phone? Researchers just discovered another - this time in Signal.

πŸ“– Read

via "Naked Security".
?
09:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Iranian Cyberattack on US Presidential Campaign Could Be a Sign of Things to Come πŸ•΄

Political parties and election systems will be heavily targeted in the months leading up to the 2020 general elections, some security experts say.

πŸ“– Read

via "Dark Reading: ".
?
09:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ APT Groups Exploiting Flaws in Unpatched VPNs, Officials Warn ❌

U.S. and U.K. agencies warn consumers to update technologies from Fortinet, Pulse Secure and Palo Alto Networks to mitigate attacks that are likely coming from China

πŸ“– Read

via "Threatpost".
?
10:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9456

The orbisius-child-theme-creator plugin before 1.2.8 for WordPress has incorrect access control for file modification via the wp-admin/admin-ajax.php?action=orbisius_ctc_theme_editor_ajax&sub_cmd=save_file theme_1, theme_1_file, or theme_1_file_contents parameter.

πŸ“– Read

via "National Vulnerability Database".
10:49
ATENTIONβ€Ό New - CVE-2015-9455

The buddypress-activity-plus plugin before 1.6.2 for WordPress has CSRF with resultant directory traversal via the wp-admin/admin-ajax.php bpfb_photos[] parameter in a bpfb_remove_temp_images action.

πŸ“– Read

via "National Vulnerability Database".
10:49
ATENTIONβ€Ό New - CVE-2015-9454

The smooth-slider plugin before 2.7 for WordPress has SQL Injection via the wp-admin/admin.php?page=smooth-slider-admin current_slider_id parameter.

πŸ“– Read

via "National Vulnerability Database".
10:49
ATENTIONβ€Ό New - CVE-2015-9453

The broken-link-manager plugin before 0.6.0 for WordPress has XSS via the HTTP Referer or User-Agent header to a URL that does not exist.

πŸ“– Read

via "National Vulnerability Database".
10:49
ATENTIONβ€Ό New - CVE-2015-9452

The nex-forms-express-wp-form-builder plugin before 4.6.1 for WordPress has SQL injection via the wp-admin/admin.php?page=nex-forms-main nex_forms_Id parameter.

πŸ“– Read

via "National Vulnerability Database".
10:49
ATENTIONβ€Ό New - CVE-2015-9451

The plugmatter-optin-feature-box-lite plugin before 2.0.14 for WordPress has SQL injection via the wp-admin/admin-ajax.php?action=pmfb_mailchimp pmfb_tid parameter.

πŸ“– Read

via "National Vulnerability Database".
10:49
ATENTIONβ€Ό New - CVE-2015-9450

The plugmatter-optin-feature-box-lite plugin before 2.0.14 for WordPress has SQL injection via the wp-admin/admin-ajax.php?action=pmfb_cc pmfb_tid parameter.

πŸ“– Read

via "National Vulnerability Database".
?
11:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Beyond the Horde: The Uptick in Targeted Attacks (And How to Fight Back) πŸ•΄

We're seeing a dramatic rise in targeted attacks, but following these guidelines can help your enterprise stay safe.

πŸ“– Read

via "Dark Reading: ".
11:17
πŸ” How to build curl with SFTP support πŸ”

The curl package can be build to include SFTP support. Find out how easy this is to do.

πŸ“– Read

via "Security on TechRepublic".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cyberattacks are increasing, but AV and intrusion detection software are asleep at the wheel πŸ”

Over three quarters of US businesses have faced cyberattacks in the past 12 months, with 86% of US firms experiencing attacks feeling let down by their antivirus.

πŸ“– Read

via "Security on TechRepublic".
?
12:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 74% of global workers say the tech industry needs more regulation πŸ”

The majority of workers worldwide think the tech industry needs more regulation, but the US in particular is falling behind.

πŸ“– Read

via "Security on TechRepublic".
12:32
πŸ” Robocalls annually scam one in 10 Americans, to a loss of $9.5 billion πŸ”

Computerized auto dialers deliver pre-recorded phone calls with 60 billion expected in 2019 alone. Here's how to handle robocalls.

πŸ“– Read

via "Security on TechRepublic".
12:46
πŸ•΄ 7 Considerations Before Adopting Security Standards πŸ•΄

Here's what to think through as you prepare your organization for standards compliance.

πŸ“– Read

via "Dark Reading: ".
?
13:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google October Android Security Update Fixes Critical RCE Flaws ❌

Google's October security update fixed several critical and high-severity vulnerabilities.

πŸ“– Read

via "Threatpost".
13:32
πŸ” How to build a better cybersecurity defense with deception technologies πŸ”

This new cybersecurity defense mechanism proactively protects organizations and prevents attacks.

πŸ“– Read

via "Security on TechRepublic".
13:32
πŸ” How MIT researchers use machine learning to detect IP hijackings before it occurs πŸ”

The goal is to predict incidents in advance by tracing it back to the actual hijackers.

πŸ“– Read

via "Security on TechRepublic".
13:32
πŸ” More companies use multi-factor authentication, but security still weak from poor password habits πŸ”

Users still have to juggle far too many passwords, which leads to password sharing, reuse, and other bad habits, according to a new report from password manager LastPass.

πŸ“– Read

via "Security on TechRepublic".
13:36
πŸ•΄ Business Email Compromise Attacks Spike 269% πŸ•΄

A new Mimecast report finds a significant uptick in BEC attacks, malware attachments, and spam landing in target inboxes.

πŸ“– Read

via "Dark Reading: ".
?
14:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Only 1 in 5 enterprises have DMARC records set up with an enforcement policy πŸ”

More companies than ever are adopting new email security methods, like DMARC, but few actually put them to full use.

πŸ“– Read

via "Security on TechRepublic".
?
15:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sextortionists Get Past Defenses with Cryptocurrency Shift ❌

A new campaign is evading secure email gateways that rely on identifying word patterns in order to filter out spam.

πŸ“– Read

via "Threatpost".
15:16
πŸ•΄ For Cybersecurity to Be Proactive, Terrains Must Be Mapped πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Breach at New Zealand Medical Center Could Impact One Million Patients πŸ”

A cyber attack on the company's website in August prompted an investigation that uncovered additional attacks dating back to 2016.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Most US Presidential Campaign Websites Offer Little Privacy Protection πŸ•΄

New audit finds that privacy policies on 70% of the sites have no limits on data sharing.

πŸ“– Read

via "Dark Reading: ".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Tackles Over a Dozen Bugs in its Catalina 10.15 Update ❌

Apple released fixes for Catalina and patches for iCloud and iTunes for Windows software.

πŸ“– Read

via "Threatpost".
?
16:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” UT Austin launches first ever healthcare cybersecurity leadership program in the US πŸ”

With the shortage of cybersecurity professionals in the US, UT's program aims to develop individuals who can mitigate security risks in healthcare.

πŸ“– Read

via "Security on TechRepublic".
17:02
❌ Critical Microsoft Remote Desktop Flaw Fixed in Security Update ❌

Microsoft has released fixes for nine critical and 49 important vulnerabilities as part of Patch Tuesday.

πŸ“– Read

via "Threatpost".
?
17:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Can the Girl Scouts Save the Moon from Cyberattack? πŸ•΄

The Girl Scouts Cyber Challenge event, later this month, pledges to give middle and high-school girls a realistic, and fun, look at cybersecurity careers.

πŸ“– Read

via "Dark Reading: ".
17:46
πŸ›  Faraday 3.9.2 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
18:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intimate Details on Healthcare Workers Exposed as Cloud Security Lags ❌

Ponemon survey data shows that only a third of IT staff say they take a security-first approach to data storage in the cloud.

πŸ“– Read

via "Threatpost".
18:16
πŸ•΄ NSA Issues Advisory on VPN Vulnerability Trio πŸ•΄

Vulnerabilities with Pulse Secure, Fortinet, and Palo Alto Networks VPNs are called out in the advisory.

πŸ“– Read

via "Dark Reading: ".
?
18:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Utilities' Operational Networks Continue to Be Vulnerable πŸ•΄

More than half of utilities have suffered an outage or data loss in the last 12 months, but only a minority of organizations seem ready for an attack that could affect operations, a survey finds.

πŸ“– Read

via "Dark Reading: ".
18:36
πŸ•΄ Microsoft Issues 9 Critical Security Patches πŸ•΄

None of the total 59 patches were for previously known vulnerabilities nor are any under active attack, Microsoft reports.

πŸ“– Read

via "Dark Reading: ".
9 October 2019
?
07:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ TOMS hacker tells people to log off and enjoy a screenless day ⚠

TOMS seems like a really nice shoe company, and it just got hacked in a really nice way. But it's still a hack.

πŸ“– Read

via "Naked Security".
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Copy-and-paste sharing on Stack Overflow spreads insecure code ⚠

It’s the time-saving technique employed by many coders - copy and paste code from crowd-sourcing 'Q&A' websites. But is it always secure?

πŸ“– Read

via "Naked Security".
?
08:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Deepfakes have doubled, overwhelmingly targeting women ⚠

Deepfake tech has push-button apps and service portals. Can code commodification do the same for detection, so women can actually afford it?

πŸ“– Read

via "Naked Security".
08:27
❌ Twitter Uses Phone Numbers, Emails to Sell Ads ❌

Data collected for two-factor authentication purposes β€œinadvertently” matched users to targeted-advertising lists, the company admits.

πŸ“– Read

via "Threatpost".
?
09:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ October Patch Tuesday: Microsoft fixes critical remote desktop bug ⚠

Microsoft fixed 59 vulnerabilities in October's Patch Tuesday, including several critical remote code execution (RCE) flaws.

πŸ“– Read

via "Naked Security".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How the Software-Defined Perimeter Is Redefining Access Control πŸ•΄

In a world where traditional network boundaries no longer exist, VPNs are showing their age.

πŸ“– Read

via "Dark Reading: ".
11:21
πŸ›  OpenSSH 8.1p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
12:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 70% of business report Pass the Hash attacks directly impact operational costs πŸ”

Ignorance surrounding Pass the Hash attacks puts the majority of businesses at risk of compromised credentials.

πŸ“– Read

via "Security on TechRepublic".
12:42
❌ Privacy Groups: Ring’s Police Partnerships Can Lead to Sinister Ends ❌

Increasing concerns over unauthorized surveillance, integration with facial recognition and more are plaguing the doorbell-video camera company.

πŸ“– Read

via "Threatpost".
?
13:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Twitter Slip-Up Spills MFA Phone Numbers, Emails to Advertisers πŸ•΄

Email addresses and phone numbers provided to secure user accounts were accidentally shared with marketers.

πŸ“– Read

via "Dark Reading: ".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Financial industry spending millions to deal with breaches in 2019 πŸ”

A new study says financial services organizations experienced an average of 10 attacks a year and spent an average of $1.3 million to restore services after each DNS attack.

πŸ“– Read

via "Security on TechRepublic".
15:06
πŸ•΄ A Realistic Threat Model for the Masses πŸ•΄

For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here's why.

πŸ“– Read

via "Dark Reading: ".
?
15:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Tech Industry Group Urges EU to Reconsider ePrivacy πŸ”

A European tech organization is encouraging the European Commission to reconsider its proposal for ePrivacy Regulation, a proposal that's set to regulate cookie usage.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:57
❌ Most Americans Fail Cybersecurity Quiz ❌

Study participants fail to correctly identify core security concepts and tools to help them stay safe online.

πŸ“– Read

via "Threatpost".
16:11
πŸ•΄ USB Drive Security Still Lags πŸ•΄

While USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use.

πŸ“– Read

via "Dark Reading: ".
16:12
❌ Gamers Warned of High-Severity Intel, Nvidia Flaws ❌

The Intel NUC and Nvidia Shield both are vulnerable to high-severity flaws, Intel and Nvidia warned in dual advisories.

πŸ“– Read

via "Threatpost".
?
17:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Tool Sprawl Reaches Tipping Point πŸ•΄

How a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs.

πŸ“– Read

via "Dark Reading: ".
?
18:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Virginia a Hot Spot For Cybersecurity Jobs πŸ•΄

State has highest number of people in information security roles and the most current job openings, Comparitech study finds.

πŸ“– Read

via "Dark Reading: ".
?
22:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2017-2679

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:26
ATENTIONβ€Ό New - CVE-2017-2678

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:26
ATENTIONβ€Ό New - CVE-2017-2677

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:26
ATENTIONβ€Ό New - CVE-2017-2676

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
10 October 2019
?
07:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Job seekers are scrubbing clean their social media accounts ⚠

Most people nowadays are quite aware that hiring managers put their social media postings under a microscope, a new survey finds.

πŸ“– Read

via "Naked Security".
?
08:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ California outlaws facial recognition in police bodycams ⚠

The bill was introduced by Phil Ting: one of 26 state lawmakers misidentified as suspects in an ACLU test of the technology.

πŸ“– Read

via "Naked Security".
08:53
⚠ Twitter used 2FA phone numbers for targeted advertising ⚠

Twitter may have β€œinadvertently” handed phone and email data from some users to advertisers as part of its Tailored Audiences system that targets users’ feeds with ads.

πŸ“– Read

via "Naked Security".
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple iTunes Bug Actively Exploited in BitPaymer/iEncrypt Campaign ❌

Attackers exploit an β€œunquoted path” flaw in the Bonjour updater in iTunes for Windows to deliver ransomware attacks.

πŸ“– Read

via "Threatpost".
10:17
πŸ•΅ NordVPN completes independent app security audit πŸ•΅


πŸ“– Read

via "VPNpro".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Network Security Must Transition into the Cloud Era πŸ•΄

An integrated approach is the best way to provide organizations with the tools they need to decrease the attack surface and use strong security controls.

πŸ“– Read

via "Dark Reading: ".
11:04
❌ HP Touchpoint Analytics Opens PCs to Code Execution Attack ❌

The vulnerability stems from an issue with DLL loading in Open Source Hardware, used by tens of millions of computers, researchers say.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ China’s Sway Over Tech Companies Tested with Apple, Blizzard ❌

Apple has been called out by Chinese state-run media as protecting β€œrioters,” while Blizzard bans a Hearthstone player for supporting Hong Kong.

πŸ“– Read

via "Threatpost".
?
12:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  GRR 3.3.0.8 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Magecart Attack on Volusion Highlights Supply Chain Dangers πŸ•΄

Attackers compromised Volusion's Google Cloud environment to load malicious skimmer code onto more than 6,500 customer sites.

πŸ“– Read

via "Dark Reading: ".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Hide Behind Trusted Domains, HTTPS πŸ•΄

One in four malicious URLs employed a legitimate domain, making it more difficult for potential victims to spot possible dangers, a mid-year report finds.

πŸ“– Read

via "Dark Reading: ".
13:59
❌ Sophisticated Spy Kit Targets Russians with Rare GSM Plugin ❌

The Attor malware targets government and diplomatic victims with unusual tactics.

πŸ“– Read

via "Threatpost".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” McAfee, IBM join forces for global open source cybersecurity initiative πŸ”

IBM, McAfee and international consortium OASIS are coming together to offer the world a way to develop open source security technologies.

πŸ“– Read

via "Security on TechRepublic".
14:32
πŸ” IRS Employee Stole PII, Committed Fraud πŸ”

The case illustrates that the government agency could be doing a better job safeguarding tax payer data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
14:37
πŸ•΄ Check Out New Cybersecurity Tools in the Black Hat Europe Arsenal πŸ•΄

Black Hat Europe returns to the Excel in London December 2-5 bearing a cornucopia of intriguing cybersecurity tools in its Arsenal.

πŸ“– Read

via "Dark Reading: ".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Think Like a Hacker πŸ•΄

In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated.

πŸ“– Read

via "Dark Reading: ".
?
15:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9479

The ACF-Frontend-Display plugin through 2015-07-03 for WordPress has arbitrary file upload via an action=upload request to js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9478

prettyPhoto before 3.1.6 has js/jquery.prettyPhoto.js XSS.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9477

The Vernissage theme 1.2.8 for WordPress has insufficient restrictions on option updates.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9476

The Teardrop theme 1.8.1 for WordPress has insufficient restrictions on option updates.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9475

The Pont theme 1.5 for WordPress has insufficient restrictions on option updates.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9474

The Simpolio theme 1.3.2 for WordPress has insufficient restrictions on option updates.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9473

The estrutura-basica theme through 2015-09-13 for WordPress has directory traversal via the scripts/download.php arquivo parameter.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9472

The incoming-links plugin before 0.9.10b for WordPress has referrers.php XSS via the Referer HTTP header.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9471

The dzs-zoomsounds plugin through 2.0 for WordPress has admin/upload.php arbitrary file upload.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9470

The history-collection plugin through 1.1.1 for WordPress has directory traversal via the download.php var parameter.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9469

The content-grabber plugin 1.0 for WordPress has XSS via obj_field_name or obj_field_id.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9468

The broken-link-manager plugin 0.4.5 for WordPress has XSS via the page parameter in a delURL action.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9467

The broken-link-manager plugin before 0.5.0 for WordPress has wpslDelURL or wpslEditURL SQL injection via the url parameter.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9466

The wti-like-post plugin before 1.4.3 for WordPress has WtiLikePostProcessVote SQL injection via the HTTP_CLIENT_IP, HTTP_X_FORWARDED_FOR, HTTP_X_FORWARDED, HTTP_FORWARDED_FOR, or HTTP_FORWARDED variable.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9465

The yet-another-stars-rating plugin before 0.9.1 for WordPress has yasr_get_multi_set_values_and_field SQL injection via the set_id parameter.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9464

The s3bubble-amazon-s3-html-5-video-with-adverts plugin 0.7 for WordPress has directory traversal via the adverts/assets/plugins/ultimate/content/downloader.php path parameter.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9463

The s3bubble-amazon-s3-audio-streaming plugin 2.0 for WordPress has directory traversal via the adverts/assets/plugins/ultimate/content/downloader.php path parameter.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9462

The awesome-filterable-portfolio plugin before 1.9 for WordPress has afp_get_new_category_page SQL injection via the cat_id parameter.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9461

The awesome-filterable-portfolio plugin before 1.9 for WordPress has afp_get_new_portfolio_item_page SQL injection via the item_id parameter.

πŸ“– Read

via "National Vulnerability Database".
15:31
ATENTIONβ€Ό New - CVE-2015-9460

The booking-system plugin before 2.1 for WordPress has DOPBSPBackEndTranslation::display SQL injection via the language parameter.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2015-9459

The searchterms-tagging-2 plugin through 1.535 for WordPress has XSS via the wp-admin/options-general.php count parameter.

πŸ“– Read

via "National Vulnerability Database".
15:36
ATENTIONβ€Ό New - CVE-2015-9459

The searchterms-tagging-2 plugin through 1.535 for WordPress has XSS via the wp-admin/options-general.php count parameter.

πŸ“– Read

via "National Vulnerability Database".
15:36
ATENTIONβ€Ό New - CVE-2015-9458

The searchterms-tagging-2 plugin through 1.535 for WordPress has SQL injection via the pk_stt2_db_get_popular_terms count parameter exploitable via CSRF.

πŸ“– Read

via "National Vulnerability Database".
15:36
ATENTIONβ€Ό New - CVE-2015-9457

The pretty-link plugin before 1.6.8 for WordPress has PrliLinksController::list_links SQL injection via the group parameter.

πŸ“– Read

via "National Vulnerability Database".
?
15:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Works of Art: Cybersecurity Inspires 6 Winning Ideas πŸ•΄

The Center for Long Term Cybersecurity recently awarded grants to six artists in a contest to come up with ideas for works with security themes and elements. Check 'em out.

πŸ“– Read

via "Dark Reading: ".
15:57
πŸ•΄ Akamai Snaps Up ChameleonX to Tackle Magecart πŸ•΄

The Israel-based ChameleonX aims to protect websites from cyberattacks targeting payment data.

πŸ“– Read

via "Dark Reading: ".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cryptomining Crook Steals Game Developer’s Identity to Carry Out Dirty Work ❌

An alleged fraudster built a vast web of AWS cloud accounts, becoming the platform's biggest consumer of data resources.

πŸ“– Read

via "Threatpost".
17:44
❌ vBulletin Flaw Exploited in Dutch Sex-Work Forum Breach ❌

A hacker is selling the email addresses of 250,000 users of a Dutch sex-work forum -- data that researchers say could be used for blackmail.

πŸ“– Read

via "Threatpost".
?
18:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Imperva Details Response to Customer Database Exposure πŸ•΄

The cloud security's CEO and CTO lay out the timeline of events and the steps customers should take to protect their accounts.

πŸ“– Read

via "Dark Reading: ".
?
18:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ AppSec 'Spaghetti on the Wall' Tool Strategy Undermining Security πŸ•΄



πŸ“– Read

via "Dark Reading: ".
18:57
πŸ•΄ iTunes Zero-Day Exploited to Deliver BitPaymer πŸ•΄

The ransomware operators targeted an "unquoted path" vulnerability in iTunes for Windows to evade detection and install BitPaymer.

πŸ“– Read

via "Dark Reading: ".
11 October 2019
?
07:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple removes app that tracks Hong Kong police and protestors ⚠

Apple was under fire this week after banning an app that tracked the location of both police and protesters in Hong Kong on a live map.

πŸ“– Read

via "Naked Security".
?
08:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook flags thousands of kids as interested in gambling, booze ⚠

According to a new report, its algorithmic labelling may expose minors to age-inappropriate, targeted advertising.

πŸ“– Read

via "Naked Security".
08:18
⚠ Hackers bypassing some types of 2FA security FBI warns ⚠

Some types of 2FA security can no longer be guaranteed to keep the bad guys out, the FBI warned US companies.

πŸ“– Read

via "Naked Security".
08:28
⚠ Most Americans don’t have a clue what https:// means ⚠

...and wouldn't know 2FA from a hole in the ground, according to Pew Research.

πŸ“– Read

via "Naked Security".
?
09:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-5340

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/ with the parameter password is non-persistent in 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
09:36
ATENTIONβ€Ό New - CVE-2010-5339

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/basic/ with the parameter _dlg[captcha][uid] is non-persistent in 10.1.3 and 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
09:36
ATENTIONβ€Ό New - CVE-2010-5338

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/basic/ with the parameter _dlg[captcha][action] is non-persistent in 10.1.3 and 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
09:36
ATENTIONβ€Ό New - CVE-2010-5337

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/basic/ with the parameter _dlg[captcha][controller] is non-persistent in 10.1.3 and 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
09:36
ATENTIONβ€Ό New - CVE-2010-5336

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: admin/login.html with the parameter username is persistent in 10.2.0.

πŸ“– Read

via "National Vulnerability Database".
09:36
ATENTIONβ€Ό New - CVE-2010-5335

IceWarp Webclient before 10.2.1 has a directory traversal vulnerability. This can result in loss of confidential data of IceWarp Mailserver and the operating system. Input passed via a certain parameter (script to basic/minimizer/index.php) is not properly sanitised and can therefore be exploited to browse the partition where IceWarp is installed (or the whole system) and read arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
09:36
ATENTIONβ€Ό New - CVE-2010-5334

IceWarp Webclient before 10.2.1 has a directory traversal vulnerability. This can result in loss of confidential data of IceWarp Mailserver and the operating system. Input passed via a certain parameter (_c to basic/index.html) is not properly sanitised and can therefore be exploited to browse the partition where IceWarp is installed (or the whole system) and read arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
09:44
❌ Iran-Linked β€˜Charming Kitten’ Touts New Spearphishing Tactics ❌

A campaign first observed last year has ramped up its attack methods and appears to be linked to activity targeting President Trump’s 2020 re-election campaign.

πŸ“– Read

via "Threatpost".
?
11:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Close the Gap Between Cyber-Risk and Business Risk πŸ•΄

Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.

πŸ“– Read

via "Dark Reading: ".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Creative Wi-Fi Passwords πŸ•΄

Let's see a hacker figure out one of these.

πŸ“– Read

via "Dark Reading: ".
?
13:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S2 Ep12: Dark Web, O.MG Cable spying and securing new laptops – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
13:07
πŸ•΄ Build Your Cybersecurity Toolkit at Black Hat Europe in December πŸ•΄

Now's the time to start planning what to see and do at Black Hat Europe, which is jam-packed with relevant Briefings and Arsenal demos.

πŸ“– Read

via "Dark Reading: ".
13:08
πŸ” How to enable SSH session recording in CentOS 8 πŸ”

Learn how to enable SSH session recording in CentOS 8.

πŸ“– Read

via "Security on TechRepublic".
13:08
πŸ” How to enable SSH session recording in CentOS 8 πŸ”

Learn how to enable SSH session recording in CentOS 8.

πŸ“– Read

via "Security on TechRepublic".
13:12
πŸ” Friday Five: 10/11 Edition πŸ”

News on a new military cyber alert system, Twitter mishandles user data, and what to do with data if there's a no-deal Brexit. Catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Fin7 Cybergang Retools With New Malicious Code ❌

A new dropper and payload show that Fin7 isn't going anywhere despite a crackdown on the infamous group by law enforcement in 2018.

πŸ“– Read

via "Threatpost".
?
15:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Murderers' Row of Poisoning Attacks πŸ•΄

Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning and other attacks work can help you prepare the proper antidote.

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ•΄ Works of Art: Cybersecurity Inspires 6 Winning Ideas πŸ•΄

The Center for Long Term Cybersecurity recently awarded grants to six artists in a contest to come up with ideas for works with security themes and elements. Check 'em out.

πŸ“– Read

via "Dark Reading: ".
15:54
❌ Imperva: Data Breach Caused by Cloud Misconfiguration ❌

Hackers were able to steal an AWS administrative API key housed in a compute instance left exposed to the public internet.

πŸ“– Read

via "Threatpost".
15:57
πŸ•΄ Of Interest πŸ•΄



πŸ“– Read

via "Dark Reading: ".
15:57
πŸ•΄ FBI: Phishing Can Defeat Two-Factor Authentication πŸ•΄

A recent Privacy Industry Notification points to two new hacker tools that can turn a victim's browser into a credential-stealing zombie.

πŸ“– Read

via "Dark Reading: ".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” SafeBreach catches vulnerability in controversial HP Touchpoint Analytics software πŸ”

After being notified on July 4, HP waited four months before releasing a security advisory.

πŸ“– Read

via "Security on TechRepublic".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Software, Supply-Chain Dangers Top List of 5G Cyber Risks ❌

Without naming Huawei, the EU warns on state-backed 5G suppliers.

πŸ“– Read

via "Threatpost".
17:42
πŸ•΄ 7 SMB Security Tips That Will Keep Your Company Safe πŸ•΄

With National Cybersecurity Awareness Month as a backdrop, industry leaders weigh in on how SMBs can more effectively protect themselves from cyberattacks.

πŸ“– Read

via "Dark Reading: ".
?
18:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Click2Mail Suffers Data Breach πŸ•΄

Mail provider discovered customer data being used in spam messages.

πŸ“– Read

via "Dark Reading: ".
14 October 2019
?
06:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 20 stories of the week ⚠

From hackers bypassing 2FA to an Android zero day Google thought it had fixed - get yourself up to date with everything we've written in the last seven days. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
08:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Can I Get More Mileage From My Existing Security Tools? πŸ•΄

Some points to consider before you break open your wallet.

πŸ“– Read

via "Dark Reading: ".
08:34
⚠ Hacker asking $300 for 250,000 records stolen from sex worker site ⚠

In spite of prostitution being legal in the Netherlands, this could lead to the same type of blackmail attempts/suicide from Ashley Madison.

πŸ“– Read

via "Naked Security".
?
08:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Computing enthusiast cracks ancient Unix code ⚠

Old passwords never die... they just become easier to decode.

πŸ“– Read

via "Naked Security".
?
09:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Soldering spy chips inside firewalls is now a cheap hack, shows researcher ⚠

The tiny ATtiny85 chip doesn’t look like the next big cyberthreat facing the world, but sneaking one on to a firewall motherboard would be bad news for security were it to happen.

πŸ“– Read

via "Naked Security".
?
09:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Shares Some Browsing History with Chinese Company ❌

The company acknowledged it’s using β€˜safe browsing’ technology from Tencent, which has ties to the Chinese government.

πŸ“– Read

via "Threatpost".
09:24
⚠ Stalker found pop star by searching eyes’ reflections on Google Maps ⚠

A man confessed to stalking and attacking a young pop star by zooming in on the reflections in her eyes from selfies.

πŸ“– Read

via "Naked Security".
?
10:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” FBI urges businesses to use biometric factors to mitigate multi-factor authentication risk πŸ”

The FBI Cyber Task Force recently issued a Private Industry Notice on how businesses can deal with vulnerabilities tied to token and phone-based multi-factor authentication methods.

πŸ“– Read

via "Security on TechRepublic".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Connected Cybercrime Ecosystem & the Impact of the Capital One Breach πŸ•΄

A company's security battle is not between that company and a specific fraudster; rather, it's between the company and connected cybercriminal ecosystem.

πŸ“– Read

via "Dark Reading: ".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Draft Regulations for CCPA Released πŸ”

The California Attorney General's Office finally released draft regulations around the CCPA last week, outlining the requirements of businesses and consumers

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ When Using Cloud, Paranoia Can Pay Off πŸ•΄

Journalists are increasingly concerned about what cloud providers may access or share with governments - and companies should worry as well.

πŸ“– Read

via "Dark Reading: ".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Tamper Protection Arrives for Microsoft Defender ATP πŸ•΄

The feature, designed to block unauthorized changes to security features, is now generally available.

πŸ“– Read

via "Dark Reading: ".
?
18:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Pitney Bowes Hit by Ransomware πŸ•΄

The attack does not appear to have endangered customer data, but it has had an impact on orders for supplies and postage refills.

πŸ“– Read

via "Dark Reading: ".
18:29
πŸ•΄ Cyber Theft, Humint Helped China Cut Corners on Passenger Jet πŸ•΄

Beijing likely saved a lot of time and billions of dollars by copying components for its C919 plane from others, a new report from CrowdStrike says.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Sophos for Sale: Thoma Bravo Offers $3.9B πŸ•΄

Sophos' board of directors plans to unanimously recommend the offer to the company's shareholders.

πŸ“– Read

via "Dark Reading: ".
15 October 2019
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ 350+ hackers hunt down missing people in first such hackathon ⚠

Organizers said 100 leads were generated every 10 minutes by contestants using OSINT - open-source intelligence such as online searches.

πŸ“– Read

via "Naked Security".
07:49
⚠ Apple says Tencent isn’t snooping on your browsing habits ⚠

Apple was quick to allay user concerns this weekend after someone spotted that it was working with Chinese company Tencent to check its users' website requests for malicious URLs.

πŸ“– Read

via "Naked Security".
?
09:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook’s Libra cryptocurrency loses all but one payment company ⚠

Gone: Mastercard, Visa, PayPal, eBay, Stripe, Mercado Pago. Of six payments firms first involved in Libra, just one, PayU, remains.

πŸ“– Read

via "Naked Security".
09:07
❌ A Deepfake Deep Dive into the Murky World of Digital Imitation ❌

Deepfake technology is becoming easier to create – and that’s opening the door for a new wave of malicious threats, from revenge porn to social-media misinformation.

πŸ“– Read

via "Threatpost".
09:09
⚠ Update now! Windows users targeted by iTunes Software Updater zero-day ⚠

The flaw is a rare β€˜unquoted path class’ described as "so thoroughly documented that you would expect programmers to be well aware..." But that's not the case.

πŸ“– Read

via "Naked Security".
09:12
❌ Pitney Bowes Hit with Ransomware Attack ❌

The attack left customers unable to access key services for shipping and mailing, the company said.

πŸ“– Read

via "Threatpost".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to disable Facebook location tracking πŸ”

If your privacy is more important than Facebook knowing exactly where you are at all times, you might want to disable location tracking.

πŸ“– Read

via "Security on TechRepublic".
12:11
πŸ” How to secure your Apple Card πŸ”

Learn how to secure and protect your Apple Card, both the virtual card and the physical one.

πŸ“– Read

via "Security on TechRepublic".
12:11
πŸ” How to disable Facebook location tracking πŸ”

If your privacy is more important than Facebook knowing exactly where you are at all times, you might want to disable location tracking.

πŸ“– Read

via "Security on TechRepublic".
12:24
πŸ•΄ Why Bricking Vulnerable IoT Devices Comes with Unintended Consequences πŸ•΄



πŸ“– Read

via "Dark Reading: ".
12:34
πŸ•΄ 14 Hot Cybersecurity Certifications Right Now πŸ•΄

In an industry where certifications can make or break a job candidacy, which ones have security pros been going after in 2019?

πŸ“– Read

via "Dark Reading: ".
12:39
πŸ•΄ Of Interest πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sudo Bug Opens Root Access on Linux Systems ❌

The bug allows users to bypass privilege restrictions to execute commands as root.

πŸ“– Read

via "Threatpost".
13:11
πŸ” Hollywood hack job: How cybersecurity consultant for hit TV show "Mr. Robot" brought authenticity to actor Rami Malek's character πŸ”

James Plouffe, cybersecurity consultant for "Mr. Robot" reveals how he helped make hacking a reality on the USA-Network drama series starring Rami Malek and Christian Slater.

πŸ“– Read

via "Security on TechRepublic".
13:12
❌ Fake iOS Jailbreak Site Lures in Apple Users ❌

A fake website purports to enable iPhone users to download an iOS jailbreak - but ultimately prompts them to download a gaming app and conducts click fraud.

πŸ“– Read

via "Threatpost".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Symantec Adds Endpoint Security Tool to Revamp Portfolio πŸ•΄

Symantec Endpoint Security aims to deliver protection, detection, threat hunting, and response in a single tool.

πŸ“– Read

via "Dark Reading: ".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Steps to Protect Against Ransomware Attacks πŸ•΄

Paying a ransom is strongly discouraged by experts. So, how do you protect your organization?

πŸ“– Read

via "Dark Reading: ".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Irish Data Protection Commission Disappointed With 2020 Budget πŸ”

The data protection commission, one of the world's most vigilant, is disappointed in the government for its smaller-than-expected budget next year.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Kaspersky honeypots find 105 million attacks on IoT devices in first half of 2019 πŸ”

The number of attacks on IoT devices in 2019 is nine times greater than the number found in the first half of 2018.

πŸ“– Read

via "Security on TechRepublic".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ More Breaches, Less Certainty Cause Dark Web Prices to Plateau πŸ•΄

New research finds it's now less than $10 for full credit details on a consumer, $100 for a distributed denial-of-service attack, and $50 for access to a US bank account.

πŸ“– Read

via "Dark Reading: ".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ IoT Attacks Up Significantly in First Half of 2019 πŸ•΄

New research shows attacks increased ninefold year-over-year, coming from more than a quarter-million unique IP addresses.

πŸ“– Read

via "Dark Reading: ".
17:59
πŸ•΄ Targeted Ransomware Attacks Show No Signs of Abating πŸ•΄

Criminals are becoming more sophisticated and targeted in going after enterprise organizations, a new Q2/Q3 report finds.

πŸ“– Read

via "Dark Reading: ".
18:07
❌ On-Board β€˜Mystery Boxes’ Threaten Global Shipping Vessels ❌

Unknown, vulnerable systems are present in nearly every ship environment that researchers have pen-tested.

πŸ“– Read

via "Threatpost".
18:07
❌ Unencrypted Mobile Traffic on Tor Network Leaks PII ❌

Researchers create digital dossiers of mobile users scraped from Tor network traffic.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Sodinokibi Ransomware: Where Attackers' Money Goes πŸ•΄



πŸ“– Read

via "Dark Reading: ".
18:39
⚠ Watch out for this latest LinkedIn phish that’s β€˜sent’ by a friend ⚠

We recently showed you how crooks rip off social networking passwords - here's what they do with stolen accounts.

πŸ“– Read

via "Naked Security".
16 October 2019
?
05:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Passbolt review πŸ•΅


πŸ“– Read

via "VPNpro".
?
06:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ #FacebookLockout: Users who report fake/scam accounts locked out ⚠

Users report bad accounts, got presented with a request to verify ID, couldn't upload said ID, and got frozen out.

πŸ“– Read

via "Naked Security".
06:51
⚠ Microsoft lets Xbox users censor what messages they see ⚠

Xbox gamers: fed up with seeing profanity in messages from other gamers? Microsoft has you covered.

πŸ“– Read

via "Naked Security".
?
07:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Pitney Bowes and Groupe M6 join ransomware’s victim list ⚠

Two more large organisations find themselves struggling after a ransomware attack...

πŸ“– Read

via "Naked Security".
?
08:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Food writer Jack Monroe loses at least £5,000 in SIM-swap fraud ⚠

Her accounts were drained in spite of 2FA: SIM swaps are the easiest way around what's still a good security tool.

πŸ“– Read

via "Naked Security".
?
09:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector, Report ❌

A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when the phone was encased by a third-party screen protector.

πŸ“– Read

via "Threatpost".
?
09:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cybercrime Tool Prices Bump Up in Dark Web Markets ❌

A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.

πŸ“– Read

via "Threatpost".
10:07
❌ New Presentation Template: Incident Response Reporting for Management ❌

For many security decision-makers, the real challenge is communicating the ongoing IR process to their management.

πŸ“– Read

via "Threatpost".
10:07
❌ Podcast: Departing Employees Could Mean Departing Data ❌

Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today.

πŸ“– Read

via "Threatpost".
?
10:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to protect your organization's website against typosquatting πŸ”

Hundreds of fake domains have been set up against some of the presidential candidates through typosquatting, according to a report from digital risk company Digital Shadows.

πŸ“– Read

via "Security on TechRepublic".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Federal CIOs Zero In on Zero Trust πŸ•΄

Here's how federal CIOs can begin utilizing the security concept and avoid predictable obstacles.

πŸ“– Read

via "Dark Reading: ".
11:17
πŸ” How to password protect a zip file in Linux πŸ”

If you need to password protect a zip file, look no farther than the zip command itself.

πŸ“– Read

via "Security on TechRepublic".
11:17
πŸ” How to password protect a zip file in Linux πŸ”

If you need to password protect a zip file, look no farther than the zip command itself.

πŸ“– Read

via "Security on TechRepublic".
11:29
ATENTIONβ€Ό New - CVE-2015-9475 (pont)

The Pont theme 1.5 for WordPress has insufficient restrictions on option updates.

πŸ“– Read

via "National Vulnerability Database".
11:29
ATENTIONβ€Ό New - CVE-2015-9474 (simpolio)

The Simpolio theme 1.3.2 for WordPress has insufficient restrictions on option updates.

πŸ“– Read

via "National Vulnerability Database".
?
12:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cryptojacking Worm Targets and Infects 2,000 Docker Hosts πŸ•΄

Basic and 'inept' worm managed to compromise Docker hosts by exploiting misconfigurations.

πŸ“– Read

via "Dark Reading: ".
?
12:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Docker Containers Riddled with Graboid Crypto-Worm ❌

A worm with a randomized propagation method is spreading via the popular container technology.

πŸ“– Read

via "Threatpost".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Cloud Launches Security Health Analytics in Beta πŸ•΄

The tool is designed to help identify misconfigurations and compliance violations in the Google Cloud Platform.

πŸ“– Read

via "Dark Reading: ".
13:52
❌ .WAVs Hide Malware in Their Depths in Innovative Campaign ❌

Three different loaders and two payloads are hiding in audio files.

πŸ“– Read

via "Threatpost".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Silent Librarian Retools Phishing Emails to Hook Student Credentials ❌

Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.

πŸ“– Read

via "Threatpost".
15:13
πŸ•΄ Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures πŸ•΄

The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.

πŸ“– Read

via "Dark Reading: ".
15:19
πŸ” The Biggest Incidents in Cybersecurity (in the Past 10 Years) (Infographic) πŸ”

Looking back at the last 10 years, what are the biggest and most notable incidents in cybersecurity history? We created an infographic that reflects on the decade and can educate users on how to prevent the next major incident.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:27
πŸ” Blockchain is promising but it can't save the world πŸ”

TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.

πŸ“– Read

via "Security on TechRepublic".
15:27
πŸ” Blockchain is promising but it can't save the world πŸ”

TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.

πŸ“– Read

via "Security on TechRepublic".
15:38
πŸ•΄ SailPoint Buys Orkus and OverWatchID to Strengthen Cloud Access Governance πŸ•΄

The $37.5 million acquisitions will boost SailPoint's portfolio across all cloud platforms.

πŸ“– Read

via "Dark Reading: ".
?
17:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 10 Steps for Ransomware Protection ❌

Here are things you can do right now to shore up your defenses and help your recovery when you get hit.

πŸ“– Read

via "Threatpost".
17:29
ATENTIONβ€Ό New - CVE-2015-9470 (history_collection)

The history-collection plugin through 1.1.1 for WordPress has directory traversal via the download.php var parameter.

πŸ“– Read

via "National Vulnerability Database".
17:29
ATENTIONβ€Ό New - CVE-2015-9457 (pretty_link)

The pretty-link plugin before 1.6.8 for WordPress has PrliLinksController::list_links SQL injection via the group parameter.

πŸ“– Read

via "National Vulnerability Database".
?
18:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Advice From Betty White πŸ•΄

Among the beloved entertainer's advice: "Double bag those passwords."Thanks, Betty.

πŸ“– Read

via "Dark Reading: ".
?
19:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security 101 πŸ•΄



πŸ“– Read

via "Dark Reading: ".
19:33
πŸ•΄ How to Build a Rock-Solid Cybersecurity Culture πŸ•΄

In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.

πŸ“– Read

via "Dark Reading: ".
19:33
πŸ•΄ Typosquatting Websites Proliferate in Run-up to US Elections πŸ•΄

People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.

πŸ“– Read

via "Dark Reading: ".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9469 (content-grabber)

The content-grabber plugin 1.0 for WordPress has XSS via obj_field_name or obj_field_id.

πŸ“– Read

via "National Vulnerability Database".
17 October 2019
?
07:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Adobe fixes 46 critical bugs in patchfest ⚠

Adobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.

πŸ“– Read

via "Naked Security".
07:11
⚠ Hackers hack card details from BriansClub carding site ⚠

They stole 26 million credit cards from the massive black market site, and now financial institutions are ensuring the cards can't be abused.

πŸ“– Read

via "Naked Security".
07:21
⚠ Robotic hand solves Rubik’s Cube by learning how to learn about it ⚠

The system figured out how to overcome little hurdles, like being nudged by a stuffed giraffe when trying to do important robot work.

πŸ“– Read

via "Naked Security".
07:26
⚠ Pen testers find mystery black box connected to ship’s engines ⚠

It had an Ethernet connection to the ship LAN but was also connected to a Windows console on the bridge which was so bright at night the crew had covered it up. The assumption had been that it was meant to be there.

πŸ“– Read

via "Naked Security".
07:36
⚠ S2 Ep 13: Weird Android zero day and other tech fails – Naked Security podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Palo Alto Networks discovers new cryptojacking worm mining for Monero πŸ”

This is the first time that a cryptojacking attack has been observed on Docker.

πŸ“– Read

via "Security on TechRepublic".
11:08
πŸ•΄ Data Privacy Protections for the Most Vulnerable - Children πŸ•΄

The business case for why companies that respect the privacy of individuals, and especially minors, will have a strong competitive advantage.

πŸ“– Read

via "Dark Reading: ".
?
11:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS ❌

The flaws in the container technology, CVE-2019-16276 and CVE-2019-11253, are simple to exploit.

πŸ“– Read

via "Threatpost".
11:42
❌ Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws ❌

Cisco has issued patches for critical and high-severity vulnerabilities in its Aironet access point devices.

πŸ“– Read

via "Threatpost".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Trump Campaign Website Left Open to Email Server Hijack ❌

A misconfigured website development tool exposed hundreds of email servers to takeover, including President Donald Trump’s official campaign website.

πŸ“– Read

via "Threatpost".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Suricata IDPE 5.0.0 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cozy Bear Emerges from Hibernation to Hack EU Ministries πŸ•΄

The cyber-espionage group, linked to Russia and blamed for hacking the Democratic National Committee in 2016, has been using covert communications and other techniques to escape detection for at least two years.

πŸ“– Read

via "Dark Reading: ".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9479 (acf_fronted_display)

The ACF-Frontend-Display plugin through 2015-07-03 for WordPress has arbitrary file upload via an action=upload request to js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php.

πŸ“– Read

via "National Vulnerability Database".
?
14:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Yahoo Breach Victims May Qualify for $358 Payout πŸ•΄

Pending approval of the settlement, affected account holders may be eligible for a payout or two years of free credit monitoring.

πŸ“– Read

via "Dark Reading: ".
?
14:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hacking Back? BriansClub Dark Web Attack a Boon for Banks ❌

The theft of 26 million card records from an underground site offers valuable intel for banks.

πŸ“– Read

via "Threatpost".
14:40
πŸ” 70 Percent of Healthcare Breach Data Could Lead to ID Theft πŸ”

New research looks at 10 years of healthcare data breaches and breaks down the specific types of data exposed.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to find the Firefox Certificate Viewer πŸ”

Mozilla is set to launch a Certificate Viewer. Find out why and how to open it.

πŸ“– Read

via "Security on TechRepublic".
15:08
πŸ•΄ Smart Prevention: How Every Enterprise Can Create Human Firewalls πŸ•΄

Organizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets.

πŸ“– Read

via "Dark Reading: ".
15:17
πŸ” How to find the Firefox Certificate Viewer πŸ”

Mozilla is set to launch a Certificate Viewer. Find out why and how to open it.

πŸ“– Read

via "Security on TechRepublic".
15:29
ATENTIONβ€Ό New - CVE-2015-9482 (car_dealer_/_auto_dealer_responsive)

The ThemeMakers Car Dealer / Auto Dealer Responsive theme through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.

πŸ“– Read

via "National Vulnerability Database".
15:29
ATENTIONβ€Ό New - CVE-2010-5334 (webclient)

IceWarp Webclient before 10.2.1 has a directory traversal vulnerability. This can result in loss of confidential data of IceWarp Mailserver and the operating system. Input passed via a certain parameter (_c to basic/index.html) is not properly sanitised and can therefore be exploited to browse the partition where IceWarp is installed (or the whole system) and read arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ State of SMB Insecurity by the Numbers πŸ•΄

SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.

πŸ“– Read

via "Dark Reading: ".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Phishing Campaign Targets Stripe Credentials, Financial Data πŸ•΄

Attackers make use of an old trick and evade detection by blocking users from viewing an embedded link when hovering over the URL.

πŸ“– Read

via "Dark Reading: ".
17:22
πŸ” How to add public SSH keys for users in Cockpit πŸ”

Adding public SSH keys with Cockpit can easily be handled by a Cockpit admin.

πŸ“– Read

via "Security on TechRepublic".
17:22
❌ Phorpiex Botnet Shifts Gears From Ransomware to Sextortion ❌

A decade-old botnet is using infected computers to send out sextortion emails, in a wide-scale campaign with the potential to reach millions of victims.

πŸ“– Read

via "Threatpost".
17:29
ATENTIONβ€Ό New - CVE-2015-9481 (diplomat_|_political)

The ThemeMakers Diplomat | Political theme through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.

πŸ“– Read

via "National Vulnerability Database".
17:32
πŸ” How to add public SSH keys for users in Cockpit πŸ”

Adding public SSH keys with Cockpit can easily be handled by a Cockpit admin.

πŸ“– Read

via "Security on TechRepublic".
17:33
πŸ•΄ Older Amazon Devices Subject to Old Wi-Fi Vulnerability πŸ•΄

The vulnerability in first-generation Echoes and eight-generation Kindles lets an attacker wage man-in-the-middle attacks.

πŸ“– Read

via "Dark Reading: ".
17:38
πŸ•΄ Debug Feature in Web Dev Tool Exposed Trump Campaign Site, Others to Attack πŸ•΄

The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.

πŸ“– Read

via "Dark Reading: ".
18 October 2019
?
03:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9484 (accio_one_page_parallax_responsive_theme)

The ThemeMakers Accio One Page Parallax Responsive theme through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.

πŸ“– Read

via "National Vulnerability Database".
03:14
ATENTIONβ€Ό New - CVE-2015-9483 (invento_responsive_gallery/architecture_template)

The ThemeMakers Invento Responsive Gallery/Architecture Template component through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.

πŸ“– Read

via "National Vulnerability Database".
?
06:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Much-attacked Baltimore uses β€˜mind-bogglingly’ bad data storage ⚠

IT workers have been storing files on their computers' hard drives. One councilman's alleged response: β€œThat can’t be right? That’s real?”

πŸ“– Read

via "Naked Security".
07:01
⚠ S2 Ep13.5: All about social media: Growing up online, parent advice and social shaming – Naked Security Podcast ⚠

A special episode dedicated to social media culture!

πŸ“– Read

via "Naked Security".
?
08:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Bitcoin money trail leads cops to β€˜world’s largest’ child abuse site ⚠

The Darknet server running the site, "Welcome to Video", and the website's convicted admin were tracked down by a global police force.

πŸ“– Read

via "Naked Security".
08:36
⚠ Some Android adware apps hide icons to make it hard to remove them ⚠

SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the user’s device.

πŸ“– Read

via "Naked Security".
?
09:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zappos Offers Users 10% Discount in 2012 Breach Settlement ❌

Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers.

πŸ“– Read

via "Threatpost".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Learn About the Underground World of Anti-Cheats at Black Hat Europe πŸ•΄

Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption.

πŸ“– Read

via "Dark Reading: ".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent ❌

At what point will infiltrating companies via the "insider threat model" become less costly and difficult than using malware? Threatpost discusses with a SolarWind expert.

πŸ“– Read

via "Threatpost".
11:08
πŸ•΄ SOC Puppet: Dark Reading Caption Contest Winners πŸ•΄

Social engineering, SOC analysts, and Sock puns. And the winners are:

πŸ“– Read

via "Dark Reading: ".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phishy text message tries to steal your cellphone account ⚠

Which sort of company is most likely to contact you via SMS? Why, your mobile phone provider, of course!

πŸ“– Read

via "Naked Security".
12:18
πŸ•΄ Glitching: The Hardware Attack that can Disrupt Secure Software πŸ•΄

Glitching is difficult, complex, and dangerous. It's one of the reasons that physical security should be part of your cybersecurity planning, particularly as the IoT expands.

πŸ“– Read

via "Dark Reading: ".
12:28
πŸ•΄ Best Practices πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
12:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CenturyLink Customer Data Exposed πŸ•΄

Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.

πŸ“– Read

via "Dark Reading: ".
13:02
❌ Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise ❌

A patch is currently under revision but has not yet been incorporated into the Linux kernel.

πŸ“– Read

via "Threatpost".
13:07
❌ Major Airport Malware Attack Shines a Light on OT Security ❌

A cryptomining infection spread to half of the workstations at a major international airport.

πŸ“– Read

via "Threatpost".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 10/18 Edition πŸ”

A new bill that could put execs in jail for not taking privacy seriously, Singapore hires 500 data protection officers, and more - catch up on the news of the week with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Execs Could Face Jail Time For Privacy Violations ❌

The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies.

πŸ“– Read

via "Threatpost".
16:17
πŸ” What is a Zero Day Vulnerability? πŸ”

Find out what a Zero Day Vulnerability is and if there's anything you can do to protect yourself against them.

πŸ“– Read

via "Security on TechRepublic".
16:28
πŸ•΄ In A Crowded Endpoint Security Market, Consolidation Is Underway πŸ•΄

Experts examine the drivers pushing today's endpoint security market to consolidate as its many players compete to meet organizations' changing demands and transition to the cloud.

πŸ“– Read

via "Dark Reading: ".
16:38
πŸ•΄ Tor Weaponized to Steal Bitcoin πŸ•΄

A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser.

πŸ“– Read

via "Dark Reading: ".
16:47
πŸ” Why compliance concerns are pushing more big companies to the cloud πŸ”

Cloud migration is accelerating as companies face compliance, security, and control concerns.

πŸ“– Read

via "Security on TechRepublic".
?
17:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Tackles Election Security with Bug Bounties ❌

Researchers can earn up to $15,000, depending on the severity of the bug found.

πŸ“– Read

via "Threatpost".
21 October 2019
?
07:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 23 stories of the week ⚠

From mystery devices on ships to the stalker who found his victim through the reflections in her eyes - and everything in between.

πŸ“– Read

via "Naked Security".
?
07:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Mind your own business! CEOs who misuse data could end up in jail ⚠

US CEOs who lie about misusing consumers' data could face up to 20 years in prison under a new piece of legislation proposed last week.

πŸ“– Read

via "Naked Security".
?
08:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Way Found to Use Alexa, Google to β€˜Voice Phish’ and Eavesdrop on Users ❌

Developer interfaces used by Security Research Labs researchers to turn digital home assistants into β€˜Smart Spies’.

πŸ“– Read

via "Threatpost".
?
08:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Samsung Galaxy S10 fingerprint reader beaten by $3 gel protector ⚠

The fingerprint reader on Samsung’s flagship S10 and Note10 smartphones can be spoofed with a $3 screen protector.

πŸ“– Read

via "Naked Security".
08:49
⚠ Don’t look now, but Pixel 4’s Face Unlock works with eyes closed ⚠

There's a risk that someone might get hold of a device and unlock it by holding the screen to the face of its sleeping or unconscious owner.

πŸ“– Read

via "Naked Security".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Surviving Alert Fatigue: 7 Tools and Techniques πŸ•΄

Experts discuss why security teams are increasingly overwhelmed with alerts and share tactics for lightening the load.

πŸ“– Read

via "Dark Reading: ".
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SOC Operations: 6 Vital Lessons & Pitfalls πŸ•΄

There is no one road to security operations success, but these guidelines will smooth your path.

πŸ“– Read

via "Dark Reading: ".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Latest Data Privacy Bill Looks to Keep Corporations Accountable πŸ”

A bill introduced last week could threaten years of jail time for execs who lie to the FTC about protecting user data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Avast Network Breached As Hackers Target CCleaner Again ❌

Avast said it believes that threat actors are again looking to target CCleaner in a supply chain attack.

πŸ“– Read

via "Threatpost".
?
13:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Trend Micro Buys Cloud Conformity to Fight Cloud Competition πŸ•΄

The cloud security posture management startup was acquired for a reported $70 million.

πŸ“– Read

via "Dark Reading: ".
?
14:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Turla Compromises, Infiltrates Iranian APT Infrastructure ❌

The Russian-speaking APT stole the Neuron and Nautilus implants and accessed the Iranian APT's C2 infrastructure.

πŸ“– Read

via "Threatpost".
15:12
πŸ•΄ Researchers Turn Alexa and Google Home Into Credential Thieves πŸ•΄

Eight Amazon Alexa and Google Home apps were approved for official app stores even though their actual purposes were eavesdropping and phishing.

πŸ“– Read

via "Dark Reading: ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Consumers creeping and peeking, reveals HP survey πŸ”

3 out of 4 Americans check out other people's screens, and read unclaimed docs on office printer trays.

πŸ“– Read

via "Security on TechRepublic".
16:43
❌ U.S. Government, Military Personnel Data Leaked By Travel Agency ❌

The travel reservation data, along with personal details, of hundreds of thousands was discovered in a database exposed online for all to see.

πŸ“– Read

via "Threatpost".
?
17:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Avast Foils Another CCleaner Attack πŸ•΄

'Abiss' attackers used an older VPN profile to get into Avast's network and targeted its CCleaner utility.

πŸ“– Read

via "Dark Reading: ".
?
17:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Aims to Block Firmware Attacks with New Secured-Core PCs πŸ•΄

Partnerships with Intel, Qualcomm, and AMD will bring a new layer of device security that alters the boot process to detect firmware compromise.

πŸ“– Read

via "Dark Reading: ".
17:48
❌ Gustuff Android Banker Switches Up Technical Approach ❌

A host of new features have been added to the malware.

πŸ“– Read

via "Threatpost".
?
18:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hyperautomation, human augmentation and distributed cloud among top 10 technology trends for 2020 πŸ”

Gartner identified the top strategic technology trends likely to reach tipping points in the near future.

πŸ“– Read

via "Security on TechRepublic".
?
19:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russian Hackers Using Iranian APT's Infrastructure in Widespread Attacks πŸ•΄

New advisory from the UK's NCSC and the NSA throws fresh light on activity first revealed by Symantec in June.

πŸ“– Read

via "Dark Reading: ".
22 October 2019
?
06:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google chief warns visitors about smart speakers in his home ⚠

Rick Osterloh says he discloses smart speaker use when someone enters his home, and the products should probably do so themselves.

πŸ“– Read

via "Naked Security".
?
08:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Woman ordered to type in iPhone passcode so police can search device ⚠

It's not a violation of her Fifth Amendment rights, the court said, because it's a β€œforegone conclusion" that she knows her phone passcode.

πŸ“– Read

via "Naked Security".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Much Security Is Enough? Practitioners Weigh In πŸ•΄

Most IT and security pros surveyed say they could afford some, but not all, of the minimum security needed to protect themselves.

πŸ“– Read

via "Dark Reading: ".
?
09:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Survey Finds People are Privacy Hypocrites ❌

A report by HP found that most people admit to looking at others’ computer screens and documents in the workplace while still keeping their own privacy top of mind.

πŸ“– Read

via "Threatpost".
?
09:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ The NordVPN security breach: between fact and fiction πŸ•΅


πŸ“– Read

via "VPNpro".
09:59
πŸ•΄ Turning Vision to Reality: A New Road Map for Security Leadership πŸ•΄

Among the takeaways from a Gartner Symposium/Xpo session: who should be accountable for data security, why security groups should stop thinking of themselves as protectors, and the consequence of locking down 'dumb' users.

πŸ“– Read

via "Dark Reading: ".
10:03
❌ Cynet’s free vulnerability assessment offering helps organizations significantly increase their security ❌

By monitoring their environment, companies can be ready to take action if any weakness – usually a software vulnerability – is found.

πŸ“– Read

via "Threatpost".
10:03
❌ Three Service Account Secrets Straight from Hackers and Security Pros ❌

A survey of nearly 300 Black Hat conference attendees this year showed strong agreement that service accounts are an attractive target.

πŸ“– Read

via "Threatpost".
10:09
πŸ•΄ Bugcrowd Enters the IT Asset Discovery Business πŸ•΄

New service searches for errant or vulnerable devices on the Internet.

πŸ“– Read

via "Dark Reading: ".
?
10:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” University center to research ways to protect electronic systems from sabotage πŸ”

Led by the University of Cincinnati, the new center will work with government and industry to conduct research on how to defend electronics and embedded systems from sabotage, hacking, and spying.

πŸ“– Read

via "Security on TechRepublic".
10:48
⚠ Vatican launches smart rosary – complete with brute-force flaw ⚠

Now fixed, the Vatican's new fitness-and-prayer eRosary and its accompanying app, Click to Pray, were found to have a serious privacy bug.

πŸ“– Read

via "Naked Security".
10:49
πŸ•΄ Surviving Security Alert Fatigue: 7 Tools and Techniques πŸ•΄

Experts discuss why security teams are increasingly overwhelmed with alerts and share tactics for lightening the load.

πŸ“– Read

via "Dark Reading: ".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Keeping Too Many Cooks out of the Security Kitchen πŸ•΄

A good security team helps the business help itself operate more securely -- soliciting input while adhering to a unified strategy, vision, goals, and priorities.

πŸ“– Read

via "Dark Reading: ".
11:40
⚠ Storing your stuff securely in the cloud ⚠

How much of our stuff is going to the cloud? Probably a lot more than you realize. Let's look at the risks and how to mitigate them.

πŸ“– Read

via "Naked Security".
11:40
⚠ US nuclear weapons command finally ditches 8-inch floppies ⚠

The disks are part of the command centres that run the country’s nuclear missile deterrent on behalf of SACCS.

πŸ“– Read

via "Naked Security".
?
12:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magecart 5 Linked to Carbanak Gang ❌

The Magecart splinter group known for supply-chain attacks appears to be tied to advanced threat actors.

πŸ“– Read

via "Threatpost".
?
14:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Shattering myths and misperceptions about biometric debit and credit cards πŸ”

Biometric cards could make a strong dent against credit card fraud, but several myths surround the technology.

πŸ“– Read

via "Security on TechRepublic".
14:18
❌ No β€˜Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks ❌

Karsten Nohl, who was behind this week's research that outlined new eavesdropping hacks for Alexa and Google Home, says that privacy for smart home assistants still has a ways to go.

πŸ“– Read

via "Threatpost".
14:30
πŸ•΄ Autoclerk Database Spills 179GB of Customer, US Government Data πŸ•΄

An open Elasticsearch database exposed hundreds of thousands of hotel booking reservations, compromising data from full names to room numbers.

πŸ“– Read

via "Dark Reading: ".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NordVPN Breached Via Data Center Provider's Error πŸ•΄

The VPN company said that one of its 3,000 servers in a third-party data center was open to exploitation through a misconfigured management tool.

πŸ“– Read

via "Dark Reading: ".
15:18
πŸ” Lack of Controls, User Negligence Exposed PII of Veterans πŸ”

A recent VA inspector general report discovered veterans' medical records among a cache of data left exposed on shared drives.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:27
ATENTIONβ€Ό New - CVE-2017-8087

Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
15:39
πŸ•΄ The AI (R)evolution: Why Humans Will Always Have a Place in the SOC πŸ•΄

In cybersecurity, the combination of men, women and machines can do what neither can do alone -- form a complementary team capable of upholding order and fighting the forces of evil.

πŸ“– Read

via "Dark Reading: ".
?
16:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Open Redirect Bug in Bridge Theme Plugin Opens Admins to Spearphishing ❌

The Qode Instagram Widget and Qode Twitter Feed both have bugs that could allow redirects to malicious sites.

πŸ“– Read

via "Threatpost".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FTC Cracks Down on Stalkerware With Retina-X App Bans ❌

The FTC has banned the sale of three apps - marketed to monitor children and employees - unless the developers can prove that the apps will be used for legitimate purposes.

πŸ“– Read

via "Threatpost".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FIDO-Based Authentication Arrives for Smartwatches πŸ•΄

The Nok Nok App SDK for Smart Watch is designed to let businesses implement FIDO-based authentication on smartwatches.

πŸ“– Read

via "Dark Reading: ".
?
19:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9500

The Exquisite Ultimate Newspaper theme 1.3.3 for WordPress has XSS via the anchor identifier to assets/js/jquery.foundation.plugins.js.

πŸ“– Read

via "National Vulnerability Database".
19:27
ATENTIONβ€Ό New - CVE-2015-9499

The Showbiz Pro plugin through 1.7.1 for WordPress has PHP code execution by uploading a .php file within a ZIP archive.

πŸ“– Read

via "National Vulnerability Database".
19:27
ATENTIONβ€Ό New - CVE-2015-9498

The wps-hide-login plugin before 1.1 for WordPress has CSRF that affects saving an option value.

πŸ“– Read

via "National Vulnerability Database".
19:27
ATENTIONβ€Ό New - CVE-2015-9497

The ad-inserter plugin before 1.5.3 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=ad-inserter.php.

πŸ“– Read

via "National Vulnerability Database".
19:27
ATENTIONβ€Ό New - CVE-2015-9496

The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.

πŸ“– Read

via "National Vulnerability Database".
19:27
ATENTIONβ€Ό New - CVE-2015-9495

The syndication-links plugin before 1.0.3 for WordPress has XSS via the genericons/example.html anchor identifier.

πŸ“– Read

via "National Vulnerability Database".
19:27
ATENTIONβ€Ό New - CVE-2015-9494

The indieweb-post-kinds plugin before 1.3.1.1 for WordPress has XSS via the genericons/example.html anchor identifier.

πŸ“– Read

via "National Vulnerability Database".
19:27
ATENTIONβ€Ό New - CVE-2015-9493

The my-wish-list plugin before 1.4.2 for WordPress has multiple XSS issues.

πŸ“– Read

via "National Vulnerability Database".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Alliance Forms to Focus on Securing Operational Technology πŸ•΄

While mainly made up of vendors, the Operational Technology Cyber Security Alliance aims to offer security best practices for infrastructure operators and industrial partners.

πŸ“– Read

via "Dark Reading: ".
?
20:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ About 50% of Apps Are Accruing Unaddressed Vulnerabilities πŸ•΄

In rush to fix newly discovered security issues, developers are neglecting to address older ones, Veracode study finds.

πŸ“– Read

via "Dark Reading: ".
?
21:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9501

The Artificial Intelligence theme before 1.2.4 for WordPress has XSS because Genericons HTML files are unnecessarily placed under the web root.

πŸ“– Read

via "National Vulnerability Database".
23 October 2019
?
04:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Best VPN for Crunchyroll πŸ•΅


πŸ“– Read

via "VPNpro".
?
05:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ How to watch RTE outside Ireland πŸ•΅


πŸ“– Read

via "VPNpro".
?
07:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Travel database exposed PII on US government employees ⚠

A property management company owned by hotel chain Best Western has exposed 179 GB of sensitive travel information on thousands of travelers.

πŸ“– Read

via "Naked Security".
?
09:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 15 Years Later, Metasploit Still Manages to be a Menace ❌

A fresh look at the penetration testing tool Metasploit reveals the 15-year old hacking tool still has some tricks up its sleeves, even against modern defenses.

πŸ“– Read

via "Threatpost".
09:05
⚠ Facebook pulls fake news networks linked to Russia and Iran ⚠

It took down four foreign interference campaigns and announced initiatives to prevent foreign interference in US elections.

πŸ“– Read

via "Naked Security".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hacker breached servers used by NordVPN ⚠

NordVPN has been forced to admit that a hacker stole an expired TLS certificate key used to securely connect customers to its web servers.

πŸ“– Read

via "Naked Security".
09:49
⚠ Alexa and Google Home phishing apps demonstrated by researchers ⚠

The researchers' "Smart Spies" apps showed how Amazon Alexa and Google Home users could be exposed to vishing and eavesdropping.

πŸ“– Read

via "Naked Security".
?
10:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Tips for More Secure Mobile Computing πŸ•΄

Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices - and critical business data - best protected.

πŸ“– Read

via "Dark Reading: ".
10:24
πŸ•΄ What Has Cybersecurity Pros So Stressed -- And Why It's Everyone's Problem πŸ•΄

As cyberattacks intensify and the skills gap broadens, it's hard not to wonder how much more those in the industry can take before throwing in the towel.

πŸ“– Read

via "Dark Reading: ".
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Firefox Bugs Allow Arbitrary Code-Execution ❌

Multiple critical memory safety bugs in Firefox 69 and Firefox ESR 68.1 in particular affect medium and large government entities and enterprises.

πŸ“– Read

via "Threatpost".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Report: 2020 Presidential Campaigns Still Vulnerable to Web Attacks πŸ•΄

Nine out of 12 Democratic candidates have yet to enable DNSSEC, a simple set of extensions that stops most targeted domain-based attacks.

πŸ“– Read

via "Dark Reading: ".
?
12:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 10% of Small Businesses Breached Shut Down in 2019 πŸ•΄

As a result of cybercrime, 69% of small organizations were forced offline for a limited time and 37% experienced financial loss.

πŸ“– Read

via "Dark Reading: ".
?
13:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ThreatList: Google’s Advertising Network Dominates Global Data Collection ❌

With DoubleClick, Analytics and AdWords under its belt, Google continues dominating when it comes to global data collection for advertising, a new report found.

πŸ“– Read

via "Threatpost".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Air Force Planning IP Protection Group Of Its Own πŸ”

To combat the ongoing epidemic around IP theft, the U.S. Air Force recently announced plans to develop an internal group to better protect the USAF's "hard-won intellectual property."

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Planning a Zero-Trust Initiative? Here's How to Prioritize πŸ•΄

If you start by focusing on users, data, access, and managed devices, you will make major strides toward achieving better security.

πŸ“– Read

via "Dark Reading: ".
15:08
❌ Fujitsu Wireless Keyboard Plagued By Unpatched Flaws ❌

Two high-severity vulnerabilities in a Fujitsu wireless keyboard expose passwords and allow keystroke injection attacks.

πŸ“– Read

via "Threatpost".
?
15:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9515

The Easy Digital Downloads (EDD) htaccess Editor extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9514

The Easy Digital Downloads (EDD) Free Downloads extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9513

The Easy Digital Downloads (EDD) Favorites extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9512

The Easy Digital Downloads (EDD) CSV Manager extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9511

The Easy Digital Downloads (EDD) Conditional Success Redirects extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9510

The Easy Digital Downloads (EDD) Cross-sell Upsell extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9509

The Easy Digital Downloads (EDD) Content Restriction extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9508

The Easy Digital Downloads (EDD) Commissions extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9507

The Easy Digital Downloads (EDD) Attach Accounts to Orders extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9506

The Easy Digital Downloads (EDD) Amazon S3 extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9505

The Easy Digital Downloads (EDD) core component 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7 for WordPress has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9504

The weeklynews theme before 2.2.9 for WordPress has XSS via the s parameter.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9503

The Modern theme before 1.4.2 for WordPress has XSS via the genericons/example.html anchor identifier.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2015-9502

The Auberge theme before 1.4.5 for WordPress has XSS via the genericons/example.html anchor identifier.

πŸ“– Read

via "National Vulnerability Database".
15:27
ATENTIONβ€Ό New - CVE-2013-7333

A vulnerability in version 0.90 of the Open Floodlight SDN controller software could allow an attacker with access to the OpenFlow control network to selectively disconnect individual switches from the SDN controller, causing degradation and eventually denial of network access to all devices connected to the targeted switch.

πŸ“– Read

via "National Vulnerability Database".
15:31
πŸ” Digital transformation: Why companies need a sense of urgency πŸ”

TechRepublic's Karen Roby talks with futurist Brian Solis about the trends shaping digital transformation.

πŸ“– Read

via "Security on TechRepublic".
15:31
πŸ” Digital transformation: Why companies need a sense of urgency πŸ”

TechRepublic's Karen Roby talks with futurist Brian Solis about the trends shaping digital transformation.

πŸ“– Read

via "Security on TechRepublic".
?
16:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Smart contracts and blockchain will provide needed trust, says Princeton professor πŸ”

Princeton computer science professor Ed Felten says blockchain will enable smart contracts that provide trust to company systems in the future, but there are some myths and misconceptions.

πŸ“– Read

via "Security on TechRepublic".
?
16:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bedside Hotel Robot Hacked to Stream In-Room Video ❌

An unsecured NFC tag opens a door to trivial exploitation of robots inside Japanese hotels.

πŸ“– Read

via "Threatpost".
16:26
πŸ” Mobile malware increasingly being used for espionage by state-sponsored groups πŸ”

State-sponsored groups take advantage of the lack of effective mobile malware solutions to target mobile users, according to a new report from BlackBerry.

πŸ“– Read

via "Security on TechRepublic".
16:36
πŸ” How to use RoboForm to manage and synchronize your browser bookmarks πŸ”

RoboForm is more than a password manager--you can also use it as a tool for syncing your browser bookmarks.

πŸ“– Read

via "Security on TechRepublic".
16:39
πŸ•΄ Oracle Releases Free Tool for Monitoring Internet Routing Security πŸ•΄

IXP Filter Check gives Internet Exchange Points a way to verify whether they are properly filtering out incorrect and malicious routes.

πŸ“– Read

via "Dark Reading: ".
?
17:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Tough Choices πŸ•΄

If you could only protect one category of your organization's data, what would it be?

πŸ“– Read

via "Dark Reading: ".
17:32
ATENTIONβ€Ό New - CVE-2014-2304

A vulnerability in version 0.90 of the Open Floodlight SDN controller software could result in a denial of service attack and crashing of the controller service. This effect is the result of a flaw in OpenFlow protocol processing, where specific malformed and mistimed FEATURES_REPLY messages cause the controller service to not delete switch and port data from its internal tracking structures.

πŸ“– Read

via "National Vulnerability Database".
17:32
ATENTIONβ€Ό New - CVE-2002-2439

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

πŸ“– Read

via "National Vulnerability Database".
17:44
πŸ•΄ FTC Warns Consumers About Stalking Apps πŸ•΄

Agency offers tips on how to detect and eradicate the spyware.

πŸ“– Read

via "Dark Reading: ".
17:54
πŸ•΄ IoTopia Framework Aims to Bring Security to Device Manufacturers πŸ•΄

GlobalPlatform launches an initiative to help companies secure connected devices and services across markets.

πŸ“– Read

via "Dark Reading: ".
?
18:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Gartner IT Symposium/Xpo 2019: Security and regulatory concerns with public cloud πŸ”

How IBM works with clients in regulated industries to scale AI across public clouds and protect data.

πŸ“– Read

via "Security on TechRepublic".
?
18:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Wireshark Analyzer 3.0.6 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
24 October 2019
?
04:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ How to watch ITV πŸ•΅


πŸ“– Read

via "VPNpro".
?
07:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Stalker app maker Retina-X settles FTC charges ⚠

It's the first time we've gone after a stalking app, the FTC said. In this case, that would be a stalking app that got breached - twice.

πŸ“– Read

via "Naked Security".
?
08:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Poll Results: Smart Enterprises, Dumb Homes πŸ•΄

At work, security pros have their fingers on some pretty cutting-edge technology. But are their homes souped up, too?

πŸ“– Read

via "Dark Reading: ".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Developers: The Cause of and Solution to Security's Biggest Problems πŸ•΄

The everything-as-code revolution requires cybersecurity to increasingly enlist the help of developers to solve the industry's most pressing issues.

πŸ“– Read

via "Dark Reading: ".
?
10:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ IBM tears into Google’s β€˜quantum supremacy’ claim ⚠

Is β€˜quantum supremacy’ the moment that the rarefied world of quantum computing finally enters popular consciousness? Probably not.

πŸ“– Read

via "Naked Security".
10:33
❌ Apple Removes 17 Malicious iOS Apps From App Store ❌

Researchers have uncovered malware in 17 iOS apps that were removed from Apple's official App Store.

πŸ“– Read

via "Threatpost".
10:43
❌ ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones ❌

Consumers don't vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ

πŸ“– Read

via "Threatpost".
10:54
πŸ•΄ Messing Around with IRS Scammers πŸ•΄

Next time you just might want to answer the phone.

πŸ“– Read

via "Dark Reading: ".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top Security Considerations for Insurance Companies πŸ”

When it comes to cybersecurity, the insurance industry is subject to a range of regulatory issues. Thanks to the wealth of sensitive data they handle, they're also popular targets of hackers. How can insurance firms best mitigate cybersecurity risks? We asked 20 experts.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Organizations Must Quantify Cyber-Risk in Business Terms πŸ•΄

The rising costs of breaches and regulatory fines are driving demand for better measurement and articulation of business impacts.

πŸ“– Read

via "Dark Reading: ".
?
11:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Robot Hotel says sorry about the buggy bedside bots ⚠

Japan's Henn na Hotel says it's "modified" the bots so pervs can't exploit the ability to run unsigned code and spy on future guests.

πŸ“– Read

via "Naked Security".
11:55
⚠ Vulnerability in content distribution networks found by researchers ⚠

Researchers have found a flaw that could lead to denial of service attacks on content distribution networks around the world.

πŸ“– Read

via "Naked Security".
11:55
⚠ S2 Ep14: Samsung fingerprint fail, mystery black boxes and invisible Android apps – Naked Security Podcast ⚠

New episode available now!

πŸ“– Read

via "Naked Security".
11:55
⚠ 5 tips for better cybersecurity ⚠

The Naked Security team gives their top 5 cybersecurity tips.

πŸ“– Read

via "Naked Security".
11:56
πŸ” Top 5 ways organizations can secure their IoT devices πŸ”

Connected devices are increasingly being targeted by hackers and cybercriminals. Deloitte shares five tips on how companies can better protect their IoT devices.

πŸ“– Read

via "Security on TechRepublic".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mobile Users Targeted With Malware, Tracked by Advertisers πŸ•΄

Cybercriminals continue to seed app stores with malicious apps, advanced attackers successfully compromise mobile devices, and advertisers continue to track users, new reports show.

πŸ“– Read

via "Dark Reading: ".
12:48
❌ Samsung Rolls Out Fix For Galaxy S10 Fingerprint Sensor Glitch ❌

Samsung is reportedly rolling out fixes for a glitch that allowed anyone to dupe its Galaxy S10 fingerprint authentication sensor.

πŸ“– Read

via "Threatpost".
?
13:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cash App Twitter Giveaway a Haven for Stealing Money ❌

Scammers are targeting those hoping for #CashAppFriday "blessings."

πŸ“– Read

via "Threatpost".
13:14
πŸ•΄ Eight-Hour DDoS Attack Struck AWS Customers πŸ•΄

Google Cloud Platform suffered issues around the same time as Amazon Web Services but claims they were not caused by DDoS.

πŸ“– Read

via "Dark Reading: ".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ It's Time to Improve Website Identity Indicators, Not Remove Them πŸ•΄

Why Google and Mozilla are wrong about the benefits of Extended Validation certificates that aim to prevent fraud and protect user privacy.

πŸ“– Read

via "Dark Reading: ".
?
15:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Raccoon Malware Scavenges 100,000+ Devices to Steal Data ❌

A new information stealer is gaining rapid popularity with the cybercriminal community - leading to it infecting hundreds of millions of victims.

πŸ“– Read

via "Threatpost".
15:54
πŸ•΄ Apple Boots 17 Trojan-Laden Apps From Mobile Store πŸ•΄

Malware was designed to carry out click-fraud, Wandera says.

πŸ“– Read

via "Dark Reading: ".
?
16:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  I2P 0.9.43 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
16:56
πŸ” Gartner IT Symposium/Xpo 2019: The four pillars to help the enterprise conquer IoT πŸ”

IoT and software defined networking (SDN) are key components to help the enterprise move forward in a digital society.

πŸ“– Read

via "Security on TechRepublic".
16:58
❌ Religious Website Data Exposed for Months ❌

Potential follow-on attacks on religious organizations could include credit-card theft via spearphishing, fraud and network intrusion.

πŸ“– Read

via "Threatpost".
?
17:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Expands Election Security Initiative πŸ•΄

The program offers resources and advice to help protect elections at every level within the US.

πŸ“– Read

via "Dark Reading: ".
17:59
πŸ•΄ 40% of Security Pros Job Hunting as Satisfaction Drops πŸ•΄

Symptoms of job dissatisfaction creep into an industry already plagued with gaps in diversity and work-life balance.

πŸ“– Read

via "Dark Reading: ".
18:01
πŸ” MWC19 Los Angeles: Syniverse's mission in the 5G revolution πŸ”

As 5G permeates the industry, Syniverse shows how major companies can prepare for the tech.

πŸ“– Read

via "Security on TechRepublic".
?
19:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” MWC19 Los Angeles: The value of blockchain in the telecommunications sector πŸ”

Blockchain isn't reserved for bitcoin. Here's how the telecommunications sector can benefit.

πŸ“– Read

via "Security on TechRepublic".
25 October 2019
?
04:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ KeepSolid VPN Lite Review πŸ•΅


πŸ“– Read

via "VPNpro".
?
09:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phishers strike at mobile wellness app company ⚠

What were the phishers after? People's login details for Office 365.

πŸ“– Read

via "Naked Security".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Keylogging data vampire pleads guilty to bleeding two companies ⚠

He drained data from firms working on hot new technology, sneaking in with a fake access badge, planting hardware and software keyloggers.

πŸ“– Read

via "Naked Security".
?
10:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware, Mobile Malware Attacks to Surge in 2020 ❌

Targeted ransomware, mobile malware and other attacks will surge, while companies will adopt AI, better cloud security and cyber insurance to help defend and protect against them.

πŸ“– Read

via "Threatpost".
?
10:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” MWC19 Los Angeles: Blockchain's role in the 5G movement πŸ”

Blockchain is a powerful security tool for mobile providers. Here's how to unlock its potential.

πŸ“– Read

via "Security on TechRepublic".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox Privacy Protection makes website trackers visible ⚠

Mozilla has added another privacy tweak to Firefox version 70 - the ability to quickly see how often websites are tracking users.

πŸ“– Read

via "Naked Security".
11:44
πŸ•΄ 3 Security Lessons Federal IT Pros Can Teach the Private Sector πŸ•΄

With a little research and basic planning, small companies can make big strides against the cybersecurity threats they face. Here's how.

πŸ“– Read

via "Dark Reading: ".
11:50
πŸ” The real truth about deepfakes and how to stop them πŸ”

Avivah Litan, vice president and distinguished analyst for Gartner, explains how deepfake videos can be used to distort reality and how people can fight it through AI models and blockchain.

πŸ“– Read

via "Security on TechRepublic".
?
12:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Security Lessons Federal IT Pros Can Teach the Private Sector πŸ•΄

With a little research and basic planning, small companies can make big strides against the cybersecurity threats they face. Here's how.

πŸ“– Read

via "Dark Reading: ".
12:25
πŸ” How to protect your organization's website against typosquatting πŸ”

Hundreds of fake domains have been set up against some of the presidential candidates through typosquatting, according to a report from digital risk company Digital Shadows.

πŸ“– Read

via "Security on TechRepublic".
12:34
πŸ•΄ Second Ransomware Attack Strikes Johannesburg πŸ•΄

Attackers who broke into the city's network demand four Bitcoins in ransom or threaten to share stolen personal and financial data.

πŸ“– Read

via "Dark Reading: ".
12:44
πŸ•΄ Building a Cybersecurity Culture: What's Love Got to Do With It? πŸ•΄

Turns out, a lot. Get people to fall in love with the security team, and you'll get them to care about security, CISOs say in part 2 of a two-part series about building security culture.

πŸ“– Read

via "Dark Reading: ".
12:57
❌ News Wrap: Hotel Robot Hacks, FTC Stalkerware Crackdown ❌

From hacking hotel room robots to crackdowns on stalkerware apps, Threatpost editors break down this week's top news stories.

πŸ“– Read

via "Threatpost".
?
13:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ U.N., UNICEF, Red Cross Under Ongoing Mobile Attack ❌

A smart mobile-first phishing effort uses valid certificates to sign fake Office 365 pages, and logs keystrokes in real time.

πŸ“– Read

via "Threatpost".
13:32
ATENTIONβ€Ό New - CVE-2015-0270

Zend Framework before 2.2.10 and 2.3.x before 2.3.5 has Potential SQL injection in PostgreSQL Zend\Db adapter.

πŸ“– Read

via "National Vulnerability Database".
13:47
❌ 7M Adobe Creative Cloud Users Exposed to Hackers ❌

An open cloud database sets the stage for phishing attacks for users of the subscription service.

πŸ“– Read

via "Threatpost".
13:49
πŸ” Cybersecurity Awareness Month: How individuals and businesses can stay vigilant πŸ”

October is Cybersecurity Awareness Month, and the Identity Theft Resource Center is providing tips to keep consumers and companies safe.

πŸ“– Read

via "Security on TechRepublic".
?
14:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybersecurity Awareness Month: How individuals and businesses can stay vigilant πŸ”

October is Cybersecurity Awareness Month, and the Identity Theft Resource Center is providing tips to keep consumers and companies safe.

πŸ“– Read

via "Security on TechRepublic".
?
14:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 10/25 Edition πŸ”

The FBI warns about e-skimming, a VPN is hacked, and the best and worst states for online privacy. Catch up on the news of the week with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
14:39
πŸ•΄ Get Up to Speed on the Latest Cryptographic Techniques at Black Hat Europe πŸ•΄

Study the weaknesses of WPA-TKIP encryption bone up on the most secure cryptographic APIs at Black Hat Europe.

πŸ“– Read

via "Dark Reading: ".
?
15:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-4857

D-Link DIR-865L has PHP File Inclusion in the router xml file.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2013-4856

D-Link DIR-865L has Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2013-4855

D-Link DIR-865L has SMB Symlink Traversal due to misconfiguration in the SMB service allowing symbolic links to be created to locations outside of the Samba share.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2013-4848

TP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
15:32
ATENTIONβ€Ό New - CVE-2013-4658

Linksys EA6500 has SMB Symlink Traversal allowing symbolic links to be created to locations outside of the Samba share.

πŸ“– Read

via "National Vulnerability Database".
?
17:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Online Beauty Store Hit by Magecart Attack πŸ•΄

An e-skimmer placed on the Procter & Gamble-owned First Aid Beauty site to steal payment card data went undetected for five months.

πŸ“– Read

via "Dark Reading: ".
?
17:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Is AWS Liable in Capital One Breach? ❌

Senators penned a letter to the FTC urging it to investigate whether Amazon is to blame for the massive Capital One data breach disclosed earlier this year.

πŸ“– Read

via "Threatpost".
17:34
πŸ•΄ Microsoft Office Bug Remains Top Malware Delivery Vector πŸ•΄

CVE-2017-11882 has been attackers' favorite malware delivery mechanism throughout the second and third quarters of 2019.

πŸ“– Read

via "Dark Reading: ".
28 October 2019
?
09:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Crypto Capital boss arrested over money laundering ⚠

Bitfinex says the payment processor has $880M of the cryptocurrency exchange's β€œlost” funds. Polish authorities seized $390m of it.

πŸ“– Read

via "Naked Security".
10:05
❌ Cybercriminals Impersonate Russian APT β€˜Fancy Bear’ to Launch DDoS Attacks ❌

Attacks are targeting international companies in the financial sector, demanding that victims pay ransom in Bitcoin.

πŸ“– Read

via "Threatpost".
10:14
⚠ New BBC β€˜dark web’ Tor mirror site aims to beat censorship ⚠

A mirror copy of the BBC’s international news website is now available to users on the so-called dark web.

πŸ“– Read

via "Naked Security".
?
10:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ TikTok says no, senators, we’re not under China’s thumb ⚠

US lawmakers asked intelligence to look into whether the app and others like it could pose a security threat or be used to influence opinion.

πŸ“– Read

via "Naked Security".
10:39
⚠ Ransomware with a difference as hackers threaten to release city data ⚠

Johannesburg spent the weekend struggling to recover from its second malware attack this year as it took key services systems offline.

πŸ“– Read

via "Naked Security".
10:44
⚠ Monday review – the hot 21 stories of the week ⚠

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Things the Hoodie & the Hard Hat Need to Know About Each Other πŸ•΄

Traditionally, the worlds of IT (the hoodie) and OT (the hard hat) have been separate. That must change.

πŸ“– Read

via "Dark Reading: ".
11:25
❌ Magecart Gang Targets Skin Care Site Visitors For 5+ Months ❌

A Magecart skimmer, discovered on the site of First Aid Beauty, was only just removed after being in place for five months.

πŸ“– Read

via "Threatpost".
?
11:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-9499 (showbiz_pro)

The Showbiz Pro plugin through 1.7.1 for WordPress has PHP code execution by uploading a .php file within a ZIP archive.

πŸ“– Read

via "National Vulnerability Database".
?
12:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New: The 2019 Security Buyer's Guide πŸ•΄

Whether you're a leader of a large enterprise or a smaller business, part of your ongoing security, risk management, and compliance strategy will be sourcing the most effective solution. This guide, sponsored by Akamai, will help you determine what to look for.

πŸ“– Read

via "Dark Reading: ".
?
13:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Gartner IT Symposium/Xpo 2019: The innovative thinking behind the IBM Garage πŸ”

Blockchain, cloud and IoT are just a few of the tools being used within the IBM Garage to help clients innovate. The New York Times is using the IBM Garage to combat fake news by using blockchain.

πŸ“– Read

via "Security on TechRepublic".
13:20
❌ PHP Bug Allows Remote Code-Execution on NGINX Servers ❌

CVE-2019-11043 is trivial to exploit -- and a proof of concept is available.

πŸ“– Read

via "Threatpost".
13:26
ATENTIONβ€Ό New - CVE-2010-4245

pootle 2.0.5-0.2 has XSS via 'match_names' parameter

πŸ“– Read

via "National Vulnerability Database".
13:26
ATENTIONβ€Ό New - CVE-2010-4241

Tiki Wiki CMS Groupware 5.2 has CSRF

πŸ“– Read

via "National Vulnerability Database".
13:26
ATENTIONβ€Ό New - CVE-2010-4240

Tiki Wiki CMS Groupware 5.2 has XSS

πŸ“– Read

via "National Vulnerability Database".
13:26
ATENTIONβ€Ό New - CVE-2010-4239

Tiki Wiki CMS Groupware 5.2 has Local File Inclusion

πŸ“– Read

via "National Vulnerability Database".
13:26
ATENTIONβ€Ό New - CVE-2010-3293

mailscanner can allow local users to prevent virus signatures from being updated

πŸ“– Read

via "National Vulnerability Database".
13:26
ATENTIONβ€Ό New - CVE-2009-4900

pixelpost 1.7.1-5 has XSS

πŸ“– Read

via "National Vulnerability Database".
13:26
ATENTIONβ€Ό New - CVE-2009-4899

pixelpost 1.7.1-5 has SQL injection

πŸ“– Read

via "National Vulnerability Database".
13:26
ATENTIONβ€Ό New - CVE-2005-2349

Zoo 2.10-27 has Directory traversal

πŸ“– Read

via "National Vulnerability Database".
13:26
ATENTIONβ€Ό New - CVE-2002-2444

Snoopy 2.0.0-1 has a security hole in exec cURL

πŸ“– Read

via "National Vulnerability Database".
?
14:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Database Error Exposes 7.5 Million Adobe Customer Records πŸ•΄

The database was open for approximately one week before the problem was discovered.

πŸ“– Read

via "Dark Reading: ".
14:55
πŸ” Ex-SEC Employee Took Data to Land New Job πŸ”

The DOJ says a former SEC examiner stole information from the government agency to help him land a chief compliance officer gig at a firm the SEC was investigating.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Lawmakers Fear Chinese-Owned TikTok Poses Security Risk πŸ•΄

The popular video app has more than 110 million downloads in the United States and could give China access to users' personal data, they say.

πŸ“– Read

via "Dark Reading: ".
15:18
❌ Pwn2Own Expands Into Industrial Control Systems Hacking ❌

White-hat hackers will now have the chance to win $20,000 for sniffing out remote code-execution flaws in industrial control systems.

πŸ“– Read

via "Threatpost".
15:21
πŸ” 2020 predictions for technology, consumer packaged goods and retail πŸ”

Nielsen released predictions for the next decade at the Gartner IT Symposium/Xpo 2019 and CPG and retail supply chains will need automation, blockchain and enhanced analytics to improve security.

πŸ“– Read

via "Security on TechRepublic".
15:31
ATENTIONβ€Ό New - CVE-2012-5577

Python keyring lib before 0.10 created keyring files with world-readable permissions.

πŸ“– Read

via "National Vulnerability Database".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Adobe database exposes 7.5 million Creative Cloud users ⚠

Adobe has become the latest company to be caught leaving an Elasticsearch database full of customer data exposed on the internet.

πŸ“– Read

via "Naked Security".
?
16:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ UniCredit Suffers Third Breach Despite Investing Billions in Cybersecurity ❌

UniCredit was also hit with hacking incidents in September-October 2016 and June-July 2017.

πŸ“– Read

via "Threatpost".
?
17:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hackers finding ways to exploit automotive software to overtake cars πŸ”

A new report from IntSights details the many ways cybercriminals break into a new generation of highly digitized cars.

πŸ“– Read

via "Security on TechRepublic".
?
17:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Is Voting by Mobile App a Better Security Option or Just 'A Bad Idea'? πŸ•΄

Security experts say voting by app adds another level of risk, as mobile-voting pilots expand for overseas military and voters with disabilities.

πŸ“– Read

via "Dark Reading: ".
?
17:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Pwn2Own Adds Industrial Control Systems to Hacking Contest πŸ•΄

The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January.

πŸ“– Read

via "Dark Reading: ".
17:54
πŸ›  Stegano 0.9.7 πŸ› 

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
18:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 things to know about alternative data πŸ”

Alternative data allows businesses to discover trends and financial opportunities without compromising consumer privacy. Tom Merritt explains the five things you need to know about alternative data.

πŸ“– Read

via "Security on TechRepublic".
18:16
πŸ” Top 5 things to know about alternative data πŸ”

Alternative data allows businesses to discover trends and financial opportunities without compromising consumer privacy. Tom Merritt explains the five things you need to know about alternative data.

πŸ“– Read

via "Security on TechRepublic".
?
18:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fortinet Bolsters Endpoint Security with enSilo Acquisition πŸ•΄

As companies reduce their vendor count, consolidation will likely continue to accelerate in the next year.

πŸ“– Read

via "Dark Reading: ".
29 October 2019
?
08:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ New Facebook AI fools facial recognition ⚠

The technology - which Facebook won't use in its own apps - subtly distorts face images so they're still recognizable, but not to machines.

πŸ“– Read

via "Naked Security".
?
08:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ PHP team fixes nasty site-owning remote execution bug ⚠

The PHP development team has fixed a bug that could allow remote code execution in some setups of the programming language.

πŸ“– Read

via "Naked Security".
08:59
⚠ Gradient β€œcelebrity matching” photo app sparks privacy fears ⚠

The Kardashians love the Gradient app - but they're being paid to use it, whereas for you it's the other way round. Is it safe?

πŸ“– Read

via "Naked Security".
?
10:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical ❌

Overall, across all retail programs, more than 18 percent of all bug bounty submissions are critical in severity, a new Bugcrowd report found.

πŸ“– Read

via "Threatpost".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Country of Georgia Suffers Widespread Cyberattack ❌

The attack on local web-hosting provider Pro-Service - likely politically motivated - took out 2,000 websites and the national television station.

πŸ“– Read

via "Threatpost".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What Do You Do When You Can't Patch Your IoT Endpoints? πŸ•΄

The answer, in a word, is segmentation. But the inconvenient truth is that segmentation is hard.

πŸ“– Read

via "Dark Reading: ".
11:18
πŸ•΄ πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why It's Imperative to Bridge the IT & OT Cultural Divide πŸ•΄

As industrial enterprises face the disruptive forces of an increasingly connected world, these two cultures must learn to coexist.

πŸ“– Read

via "Dark Reading: ".
11:46
ATENTIONβ€Ό New - CVE-2015-9506 (amazon_s3, easy_digital_downloads)

The Easy Digital Downloads (EDD) Amazon S3 extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.

πŸ“– Read

via "National Vulnerability Database".
?
12:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom ❌

The APT is once again targeting the sports world, Microsoft warns.

πŸ“– Read

via "Threatpost".
?
13:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Adwind Variant Targets Windows, Chromium Credentials ❌

A new version of the typically platform-agnostic Adwind trojan has been spotted targeting Windows applications and systems and Chromium-based browsers.

πŸ“– Read

via "Threatpost".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Trumps Political, Reputational Concerns for Companies πŸ•΄

The average company has seen its risk increase, with cybersecurity topping the list of business threats, followed by damage to reputation and financial risks, a report finds.

πŸ“– Read

via "Dark Reading: ".
14:04
❌ Joker’s Stash Drops Largest-Ever Credit Card Cache on Dark Web ❌

1.3 million stolen cards, mostly from India, could fetch $130 million for the cybercrooks.

πŸ“– Read

via "Threatpost".
14:06
πŸ” Research finds 2019 increase in breaches and cybersecurity spending πŸ”

The ServiceNow and Ponemon study found an average 24% increase in cybersecurity spending and a 17% rise in attacks.

πŸ“– Read

via "Security on TechRepublic".
?
14:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Who Made the List Of 2019's Nastiest Malware? πŸ•΄

This year's compilation features well-known ransomware, botnet, and cryptomining software.

πŸ“– Read

via "Dark Reading: ".
15:03
πŸ•΄ Google Cloud Adds New Security Management Tools to G Suite πŸ•΄

Desktop devices that log into G Suite will have device management enabled by default, streamlining processes for IT admins.

πŸ“– Read

via "Dark Reading: ".
15:08
πŸ•΄ Why Cloud-Native Applications Need Cloud-Native Security πŸ•΄

Today's developers and the enterprises they work for must prioritize security in order to reap the speed and feature benefits these applications and new architectures provide.

πŸ“– Read

via "Dark Reading: ".
15:21
πŸ” How to secure OneDrive files and folders with Personal Vault πŸ”

Learn how to make specific folders and files on OneDrive more secure by using Personal Vault.

πŸ“– Read

via "Security on TechRepublic".
?
16:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Hacker Faces Jailtime After Stealing Employee, Company Data At Two Firms πŸ”

A man admitted he installed keyloggers at two companies and used them as a launching pad to steal data on emerging technology they were developing.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Real Reasons Why the C-Suite Isn't Complying with Security πŸ•΄

Is the C-suite really that bad at following security policy? Or is it a case of mixed messages and misunderstanding?

πŸ“– Read

via "Dark Reading: ".
17:10
❌ Facebook Sues NSO Group Over Alleged WhatsApp Hack ❌

In a new lawsuit, WhatsApp owner Facebook says that NSO Group was behind the WhatsApp zero-day exploits earlier in 2019.

πŸ“– Read

via "Threatpost".
17:23
πŸ•΄ Old RAT, New Moves: Adwind Hides in Java Commands to Target Windows πŸ•΄

The Adwind remote access Trojan conceals malicious activity in Java commands to slip past threat intelligence tools and steal user data.

πŸ“– Read

via "Dark Reading: ".
17:31
ATENTIONβ€Ό New - CVE-2012-2945

Hadoop 1.0.3 contains a symlink vulnerability.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2012-1187

Bitlbee does not drop extra group privileges correctly in unix.c

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2012-0046

mediawiki allows deleted text to be exposed

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2011-4931

gpw generates shorter passwords than required

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2011-2538

Cisco Video Communications Server (VCS) before X7.0.3 contains a command injection vulnerability which allows remote, authenticated attackers to execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2011-0428

Cross Site Scripting (XSS) in ikiwiki before 3.20110122 could allow remote attackers to insert arbitrary JavaScript due to insufficient checking in comments.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2010-4237

Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack.

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2010-3375

qtparted has insecure library loading which may allow arbitrary code execution

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2010-3373

paxtest handles temporary files insecurely

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2009-3887

ytnef has directory traversal

πŸ“– Read

via "National Vulnerability Database".
17:31
ATENTIONβ€Ό New - CVE-2009-3723

asterisk allows calls on prohibited networks

πŸ“– Read

via "National Vulnerability Database".
17:40
❌ Australia Proposes Facial Recognition to Watch Porn ❌

The proposal would require biometrics systems to verify age before allowing visits to adult sites.

πŸ“– Read

via "Threatpost".
?
19:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2012-0694

SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code.

πŸ“– Read

via "National Vulnerability Database".
19:26
ATENTIONβ€Ό New - CVE-2011-1408

ikiwiki before 3.20110608 allows remote attackers to hijack root's tty and run symlink attacks.

πŸ“– Read

via "National Vulnerability Database".
19:26
ATENTIONβ€Ό New - CVE-2010-1678

Mapserver 5.2, 5.4 and 5.6 before 5.6.5-2 improperly validates symbol index values during Mapfile parsing.

πŸ“– Read

via "National Vulnerability Database".
?
21:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-2064

rpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.

πŸ“– Read

via "National Vulnerability Database".
21:31
ATENTIONβ€Ό New - CVE-2010-2061

rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.

πŸ“– Read

via "National Vulnerability Database".
30 October 2019
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Uber sues LA in bid to protect scooter riders’ geolocation data ⚠

The anonymized real-time location data the city's after can easily be associated with riders, thereby jeopardizing their privacy, Uber says.

πŸ“– Read

via "Naked Security".
?
08:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook launches $2m suit against alleged phishing, hacking sites ⚠

Facebook is using trademark law to target the operators of sites that imitate or target Facebook and Instagram sites.

πŸ“– Read

via "Naked Security".
08:49
⚠ Sextortion scammers are hijacking blogs – and victims are paying up ⚠

Sextortion scammers have started hijacking poorly managed or defunct blogs to expand an increasingly profitable business.

πŸ“– Read

via "Naked Security".
?
09:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Got an early iPhone or iPad? Update now or turn it into a paperweight ⚠

Calling Apple iPhone 5, iPhone 4s or early iPad owners - your device may be about to turn into a vintage technology paperweight.

πŸ“– Read

via "Naked Security".
?
09:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ City of Johannesburg, on Second Hit, Refuses to Pay Ransom ❌

A Shadow Kill Hackers attack that compromised the city’s network and shut down key services was the second ransom-related attack on the city in months.

πŸ“– Read

via "Threatpost".
?
10:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Android Malware Plaguing 45K Devices Remains A Mystery ❌

The source of infection behind an increasingly precarious mobile malware is causing researchers to scratch their heads.

πŸ“– Read

via "Threatpost".
?
11:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MSPs Can Now Provide Managed Detection and Response with Cynet 360 ❌

MDR providers can provide a first-of-its-kind solution: Protection across the endpoints, user accounts and the network itself, in one solution.

πŸ“– Read

via "Threatpost".
11:11
πŸ” 74% of employees say their company is a new tech laggard πŸ”

A Zensar survey of 1,000 workers also found that 45% said a successful company should adopt new tech faster than anyone else.

πŸ“– Read

via "Security on TechRepublic".
11:21
πŸ” Python support added to Threat Stack's Application Security Monitoring tool πŸ”

The utility can identify insecure code in production from third-party packages as well as original code.

πŸ“– Read

via "Security on TechRepublic".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hacking Phones: How Law Enforcement Is Saving Privacy πŸ•΄

It's no longer true that society must choose to either weaken everybody's privacy or let criminals run rampant.

πŸ“– Read

via "Dark Reading: ".
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 10 'Secure' Ways to Start a Conversation πŸ•΄

Should you find yourself at a loss for words ...

πŸ“– Read

via "Dark Reading: ".
?
12:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to help make your Chromebook as secure as possible: 6 tips πŸ”

Find out how to better secure your chromebook with these easy tips.

πŸ“– Read

via "Security on TechRepublic".
?
13:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Murky Details Surround Bed, Bath and Beyond Breach ❌

The housewares giant disclosed a breach with few details-- but security researchers have some theories.

πŸ“– Read

via "Threatpost".
14:04
πŸ›  Ansvif 1.12 πŸ› 

Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
14:18
πŸ•΄ 8 Trends in Vulnerability and Patch Management πŸ•΄

Unpatched flaws continue to be a major security issue for many organizations.

πŸ“– Read

via "Dark Reading: ".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Email Threats Poised to Haunt Security Pros into Next Decade πŸ•΄

Decentralized threat intel sharing, more public-private collaboration, and greater use of automated incident response are what's needed to combat phishing

πŸ“– Read

via "Dark Reading: ".
15:10
❌ U.S. Universities Get Failing Grades for DMARC Adoption ❌

Of the 200 schools in the report, the University of Pittsburgh and Georgetown University received top marks, with their DMARC policy set to "reject."

πŸ“– Read

via "Threatpost".
15:21
πŸ” How to protect your business against phishing attacks that exploit major tech brands πŸ”

Users of Microsoft, PayPal, DHL, and Dropbox are among the top targets of phishers, according to a new report from cloud service provider Akamai.

πŸ“– Read

via "Security on TechRepublic".
15:31
ATENTIONβ€Ό New - CVE-2011-2186

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:35
❌ WhatsApp Spyware Attack: Uncovering NSO Group Activity ❌

JohnΒ Scott Railton with Citizen Lab, who helped WhatsApp investigate the NSO Group over the alleged WhatsApp hack, said the subsequent lawsuit is a "certified big deal."

πŸ“– Read

via "Threatpost".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Pros Fear Insider Attacks Stem from Cloud Apps πŸ•΄

More than half of security practitioners surveyed say insider attack detection has grown more difficult since migrating to cloud.

πŸ“– Read

via "Dark Reading: ".
?
16:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Attack Hits Las Cruces, New Mexico Public Schools πŸ•΄

The attack early in the morning of October 29 has taken all of the school district's systems offline.

πŸ“– Read

via "Dark Reading: ".
16:48
πŸ•΄ Facebook Says Israeli Firm Was Involved in Recent WhatsApp Intrusion πŸ•΄

Evidence suggests NSO Group used WhatsApps servers to distribute mobile spyware to targeted devices.

πŸ“– Read

via "Dark Reading: ".
16:48
❌ Insurance Pays Out a Sliver of Norsk Hydro’s Cyberattack Damages ❌

The company received $3.6 million in cyber insurance - out of $71 million incurred in damages after a massive March cyberattack.

πŸ“– Read

via "Threatpost".
16:56
πŸ” How to avoid malware on Android in one easy step πŸ”

Jack Wallen offers up his best advice for avoiding malware on Android.

πŸ“– Read

via "Security on TechRepublic".
?
17:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Europe Brings Enterprise-Grade Cybersecurity Insights to London πŸ•΄

Don't miss all the promising enterprise security Briefings at Black Hat Europe in London this December.

πŸ“– Read

via "Dark Reading: ".
?
17:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity's 'Moral Imperative' πŸ•΄

Cybersecurity professionals often talk about the economic drivers of security. But should the conversation shift to include a moral component? At least one analyst says "yes."

πŸ“– Read

via "Dark Reading: ".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ As Phishing Kits Evolve, Their Lifespans Shorten πŸ•΄

Most phishing kits last less than 20 days, a sign defenders are keeping up in the race against cybercrime.

πŸ“– Read

via "Dark Reading: ".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2013-1391

Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2010-0207

In xpdf, the xref table contains an infinite loop which allows remote attackers to cause a denial of service (application crash) in xpdf-based PDF viewers.

πŸ“– Read

via "National Vulnerability Database".
19:31
ATENTIONβ€Ό New - CVE-2010-0206

xpdf allows remote attackers to cause a denial of service (NULL pointer dereference and crash) in the way it processes JBIG2 PDF stream objects.

πŸ“– Read

via "National Vulnerability Database".
?
21:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-1673

A cross-site scripting (XSS) vulnerability in ikiwiki before 3.20101112 allows remote attackers to inject arbitrary web script or HTML via a comment.

πŸ“– Read

via "National Vulnerability Database".
21:33
ATENTIONβ€Ό New - CVE-2010-0749

Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame.

πŸ“– Read

via "National Vulnerability Database".
21:33
ATENTIONβ€Ό New - CVE-2010-0748

Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link.

πŸ“– Read

via "National Vulnerability Database".
21:33
ATENTIONβ€Ό New - CVE-2010-0747

drbd8 allows local users to bypass intended restrictions for certain actions via netlink packets, similar to CVE-2009-3725.

πŸ“– Read

via "National Vulnerability Database".
21:33
ATENTIONβ€Ό New - CVE-2010-0737

A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.

πŸ“– Read

via "National Vulnerability Database".
21:33
ATENTIONβ€Ό New - CVE-2010-0398

The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.

πŸ“– Read

via "National Vulnerability Database".
?
23:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Digital Guardian Announces Special Offer for Symantec DLP Customers πŸ”

Post-acquisition, Symantec DLP customers looking to reduce vendor uncertainty should take advantage of this exclusive offer.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
31 October 2019
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WhatsApp sues spyware maker for allegedly hacking phones worldwide ⚠

WhatsApp has publicly attributed the attack on its users in May 2019 to the Israeli spyware makers, NSO Group.

πŸ“– Read

via "Naked Security".
?
09:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Researchers find hole in EU-wide identity system ⚠

The EU has fixed a flaw in the powerful yet complex eIDAS digital identification system that let people authenticate as someone else.

πŸ“– Read

via "Naked Security".
10:02
⚠ Judge lambasts porn company for spewing copyright lawsuits ⚠

A US court shielded ISP account holders from a request for expedited discovery to see whose IP addresses were used to share pirated videos.

πŸ“– Read

via "Naked Security".
10:09
❌ Valve Source Engine, Fortnite Servers Crippled By Gafgyt Variant ❌

Servers hosting Valve Source Engine and popular games like Fortnite are targeted by a new variant of the Gafgyt botnet.

πŸ“– Read

via "Threatpost".
10:19
❌ Fake Voicemail/Office 365 Attack Targets Enterprise Execs ❌

Executives at high-profile companies are being targeted by a fake voicemail campaign hunting for Office 365 credentials.

πŸ“– Read

via "Threatpost".
10:22
⚠ Linux maintainer: Patching side-channel flaws is killing performance ⚠

Mirror, mirror on the wall, which is the worst side-channel vulnerability of them all?

πŸ“– Read

via "Naked Security".
?
10:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ICS Attackers Set Inflict More Damage with Evolving Tactics ❌

While it remains difficult to attack critical infrastructure successfully, adversaries aim to use past experience to launch more destructive future attacks, according to analysis.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 Ways Data Vampires Are Bleeding Your Sensitive Information πŸ•΄

Pull a Van Helsing on those sucking the lifeblood from your data and intellectual property.

πŸ“– Read

via "Dark Reading: ".
?
11:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why organizations feel vulnerable to insider attacks πŸ”

More than half of cybersecurity professionals believe detecting insider attacks has become harder since the migration to the cloud.

πŸ“– Read

via "Security on TechRepublic".
11:56
πŸ” How schools can better protect themselves against cyberattacks πŸ”

Reported cyberattacks against K-12 schools in the US have hit 301 so far in 2019 compared to 124 in 2018 and 218 in 2017, according to a new report from security provider Barracuda Networks.

πŸ“– Read

via "Security on TechRepublic".
12:04
πŸ›  Falco 0.18.0 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to locate and close an open port in Linux πŸ”

Locating and blocking unwanted open ports in Linux should be a task every network admin knows how to do.

πŸ“– Read

via "Security on TechRepublic".
?
13:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ China-Linked Hackers Spy on Texts With MessageTap Malware ❌

Chinese state-sponsored hackers are attacking telecom networks to sniff out SMS messages that contain keywords revolving around political dissidents.

πŸ“– Read

via "Threatpost".
?
14:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ex-Pipeline Workers Charged with Stealing Data for Competing Firm πŸ”

These ex-employees copied trade secrets onto private storage devices then bragged that their new business would soon be competing with it.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Office 365 Phishing Scam Leaves A Voicemail πŸ•΄

A fake voice message lures victims to a fake Microsoft 365 login page that prompts them to enter credentials.

πŸ“– Read

via "Dark Reading: ".
15:09
πŸ•΄ Quantifying Security Results to Justify Costs πŸ•΄

The CISO job isn't to protect the entire business from all threats for any budget. It's to spell out what level of protection executives can expect for a given budget.

πŸ“– Read

via "Dark Reading: ".
?
15:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-2490

Mumble: murmur-server has DoS due to malformed client query

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2009-5043

burn allows file names to escape via mishandled quotation marks

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2009-5042

python-docutils allows insecure usage of temporary files

πŸ“– Read

via "National Vulnerability Database".
15:33
ATENTIONβ€Ό New - CVE-2009-5041

overkill has buffer overflow via long player names that can corrupt data on the server machine

πŸ“– Read

via "National Vulnerability Database".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Coalfire CEO Wants Criminal Charges Against His Employees Dropped πŸ•΄

Felony charges against two employees tasked with testing the physical security of the Dallas County, Iowa, courthouse have been lessened, but that's not enough, CEO says.

πŸ“– Read

via "Dark Reading: ".
15:59
❌ Calypso APT Emerges from the Shadows to Target Governments ❌

Researchers believe the threat group is based in China.

πŸ“– Read

via "Threatpost".
?
17:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Chinese Cyber Espionage Group Steals SMS Messages via Telco Networks πŸ•΄

APT41's new campaign is latest to highlight trend by Chinese threat groups to attack upstream service providers as a way to reach its intended targets, FireEye says.

πŸ“– Read

via "Dark Reading: ".
17:36
πŸ” How to configure SSH authentication to a FreeRADIUS server πŸ”

Find out how to configure FreeRADIUS as an SSH authentication server on Ubuntu.

πŸ“– Read

via "Security on TechRepublic".
17:36
πŸ” How to configure SSH authentication to a FreeRADIUS server πŸ”

Find out how to configure FreeRADIUS as an SSH authentication server on Ubuntu.

πŸ“– Read

via "Security on TechRepublic".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Slow Retreat from Python 2 Threatens Code Security πŸ•΄

The end of life is near for Python 2, and there will be no rising from the grave this time. So why are some companies and developers risking a lack of security patches to stay with the old version of the programming language?

πŸ“– Read

via "Dark Reading: ".
18:19
πŸ•΄ 32,000+ WiFi Routers Potentially Exposed to New Gafgyt Variant πŸ•΄

Researchers detect an updated Gafgyt variant that targets flaws in small office and home wireless routers from Zyxel, Huawei, and Realtek.

πŸ“– Read

via "Dark Reading: ".
?
19:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-2783

IcedTea6 before 1.7.4 allow unsigned apps to read and write arbitrary files, related to Extended JNLP Services.

πŸ“– Read

via "National Vulnerability Database".
19:28
ATENTIONβ€Ό New - CVE-2010-2548

IcedTea6 before 1.7.4 does not properly check property access, which allows unsigned apps to read and write arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
1 November 2019
?
07:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Hackers plead guilty to breach that Uber covered up ⚠

The two men pointed to Uber's $100K hush-money payment when they tried to extort Linkedin-owned Lynda... that instead called the cops.

πŸ“– Read

via "Naked Security".
?
08:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Twitter bans political ads ⚠

Interesting timing: Right before Facebook's earnings call, two weeks after Facebook said it won't pull political ads that spout lies.

πŸ“– Read

via "Naked Security".
?
09:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Android Keyboard App Could Swindle 40M Users Out of Millions ❌

The Ai.type app was removed from Google Play in June 2019 – but still remains on millions of Android devices and is still available from other Android marketplaces, researchers warn.

πŸ“– Read

via "Threatpost".
?
09:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Happy Birthday, CVE! ⚠

The Common Vulnerabilities and Exposures (CVE) system is 20 years old this week.

πŸ“– Read

via "Naked Security".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Raising Security Awareness: Why Tools Can't Replace People πŸ•΄

Training your people and building relationships outside of the security organization is the most significant investment a CISO can make.

πŸ“– Read

via "Dark Reading: ".
?
11:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2005-3056

TWiki allows arbitrary shell command execution via the Include function

πŸ“– Read

via "National Vulnerability Database".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple props up macOS Catalina with 10.15.1 update ⚠

A vocal minority of the committed Apple base has been quick to express dissatisfaction at the move to Catalina from macOS 10.14 Mojave.

πŸ“– Read

via "Naked Security".
12:21
πŸ” How to allow SSH connections from LAN and WAN on different ports πŸ”

Is it possible to configure SSH to listen for connections on both internal and external interfaces, using different ports? Jack Wallen says "yes."

πŸ“– Read

via "Security on TechRepublic".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Discloses Chrome Flaw Exploited in the Wild ❌

Google warns exploits in the wild against a Use After Free vulnerability in Chrome's audio component.

πŸ“– Read

via "Threatpost".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Holiday Security Tips for Retailers πŸ•΄

As retailers head into the holiday rush, here's how they can protect their businesses from attackers and scammers hoping to wreak havoc during the most wonderful time of the year.

πŸ“– Read

via "Dark Reading: ".
13:02
⚠ S2 Ep15: City under attack! VPN hacked, floppies nixed ⚠

A latest episode of the Naked Security podcast is out now!

πŸ“– Read

via "Naked Security".
?
14:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Patches Chrome Zero-Day Under Active Attack πŸ•΄

The fix addresses CVE-2019-13720, a high-severity, use-after-free vulnerability discovered by Kaspersky Lab researchers.

πŸ“– Read

via "Dark Reading: ".
14:14
❌ Stubborn Malware Targets QNAP NAS Hardware Specifically ❌

QNAP Systems says there is no known way to remove the Qsnatch malware infecting its NAS devices besides a full factory reset.

πŸ“– Read

via "Threatpost".
14:19
❌ Global Crime Ring Bilks U.S. Military Members, Vets Out of Millions ❌

An elaborate fraudster ring stole PII then used DoD and VA benefits portals to steal payments and funds from bank accounts.

πŸ“– Read

via "Threatpost".
14:26
πŸ” How to copy a file from one server to another from a third with SSH πŸ”

Find out how to work some SSH magic, by transferring a file from one machine to another from a third.

πŸ“– Read

via "Security on TechRepublic".
14:34
πŸ›  Samhain File Integrity Checker 4.4.0 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
14:34
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.3.11 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
14:34
πŸ•΄ Details of Attack on Electric Utility Emerge πŸ•΄

The March 5 DDoS attack interrupted communications between generating facilities and the electrical grid in three western states.

πŸ“– Read

via "Dark Reading: ".
?
15:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 11/1 Edition πŸ”

The hackers behind Uber's 2016 breach finally plead guilty, WhatsApp pushes back against NSO Group, and an army admin steals millions from veterans - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: APTs, Office 365 Voicemail Phish and Bed Bath & Beyond Breach ❌

Threatpost editors discuss this week's biggest news - from a data breach of Bed Bath & Beyond, a tricky phishing attack and widespread APT activity.Β 

πŸ“– Read

via "Threatpost".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Wanted: More women hackers πŸ”

Capture the Flag challenge encourages women to pursue cybersecurity careers and connects experts with newcomers

πŸ“– Read

via "Security on TechRepublic".
17:33
ATENTIONβ€Ό New - CVE-2005-2351

Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.

πŸ“– Read

via "National Vulnerability Database".
17:33
ATENTIONβ€Ό New - CVE-2005-2350

Cross-site scripting (XSS) vulnerability in websieve v0.62 allows remote attackers to inject arbitrary web script or HTML code in the web user interface.

πŸ“– Read

via "National Vulnerability Database".
17:39
πŸ•΄ Free & Discounted Security Services Now Available for US Election Orgs πŸ•΄

Nonprofit Defending Digital Campaigns (DDC) offers security services for email, user education, mobile, and encrypted communications, to federal election committees.

πŸ“– Read

via "Dark Reading: ".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Solar, Wind Power Utility Disrupted in Rare Cyberattack ❌

A simple attack on an unpatched server could have been catastrophic for the Utah-based utility.

πŸ“– Read

via "Threatpost".
?
19:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Office for Mac Users Warned of Malicious SYLK Files ❌

Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protections.

πŸ“– Read

via "Threatpost".
?
19:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2005-2352

I race condition in Temp files was found in gs-gpl before 8.56 addons scripts.

πŸ“– Read

via "National Vulnerability Database".
4 November 2019
?
07:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 21 stories of the week ⚠

Roundup: From updating macOS Catalina and old i-devices, to the ransomware attack that took a city offline - and everything in between.

πŸ“– Read

via "Naked Security".
?
08:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US grounds Chinese-made drones as part of security review ⚠

The exception: drones being used in emergencies, such as fighting wildfires, search and rescue, and dealing with natural disasters.

πŸ“– Read

via "Naked Security".
08:27
❌ BlueKeep Attacks Have Arrived, Are Initially Underwhelming ❌

The first attacks that exploit the zero-day Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential.

πŸ“– Read

via "Threatpost".
?
09:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Undercover reporter tells all after working for a Polish troll farm ⚠

Together with her troll colleagues, she managed 200 fake social profiles, promoted clients’ products, and trolled their competitors.

πŸ“– Read

via "Naked Security".
09:09
πŸ•΄ New: 2019 State of the Internet / Security: Phishing - Baiting the Hook πŸ•΄

Phishing attacks require two things: a lure and a landing. This Akamai-sponsored report digs deep into how the phishing economy works and ways organizations can protect themselves from the ever-evolving threat.

πŸ“– Read

via "Dark Reading: ".
?
09:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Pentagon publishes AI guidelines ⚠

As the specter of warrior robots looms large, the Pentagon has published a set of ethical guidelines for its use of artificial intelligence.

πŸ“– Read

via "Naked Security".
09:53
⚠ Russia’s sovereign internet law comes into force ⚠

The new law compels the country’s ISPs to forward all data arriving and departing from their networks through special gateway servers.

πŸ“– Read

via "Naked Security".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ To Secure Multicloud Environments, First Acknowledge You Have a Problem πŸ•΄

Multicloud environments change rapidly. Organizations need a security framework that is purpose-built for the cloud and that aligns with their digital transformation strategy.

πŸ“– Read

via "Dark Reading: ".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
12:34
πŸ•΄ How HR and IT Can Partner to Improve Cybersecurity πŸ•΄

With their lens into the human side of business, human resources can be an effective partner is the effort to train employees on awareness and keep an organization secure.

πŸ“– Read

via "Dark Reading: ".
12:37
❌ BEC Scam Costs Media Giant Nikkei $29 Million ❌

In September, a Nikkei America employee transferred $29 million to BEC scammers who were purporting to be a Nikkei executive.

πŸ“– Read

via "Threatpost".
12:51
πŸ•΄ In-Depth πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
13:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Remote Code Execution Flaw Found in Open Source rConfig Utility ❌

The network configuration management utility has two unpatched critical remote code execution vulnerabilities.

πŸ“– Read

via "Threatpost".
?
14:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs ❌

Wake-on-LAN and ARP pinging have expanded Ryuk's reach into corporate LANs -- and its operators' monetization abilities.

πŸ“– Read

via "Threatpost".
14:44
πŸ•΄ Sumo Logic Buys JASK Labs to Tackle SOC Challenges πŸ•΄

Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.

πŸ“– Read

via "Dark Reading: ".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ First Bluekeep Exploit Found in the Wild πŸ•΄

Crashing honeypots alerted the researcher who found the Bluekeep vulnerability.

πŸ“– Read

via "Dark Reading: ".
?
17:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple developers – get this update to protect the rest of us! ⚠

Know any Apple developers? Make sure they're signed up to Apple's security advisories, and getting their developer updates.

πŸ“– Read

via "Naked Security".
17:07
πŸ” Don’t Believe the FUD from the DLP Wannabes: Digital Guardian Supports macOS πŸ”



πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:22
❌ Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam ❌

Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands.

πŸ“– Read

via "Threatpost".
?
18:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2005-4890

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

πŸ“– Read

via "National Vulnerability Database".
?
19:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magecart Groups Attack Simultaneous Sites in Card-Theft Frenzy ❌

Stealing payment-card data and PII from e-commerce sites has become so lucrative that some are being targeted by multiple groups at the same time.

πŸ“– Read

via "Threatpost".
19:34
πŸ•΄ Microsoft Tools Focus on Insider Risk, Data Protection at Ignite 2019 πŸ•΄

New tools and updates aimed at addressing ongoing challenges with insider threats and sensitive data classification.

πŸ“– Read

via "Dark Reading: ".
?
20:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-3662

TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows SQL Injection on the backend.

πŸ“– Read

via "National Vulnerability Database".
20:34
πŸ•΄ Microsoft Security Setting Ironically Increases Risks for Office for Mac Users πŸ•΄

Excel's handling of an old macro format gives unauthenticated remote attackers a way to take control of vulnerable systems, Carnegie Mellon's CERT/CC says.

πŸ“– Read

via "Dark Reading: ".
5 November 2019
?
07:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Police interrogate Alexa for clues in fatal spear-stabbing ⚠

A friend heard a couple arguing but couldn't make out what it was about. Police hope that Alexa might have a better idea.

πŸ“– Read

via "Naked Security".
?
08:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Eye Clinic Breach Reveals Data of 20,000 Patients ❌

Incident that exposed emails to a PayPal scam once again highlights the persistent nature of third-party security risk.

πŸ“– Read

via "Threatpost".
?
09:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Florida city sends $742K to fraudsters as it bites the BEC hook ⚠

β€œHere's our new bank account number,” the scammers said. When the real construction firm sent their invoice, payment was made to the crooks.

πŸ“– Read

via "Naked Security".
?
11:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google patches bug that let nearby hackers send malware to your phone ⚠

Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victim's phone

πŸ“– Read

via "Naked Security".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Enterprise Web Security: Risky Business πŸ•΄

Web development is at much more risk than commonly perceived. As attackers eye the enterprise, third-party code provides an easy way in.

πŸ“– Read

via "Dark Reading: ".
12:19
πŸ” Top 5 additional ways to fend off ransomware πŸ”

In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.

πŸ“– Read

via "Security on TechRepublic".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Trump, Putin and Politics Name-Dropped to Peddle Malware ❌

Cybercriminals are leveraging political names and figures for social engineering as the elections loom.

πŸ“– Read

via "Threatpost".
13:10
πŸ” Top 5 additional ways to fend off ransomware πŸ”

In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.

πŸ“– Read

via "Security on TechRepublic".
?
14:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-0737 (jboss_operations_network)

A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.

πŸ“– Read

via "National Vulnerability Database".
14:31
ATENTIONβ€Ό New - CVE-2010-0398 (autokey)

The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.

πŸ“– Read

via "National Vulnerability Database".
14:33
⚠ Office for Mac 2011 users warned about SYLK file format ⚠

Still running Office 2011 on a Mac? If so, there are at least two reasons why that might not be a good idea.

πŸ“– Read

via "Naked Security".
14:44
πŸ•΄ Proofpoint Acquires ObserveIT to Bolster DLP Capabilities πŸ•΄

The $225 million acquisition will help Proofpoint expand its data loss prevention capabilities with email, CASB, and data at rest.

πŸ“– Read

via "Dark Reading: ".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How Microsoft and Digital Guardian Help Protect Your Sensitive Data πŸ”

Digital Guardian, through its integration with Microsoft Information Protection, helps enrich Microsoft’s data loss prevention capabilities.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
15:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How boot camps may fill the need for more white hats in the US πŸ”

New study: 3 in 5 have experienced discrimination in the workplace

πŸ“– Read

via "Security on TechRepublic".
15:40
πŸ” How boot camps may fill the need for more white hats in the US πŸ”

Cyberspace is the fifth domain of warfare, yet there is a critical shortage of security experts ready to combat cybercrime.

πŸ“– Read

via "Security on TechRepublic".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The State of Email Security and Protection πŸ•΄

Phishing and ransomware top the list of security risks that organizations are not fully prepared to deal with.

πŸ“– Read

via "Dark Reading: ".
16:09
πŸ•΄ 10 Tips for Building Compliance by Design into Cloud Architecture πŸ•΄

A pair of experts pass along lessons learned while building out the team and processes necessary to support Starbucks' mobile app.

πŸ“– Read

via "Dark Reading: ".
16:19
πŸ•΄ Disclosure Does Little to Dissuade Cyber Spies πŸ•΄

In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations.

πŸ“– Read

via "Dark Reading: ".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Edge Cartoon Contest: Need a Lift? πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
16:44
πŸ•΄ In-Depth πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
17:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Launches OpenTitan Project to Open Source Chip Security πŸ•΄

OpenTitan is an open source collaboration among Google and technology companies to strengthen root-of-trust chip design.

πŸ“– Read

via "Dark Reading: ".
?
18:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-2222

The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.

πŸ“– Read

via "National Vulnerability Database".
18:27
ATENTIONβ€Ό New - CVE-2010-2064 (rpcbind)

rpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.

πŸ“– Read

via "National Vulnerability Database".
18:27
ATENTIONβ€Ό New - CVE-2010-2061 (rpcbind)

rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.

πŸ“– Read

via "National Vulnerability Database".
18:27
ATENTIONβ€Ό New - CVE-2005-2354

Nvu 0.99+1.0pre uses an old copy of Mozilla XPCOM which can result in multiple security issues.

πŸ“– Read

via "National Vulnerability Database".
?
18:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CrowdStrike Adds New Products & Web Store Apps πŸ•΄

Company introduces Falcon for AWS, Falcon Firewall Management, and third-party applications.

πŸ“– Read

via "Dark Reading: ".
?
19:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Siemens PLC Feature Can Be Exploited for Evil - and for Good πŸ•΄

A hidden feature in some newer models of the vendor's programmable logic controllers leaves the devices open to attack. Siemens says it plans to fix it.

πŸ“– Read

via "Dark Reading: ".
6 November 2019
?
03:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2007-2841

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-3947. Reason: This candidate is a reservation duplicate of CVE-2007-3947. Notes: All CVE users should reference CVE-2007-3947 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2007-0899

There is a possible heap overflow in libclamav/fsg.c before 0.100.0.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2006-4245

archivemail 0.6.2 uses temporary files insecurely leading to a possible race condition.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2006-4243

linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2006-3100

termpkg 3.3 suffers from buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2006-0062

xlockmore 5.13 allows potential xlock bypass when FVWM switches to the same virtual desktop as a new Gaim window.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2006-0061

xlockmore 5.13 and 5.22 segfaults when using libpam-opensc and returns the underlying xsession. This allows unauthorized users access to the X session.

πŸ“– Read

via "National Vulnerability Database".
?
07:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΅ Free antivirus apps requesting huge amounts of dangerous permissions they don’t need πŸ•΅


πŸ“– Read

via "VPNpro".
08:05
⚠ Founders of β€˜worthless cryptocurrency’ ATM Coin fined over $4.25m scam ⚠

Invest in "binary options," they said, neglecting to mention the software set up to rig transactions so that customers lost the gamble.

πŸ“– Read

via "Naked Security".
?
09:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware attacks in Spain leave radio station in β€œhysteria” ⚠

A ransomware attack has ransacked at least two Spanish companies, leaving their employees without computer access.

πŸ“– Read

via "Naked Security".
?
09:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Mozilla says ISPs are lying to Congress about encrypted DNS ⚠

Mozilla on Friday posted a letter urging Congress to take the broadband industry's lobbying against encrypted DNS within Firefox and Chrome with a grain of salt.

πŸ“– Read

via "Naked Security".
?
10:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Smartphone and speaker voice assistants can be hacked using lasers ⚠

Researchers have discovered that some voice assistants will accept β€œsignal injection” commands sent to them using pulses of laser light.

πŸ“– Read

via "Naked Security".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Presentation Template: Build Your 2020 Security Plan ❌

The 2020Β Security Plan PPT template helps security professionals engage their organization's decision-makers and gets their backing for critical security decisions.

πŸ“– Read

via "Threatpost".
11:02
❌ Google Analytics Emerges as a Phishing Tool ❌

Web analytics help phishers hone their attacks -- but website defenders can also use these tactics to better detect the scope of attacks and mitigate their effects.

πŸ“– Read

via "Threatpost".
11:06
πŸ” IBM develops financial services-ready public cloud πŸ”

A new platform is being unveiled that is aimed at banks and their suppliers. The goal is to help them adhere to strict industry regulatory compliance, security and resiliency requirements.

πŸ“– Read

via "Security on TechRepublic".
?
11:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Emotet Resurgence Continues With New Tactics, Techniques and Procedures ❌

Since Emotet came out of hibernation last month, researchers are seeing the banking trojan's authors take on a consistent trend of new evasion tactics and social engineering techniques.

πŸ“– Read

via "Threatpost".
11:44
πŸ•΄ A Warning From Weird Al πŸ•΄

Should you get an e-mail with the subject 'stinky cheese'...

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ•΄ A Warning From Weird Al πŸ•΄

Should you get an e-mail with the subject 'stinky cheese'...

πŸ“– Read

via "Dark Reading: ".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Uphill Battle of Triaging Alerts πŸ•΄

Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it.

πŸ“– Read

via "Dark Reading: ".
?
13:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to locate and close an open port in Linux πŸ”

Locating and blocking unwanted open ports in Linux should be a task every network admin knows how to do.

πŸ“– Read

via "Security on TechRepublic".
13:22
πŸ›  Bluto 2.4.16 πŸ› 

Bluto is a dns reconnaissance, vulnerability checking, and enumeration tool.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
13:22
πŸ›  AIEngine 1.9.1 πŸ› 

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
13:26
πŸ” How to copy a file from one server to another from a third with SSH πŸ”

Find out how to work some SSH magic, by transferring a file from one machine to another from a third.

πŸ“– Read

via "Security on TechRepublic".
13:32
❌ DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks ❌

The group was exposed after a ShadowBrokers leak.

πŸ“– Read

via "Threatpost".
?
13:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook Privacy Breach: 100 Developers Improperly Accessed Data ❌

Facebook said that 100+ third-party app developers had access to restricted data for members of Groups, in its latest privacy snafu.

πŸ“– Read

via "Threatpost".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ California DMV Leak Spills Data from Thousands of Drivers πŸ•΄

Federal agencies reportedly had improper access to Social Security data belonging to 3,200 license holders.

πŸ“– Read

via "Dark Reading: ".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybercriminals using Google Analytics to enhance phishing efforts πŸ”

A report from security firm Akamai found that hackers were using analytics services to optimize their phishing efforts.

πŸ“– Read

via "Security on TechRepublic".
15:22
πŸ” FBI, NIH Continue Biomed Research Theft Probe πŸ”

A report in the New York Times this week revealed how widespread the theft of biomedical secrets is at U.S. universities and research institutions.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Social Media: Corporate Cyber Espionage's Channel of Choice πŸ•΄

Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage.

πŸ“– Read

via "Dark Reading: ".
?
16:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-2471

drupal6 version 6.16 has open redirection

πŸ“– Read

via "National Vulnerability Database".
16:33
ATENTIONβ€Ό New - CVE-2010-2446

Rbot Reaction plugin allows command execution

πŸ“– Read

via "National Vulnerability Database".
16:33
ATENTIONβ€Ό New - CVE-2010-2247

makepasswd 1.10 default settings generate insecure passwords

πŸ“– Read

via "National Vulnerability Database".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What a Security Products Blacklist Means for End Users and Integrators πŸ•΄

A recent US Commerce Department blacklist of several Chinese entities leaves a looming question: What happens if your products are now prohibited?

πŸ“– Read

via "Dark Reading: ".
?
18:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2009-5050

konversation before 1.2.3 allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
18:28
ATENTIONβ€Ό New - CVE-2009-5049

WebApp JSP Snoop page XSS in jetty though 6.1.21.

πŸ“– Read

via "National Vulnerability Database".
18:28
ATENTIONβ€Ό New - CVE-2009-5048

Cookie Dump Servlet stored XSS vulnerability in jetty though 6.1.20.

πŸ“– Read

via "National Vulnerability Database".
18:28
ATENTIONβ€Ό New - CVE-2009-5046

JSP Dump and Session Dump Servlet XSS in jetty before 6.1.22.

πŸ“– Read

via "National Vulnerability Database".
18:28
ATENTIONβ€Ό New - CVE-2009-5045

Dump Servlet information leak in jetty before 6.1.22.

πŸ“– Read

via "National Vulnerability Database".
18:28
ATENTIONβ€Ό New - CVE-2009-5043 (burn, debian_linux)

burn allows file names to escape via mishandled quotation marks

πŸ“– Read

via "National Vulnerability Database".
18:28
ATENTIONβ€Ό New - CVE-2009-5042 (debian_linux, python-docutils)

python-docutils allows insecure usage of temporary files

πŸ“– Read

via "National Vulnerability Database".
18:32
❌ Trend Micro: Rogue Employee Sold Customer Data for 68K Accounts ❌

Trend Micro customers whose data was sold are getting scam calls from criminals purporting to be support staff.

πŸ“– Read

via "Threatpost".
18:39
πŸ•΄ Google Announces App Defense Alliance πŸ•΄

The industry partnership will scan apps for malware before they're published on the Google Play Store.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Accounting Scams Continue to Bilk Businesses πŸ•΄

Yes, ransomware is plaguing businesses and government organizations, but impersonators inserting themselves into financial workflows - most often via e-mail - continue to enable big paydays.

πŸ“– Read

via "Dark Reading: ".
19:22
❌ You’ve Been Served…with Subpoena-Themed Phishing Emails ❌

A targeted campaign is delivering an information-stealing malware called Predator the Thief.

πŸ“– Read

via "Threatpost".
19:32
❌ Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security ❌

Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks.

πŸ“– Read

via "Threatpost".
7 November 2019
?
09:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Warrant let police search online DNA database ⚠

This is a "game changer" when it comes to genetic privacy rights, experts say.

πŸ“– Read

via "Naked Security".
09:21
⚠ Facebook scam steals famous faces and BBC branding ⚠

An email scam from earlier this year has resurfaced on Facebook - don't fall for it!

πŸ“– Read

via "Naked Security".
?
09:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Q&A: Hacking a '90s Sports Car πŸ•΄

Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.

πŸ“– Read

via "Dark Reading: ".
09:49
πŸ•΄ Kaspersky Lab Analysis Shines Light on DarkUniverse APT Group πŸ•΄

Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.

πŸ“– Read

via "Dark Reading: ".
09:55
⚠ Facebook confesses 100 devs may have accessed leaked Groups data ⚠

It shut down that access in April 2018, or at least thought it did. At least 11 improperly accessed data in the last two months.

πŸ“– Read

via "Naked Security".
10:02
❌ Google Enlists Help to Fight Bad Android Apps ❌

After years of unsuccessfully battling malware and bad apps in the Google Play store and on more than 2.5 billion Android devices, Google is finally doing something about it. The tech giant this week unveiled an alliance with three companies with specific expertise in endpoint security to help prevent the spread of malware on its […]

πŸ“– Read

via "Threatpost".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Pilot presses the wrong button, triggers airport hostage alarm ⚠

We've all been there - faced with a button that is just begging to be pressed...

πŸ“– Read

via "Naked Security".
10:20
⚠ Linux users warned to update libarchive to beat flaw ⚠

The bug is identified as CVE-2019-18408, a high-priority β€˜use-after-free’ bug when dealing with a failed archive.

πŸ“– Read

via "Naked Security".
?
10:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Data Breach Fines: Are They Working to Boost Consumer Safety? ❌

Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise.

πŸ“– Read

via "Threatpost".
?
11:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WordPress sites hit by malvertising ⚠

An old piece of malware is storming the WordPress community, enabling its perpetrators to take control of sites and inject code of their choosing.

πŸ“– Read

via "Naked Security".
11:16
πŸ” You've got malware: Malicious actors are waiting in your inbox πŸ”

Dangerous URL messages, the resurgence of Emotet, and banking trojans flood the cyberthreat landscape, Proofpoint found.

πŸ“– Read

via "Security on TechRepublic".
11:16
πŸ” IBM social engineer easily hacked two journalists' information πŸ”

A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.

πŸ“– Read

via "Security on TechRepublic".
11:17
❌ How to Secure Critical Infrastructure When Patching Isn’t Possible ❌

Mission-critical systems can't just be switched off to apply security updates -- so patching can take weeks if not years.

πŸ“– Read

via "Threatpost".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Cold Truth about Cyber Insurance πŸ•΄

There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.

πŸ“– Read

via "Dark Reading: ".
12:16
πŸ›  Travesty 1.0 πŸ› 

Travesty is a tool that can leverage a known directory traversal to assist in identifying interesting directories and files.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:18
⚠ S2 Ep16: BlueKeep, ransomware and sextortion – Naked Security Podcast ⚠

BlueKeep's back, ransomware batters Spain, and yet more sextortion - listen now!

πŸ“– Read

via "Naked Security".
?
12:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Gamers Hit with Nvidia GPU Driver, GeForce Flaws ❌

Vulnerabilities in several PC gaming products offered by Nvidia can lead to escalation of privilege, denial of service and other malicious attacks.

πŸ“– Read

via "Threatpost".
12:51
πŸ” How can you protect yourself from hackers? An IBM social engineer offers advice πŸ”

Stephanie "Snow" Carruthers, Chief People Hacker at IBM, gives advice about protecting yourself online. She also explains how the robocalls and spoofing process works.

πŸ“– Read

via "Security on TechRepublic".
12:51
πŸ” How a hacker at IBM uses disguises and devices to steal private information πŸ”

An IBM X-Force Red team member explains how her background in makeup and sales helps her social engineering career. Also, she demonstrates how cybercriminals can easily clone your work ID badge.

πŸ“– Read

via "Security on TechRepublic".
13:01
πŸ” How cybercriminals trick you into giving your information over the phone πŸ”

IBM's Chief People Hacker Stephanie "Snow" Carruthers describes how criminals use caller ID spoofing to get your private data.

πŸ“– Read

via "Security on TechRepublic".
?
14:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft is ending support for Windows 7 and Windows Server 2008: Here's what you need to know. πŸ”

Support for Windows 7 and Server 2008 is ending in January 2020. Here's how to protect your systems.

πŸ“– Read

via "Security on TechRepublic".
14:09
πŸ•΄ Find New Talent, Don't Fight Over CISSPs: Insights from (ISC)2 COO πŸ•΄

The skills gap will only be closed by attracting and retaining new talent. So don't limit your talent search to CISSPs, says the COO of the organization that issues the CISSP certification.

πŸ“– Read

via "Dark Reading: ".
14:09
πŸ•΄ PayPal Upsets Microsoft as Phishers' Favorite Brand πŸ•΄

Several factors edged the world's most popular payment service into the top spot.

πŸ“– Read

via "Dark Reading: ".
?
14:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Amazon Kindle, Embedded Devices Open to Code-Execution ❌

Flaws in Das U-Boot affect third-party hardware that uses the universal bootloader as an underlying component.

πŸ“– Read

via "Threatpost".
?
15:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Kaspersky Lab Analysis Shines Light on DarkUniverse APT Group πŸ•΄

Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.

πŸ“– Read

via "Dark Reading: ".
15:24
πŸ•΄ Capital One Shifts Its CISO to New Role πŸ•΄

The bank is searching for a new chief information security officer months after its major data breach.

πŸ“– Read

via "Dark Reading: ".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ To Prove Cybersecurity's Worth, Create a Cyber Balance Sheet πŸ•΄

How tying and measuring security investments to business impacts can elevate executives' understanding and commitment to cyber-risk reduction.

πŸ“– Read

via "Dark Reading: ".
16:28
ATENTIONβ€Ό New - CVE-2010-2250

Drupal 6.x before 6.16 uses a user-supplied value in output during site installation which could allow an attacker to craft a URL and perform a cross-site scripting attack.

πŸ“– Read

via "National Vulnerability Database".
16:28
ATENTIONβ€Ό New - CVE-2010-2243

A vulnerability exists in kernel/time/clocksource.c in the Linux kernel before 2.6.33 where on non-GENERIC_TIME systems (GENERIC_TIME=n), accessing /sys/devices/system/clocksource/clocksource0/current_clocksource results in an OOPS.

πŸ“– Read

via "National Vulnerability Database".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ex-Twitter Employees Spied on Saudi Dissidents: DoJ ❌

The DoJ charges former Twitter employees for allegedly accessing thousands of accounts on behalf of Saudi Arabia.

πŸ“– Read

via "Threatpost".
16:56
πŸ” How to control location tracking on your iPhone in iOS 13 πŸ”

The latest version of iOS offers some convenient ways to manage location tracking by apps.

πŸ“– Read

via "Security on TechRepublic".
16:57
πŸ” Breaches at Two Maine Healthcare Providers Exposes Data on 52,000 πŸ”

Two breaches at healthcare providers in Maine recently led to the exposure of 52,000 patients' protected health information.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Can I Help My Team Manage Security Alerts? πŸ•΄

Smart prioritization, great staff and supportive tools are a good start.

πŸ“– Read

via "Dark Reading: ".
?
19:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Might I Be Worsening the Problem of Alert Fatigue? πŸ•΄

Security operations must focus on three key areas: detection, response, and prediction.

πŸ“– Read

via "Dark Reading: ".
19:59
πŸ•΄ How Can I Help My Team Manage Security Alerts? πŸ•΄

Smart prioritization, great staff, and supportive tools are a good start.

πŸ“– Read

via "Dark Reading: ".
20:09
πŸ•΄ TA542 Brings Back Emotet with Late September Spike πŸ•΄

Overall volumes of banking Trojans and RATs increased during the third quarter, when Emotet was suspiciously absent until mid-September.

πŸ“– Read

via "Dark Reading: ".
?
20:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2007-5743

viewvc 1.0.3 allows improper access control to files in a repository when using the "forbidden" configuration option.

πŸ“– Read

via "National Vulnerability Database".
20:28
ATENTIONβ€Ό New - CVE-2007-3915

Mondo 2.24 has insecure handling of temporary files.

πŸ“– Read

via "National Vulnerability Database".
20:28
ATENTIONβ€Ό New - CVE-2007-3732

In Linux 2.6 before 2.6.23, the TRACE_IRQS_ON function in iret_exc calls a C function without ensuring that the segments are set properly. The kernel's %fs needs to be restored before the call in TRACE_IRQS_ON and before enabling interrupts, so that "current" references work. Without this, "current" used in the window between iret_exc and the middle of error_code where %fs is reset, would crash.

πŸ“– Read

via "National Vulnerability Database".
20:29
πŸ•΄ Twitter & Trend Micro Fall Victim to Malicious Insiders πŸ•΄

The companies are the latest on a long and growing list of organizations that have fallen victim to users with legitimate access to enterprise systems and data.

πŸ“– Read

via "Dark Reading: ".
?
21:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft wants to kill the password using FIDO2 security for better authentication πŸ”

Andrew Conway, general manager for Microsoft 365 Security, discusses how to prevent credential theft by relying on biometric security.

πŸ“– Read

via "Security on TechRepublic".
21:46
πŸ” Handling endpoint security without overwhelming professionals with information overload πŸ”

Chris Bell, director of product management at Secureworks, describes the difficult balance to strike for presenting actionable information to security professionals without exhausting them with information overload.

πŸ“– Read

via "Security on TechRepublic".
21:46
πŸ” How Barracuda leverages Microsoft Azure to deliver application security to customers πŸ”

Nitzan Miron, VP of application security services at Barracuda Networks, discusses the Azure-delivered WAF-as-a-Service product offering announced at Microsoft Ignite 2019

πŸ“– Read

via "Security on TechRepublic".
?
22:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2008-7291

gri before 2.12.18 generates temporary files in an insecure way.

πŸ“– Read

via "National Vulnerability Database".
22:28
ATENTIONβ€Ό New - CVE-2008-7272

FireGPG before 0.6 handle userΓ―ΒΏΒ½s passphrase and decrypted cleartext insecurely by writing pre-encrypted cleartext and the user's passphrase to disk which may result in the compromise of secure communication or a usersΓ―ΒΏΒ½s private key.

πŸ“– Read

via "National Vulnerability Database".
22:28
ATENTIONβ€Ό New - CVE-2008-5083

In JON 2.1.x before 2.1.2 SP1, users can obtain unauthorized security information about private resources managed by JBoss ON.

πŸ“– Read

via "National Vulnerability Database".
22:28
ATENTIONβ€Ό New - CVE-2008-3278

frysk packages through 2008-08-05 as shipped in Red Hat Enterprise Linux 5 are built with an insecure RPATH set in the ELF header of multiple binaries in /usr/bin/f* (e.g. fcore, fcatch, fstack, fstep, ...) shipped in the package. A local attacker can exploit this vulnerability by running arbitrary code as another user.

πŸ“– Read

via "National Vulnerability Database".
22:28
ATENTIONβ€Ό New - CVE-2007-6745

clamav 0.91.2 suffers from a floating point exception when using ScanOLE2.

πŸ“– Read

via "National Vulnerability Database".
8 November 2019
?
08:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Another Facebook hoax: Robbers still throwing eggs at car windows? ⚠

Bandits? Egg hurling?! Up to 92.5% visibility obscured??!! Don't share this turkey, but do let us know if you decide to test your wipers!

πŸ“– Read

via "Naked Security".
?
08:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Leak of 4,000 Facebook documents heaps more trouble on internet giant ⚠

This week’s bold rebrand of Facebook to FACEBOOK can’t hide the growing sense that nobody is happy with the company right now.

πŸ“– Read

via "Naked Security".
09:05
⚠ IT services pro hacked former client’s email ⚠

An IT project manager has pleaded guilty to accessing the email account of a former client's CEO, said reports this week.

πŸ“– Read

via "Naked Security".
09:12
❌ Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials ❌

Attackers could access Wi-Fi credentials due to a problem in initial configuration of the smart doorbell device.

πŸ“– Read

via "Threatpost".
?
10:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails ❌

From voice assistant hacks to insider threats, Threatpost editors break down this week's biggest news.

πŸ“– Read

via "Threatpost".
?
11:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Small-Business Password Managers πŸ•΄

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.

πŸ“– Read

via "Dark Reading: ".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 Principles to Simplify Security πŸ•΄

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.

πŸ“– Read

via "Dark Reading: ".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ring Flaw Underscores Impact of IoT Vulnerabilities πŸ•΄

A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

πŸ“– Read

via "Dark Reading: ".
13:12
❌ Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers ❌

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories.

πŸ“– Read

via "Threatpost".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hospital Cyberattacks Linked to Increase in Heart Attack Mortality πŸ•΄

Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.

πŸ“– Read

via "Dark Reading: ".
?
15:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Art Imitates Life: Lessons from the Final Season of Mr. Robot ❌

Unlike Elliot, real-world adversaries don’t have lofty ideals nor do they suffer crises of conscience.

πŸ“– Read

via "Threatpost".
?
16:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Bugcrowd Pays Out Over $500K in Bounties in One Week πŸ•΄

In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.

πŸ“– Read

via "Dark Reading: ".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Ways to Soothe a Stressed-Out Incident Response Team πŸ•΄

IR teams are under tremendous pressure, often working long hours and putting their needs aside amid a security crisis. Their care is just as important as policy and procedure.

πŸ“– Read

via "Dark Reading: ".
16:52
❌ Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone ❌

Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies.

πŸ“– Read

via "Threatpost".
?
18:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” VMware rolls out new Carbon Black security suite and Dell partnership πŸ”

The company announced at VMworld 2019 Europe in Barcelona how it will integrate Carbon Black into its suite of tools.

πŸ“– Read

via "Security on TechRepublic".
18:01
πŸ” How to obscure open ports with knockd πŸ”

Learn how to obfuscate SSH login with port knocking.

πŸ“– Read

via "Security on TechRepublic".
18:11
πŸ” How to obscure open ports with knockd πŸ”

Learn how to obfuscate SSH login with port knocking.

πŸ“– Read

via "Security on TechRepublic".
?
18:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Platinum APT Shines Up New Titanium Backdoor ❌

The trojan was observed as the final payload in a sophisticated and complex malware installation code set.

πŸ“– Read

via "Threatpost".
9 November 2019
?
03:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2009-5004

qpid-cpp 1.0 crashes when a large message is sent and the Digest-MD5 mechanism with a security layer is in use .

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2009-4011

dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS console.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2009-3614

liboping 1.3.2 allows users reading arbitrary files upon the local system.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2009-3552

In RHEV-M VDC 2.2.0, it was found that the SSL certificate was not verified when using the client-side Red Hat Enterprise Virtualization Manager interface (a Windows Presentation Foundation (WPF) XAML browser application) to connect to the Red Hat Enterprise Virtualization Manager. An attacker on the local network could use this flaw to conduct a man-in-the-middle attack, tricking the user into thinking they are viewing the Red Hat Enterprise Virtualization Manager when the content is actually attacker-controlled, or modifying actions a user requested Red Hat Enterprise Virtualization Manager to perform.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2009-2802

MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks.

πŸ“– Read

via "National Vulnerability Database".
03:38
ATENTIONβ€Ό New - CVE-2009-0035

alsa-utils 1.0.19 and later versions allows local users to overwrite arbitrary files via a symlink attack via the /usr/bin/alsa-info and /usr/bin/alsa-info.sh scripts.

πŸ“– Read

via "National Vulnerability Database".
11 November 2019
?
06:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – the hot 23 stories of the week ⚠

From hackable voice assistants to ISPs allegedly lying about encrypted DNS, and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
?
07:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Huge Airbnb scam leads to promise to vet every host, every listing ⚠

Shuffling people into - surprise! - cobwebby rat traps has been a snap. Actual vetting may help, plus a new guarantee of 100% refunds.

πŸ“– Read

via "Naked Security".
?
08:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US military supplier in β€˜Made in America’ fraud case ⚠

Aventura allegedly imported cheap cameras and network-enabled security gear from China, then slapped US flag stickers on them.

πŸ“– Read

via "Naked Security".
08:53
⚠ AI wordsmith too dangerous to be released… has been released ⚠

The text-generating AI has only been released in neutered forms until now, for fear it would be used to mass-produce fake news and spam.

πŸ“– Read

via "Naked Security".
?
09:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New: 2019 State of the Internet / Security: Media Under Assault πŸ•΄

It can't be overstated: Web attacks and credential stuffing are real, long-term threats. This white paper, sponsored by Akamai, focuses on how they are impacting the high-tech, video media, and entertainment sectors.

πŸ“– Read

via "Dark Reading: ".
09:18
⚠ Adobe fixes SDK weakness affecting mobile apps ⚠

Researchers noticed that the main app configuration file, ADBMobileConfig.json, contained settings that could lead to security problems.

πŸ“– Read

via "Naked Security".
?
10:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Encrypted Emails on macOS Found Stored in Unprotected Way ❌

Apple is investigating an issue raised by a Mac specialist discovered to be storing emails that are supposed to be S/MIME-encrypted as readable files.

πŸ“– Read

via "Threatpost".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Security Processes You Shouldn't Overlook During M&A πŸ•΄

Security needs to be a central element of due diligence if a merger or acquisition is to succeed

πŸ“– Read

via "Dark Reading: ".
12:18
πŸ” FBI: Engineer Stole, Emailed Tech Secrets to Iran πŸ”

This engineer purportedly stole sensitive aerospace technology from his employer and emailed it his brother in the Iranian military.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
12:27
❌ Ransomware Attack Downs Hosting Service SmarterASP.NET ❌

SmarterASP.NET said that it is in the middle of recovering accounts downed by the ransomware attack.

πŸ“– Read

via "Threatpost".
?
12:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to navigate cybersecurity in a 5G world πŸ”

With 5G comes a larger attack surface and more devices accessing the network. Companies must ramp up security strategies to stay protected, AT&T report finds.

πŸ“– Read

via "Security on TechRepublic".
12:56
πŸ” Open source is a heavily interdependent community, which is good and bad for security πŸ”

Commentary: Open source is a tangled web of interdependencies. How can we do better to secure this web?

πŸ“– Read

via "Security on TechRepublic".
13:03
⚠ Microsoft urges us to patch after partially effective BlueKeep attack ⚠

Microsoft has urged people to patch their Windows systems following the appearance of mass BlueKeep exploits just over a week ago.

πŸ“– Read

via "Naked Security".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ThreatList: Data Breaches Batter Stock Prices at Public Companies, For Months ❌

When it comes to bouncing back, long-term impact to share prices from a data breach incident is significant on average for large companies.

πŸ“– Read

via "Threatpost".
?
16:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Learn the Latest Exploit Techniques at Black Hat Europe πŸ•΄

Master new exploit techniques for Microsoft RDP, Java remote protocols at Black Hat Europe in London next month.

πŸ“– Read

via "Dark Reading: ".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Joker's Stash Puts $130M Price Tag on Credit Card Database πŸ•΄

A new analysis advises security teams on what they should know about the underground payment card seller.

πŸ“– Read

via "Dark Reading: ".
?
17:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Why we must strike a balance with AI to solve the cybersecurity skills gap πŸ”

How to solve the cybersecurity skills gap by striking a balance with artificial intelligence.

πŸ“– Read

via "Security on TechRepublic".
17:16
πŸ” Why we must strike a balance with AI to solve the cybersecurity skills gap πŸ”

How to solve the cybersecurity skills gap by striking a balance with artificial intelligence.

πŸ“– Read

via "Security on TechRepublic".
?
18:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Account Fraud Harder to Detect as Criminals Move from Bots to 'Sweat Shops' πŸ•΄

Cheap labor, frequent data breaches, and better fraud detection technology are fueling frustrating changes in attackers' methods.

πŸ“– Read

via "Dark Reading: ".
?
19:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ OpenText to Buy Carbonite for $800M Cash, in $1.42B Deal πŸ•΄

The acquisition was confirmed just six months after Carbonite bought Webroot.

πŸ“– Read

via "Dark Reading: ".
19:42
πŸ•΄ Researchers Find New Approach to Attacking Cloud Infrastructure πŸ•΄

Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.

πŸ“– Read

via "Dark Reading: ".
?
20:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DDoS Attacks Target Amazon, SoftLayer and Telecom Infrastructure ❌

The specific type of TCP attack used in the recent spate of DDoS efforts were TCP SYN-ACK reflection attacks.

πŸ“– Read

via "Threatpost".
?
22:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Credit-card regulation compliance down, but being compliant boosts cybersecurity πŸ”

An annual Verizon report looks at how complete compliance to credit-card payment-regulations can boost business, save time and money, and maintain safe cybersecurity.

πŸ“– Read

via "Security on TechRepublic".
12 November 2019
?
07:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ ASP.NET hosting provider recovering from ransomware attack ⚠

With more than 440,000 customers, SmarterASP.NET is said to be one of the most popular ASP.NET hosting providers.

πŸ“– Read

via "Naked Security".
?
08:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Sextortionist whisks away sex tapes using just a phone number ⚠

The SIM-swap victim knew he was in trouble when he got a 3:30 a.m. message about his phone service being cut off.

πŸ“– Read

via "Naked Security".
?
08:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft to Apply California’s Privacy Law to All U.S. Users ❌

The move takes a broader stand to protect user data and support the requirements of CCPA nationwide.

πŸ“– Read

via "Threatpost".
09:03
⚠ Nvidia patches graphics products and GeForce Experience update tool ⚠

The update fixes 11 mainly high-severity security flaws in Windows and GeForce graphics card drivers, including three in the program used to update them.

πŸ“– Read

via "Naked Security".
09:08
⚠ Apple to fix Siri bug that exposed parts of encrypted emails ⚠

Apple may care about your privacy but that doesn't mean it gets it right all the time, especially when it comes to training its Siri AI assistant.

πŸ“– Read

via "Naked Security".
?
12:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Cyber-Risk Is a C-Suite Issue πŸ•΄

Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.

πŸ“– Read

via "Dark Reading: ".
12:02
πŸ” Reasonable doubt: Only 17% of CISOs believe their stack is "completely effective" against attacks πŸ”

An overabundance of confidence can lead to blind spots, but a Nominet report finds widespread doubt in organizations' security posture.

πŸ“– Read

via "Security on TechRepublic".
?
12:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How firewall automation can help prevent breaches caused by wrong configurations πŸ”

A majority of IT staffers polled by firewall management service FireMon said they still use manual processes to manage changes.

πŸ“– Read

via "Security on TechRepublic".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS Attack Targets UK Labour Party Weeks Ahead of Election πŸ•΄

Cybercriminals tried to take the Labour Party's digital platforms offline weeks before the election on December 12.

πŸ“– Read

via "Dark Reading: ".
15:12
πŸ•΄ SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing? πŸ•΄

The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.

πŸ“– Read

via "Dark Reading: ".
15:13
❌ Adobe Patches Critical Bugs in Illustrator, Media Encoder ❌

Adobe’s monthly patch load is low for November, with only three critical bugs fixed and eight important.

πŸ“– Read

via "Threatpost".
15:18
❌ Magento Warns E-Commerce Sites to Upgrade ASAP to Prevent Attacks ❌

The platform is a favorite target for the Magecart collective of card-skimming threat groups.

πŸ“– Read

via "Threatpost".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intel Warns of Critical Info-Disclosure Bug in Security Engine ❌

The issue is in an Intel chip used for remote management.

πŸ“– Read

via "Threatpost".
16:27
πŸ” IBM social engineer easily hacked two journalists' information πŸ”

A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.

πŸ“– Read

via "Security on TechRepublic".
16:32
πŸ” Counterterrorism expert: Small healthcare companies are the new ransomware targets πŸ”

MonsterCloud CEO says RYUK attacks can be fatal for businesses that can't afford to pay the ransom or to get help from experts.

πŸ“– Read

via "Security on TechRepublic".
?
16:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Senator Seeking Answers Following Medical Image Breach πŸ”

In wake of a massive breach, a U.S. Senator is pressing the U.S. Department of Health and Human Services to explain how it oversees medical imaging security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What happens when your healthcare data is stolen or held for ransom? It depends πŸ”

Hospitals are reluctant to disclose attacks, and regulations don't offer clear advice about what to tell patients.

πŸ“– Read

via "Security on TechRepublic".
?
17:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Disclose New Vulnerabilities in Windows Drivers πŸ•΄

Attackers could take advantage of simple design flaws in widely distributed drivers to gain control over Windows systems.

πŸ“– Read

via "Dark Reading: ".
18:07
πŸ•΄ The Myths of Multifactor Authentication πŸ•΄

Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back?

πŸ“– Read

via "Dark Reading: ".
18:18
❌ Plugging the Data Leak in Manufacturing ❌

IIoT-generated data – calibrations, measurements and other parameters – still need to be stored, managed and shared securely.

πŸ“– Read

via "Threatpost".
18:22
πŸ•΄ New DDoS Attacks Leverage TCP Amplification πŸ•΄

Attackers over the past month have been using a rarely seen approach to disrupt services at large organizations in several countries.

πŸ“– Read

via "Dark Reading: ".
?
18:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Patches RCE Bug Actively Under Attack ❌

Microsoft tackles 74 bugs as part of its November Patch Tuesday security bulletin.

πŸ“– Read

via "Threatpost".
?
19:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Insider Threats, a Cybercriminal Favorite, Not East to Mitigate ❌

Rogue employees -- not just external threat groups -- pose a formidable threat to incident response teams.

πŸ“– Read

via "Threatpost".
19:22
πŸ•΄ Microsoft Patches IE Zero-Day Among 74 Vulnerabilities πŸ•΄

The November Patch Tuesday update fixed 13 critical flaws, including a zero-day bug in Internet Explorer.

πŸ“– Read

via "Dark Reading: ".
?
19:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Companies Increasingly Fail Interim Security Test, But Gap Narrows πŸ•΄

Stability of PCI DSS helps companies cope and create more mature security programs, but some parts of the Payment Card Industry's Data Secure Standard continue to cause headaches.

πŸ“– Read

via "Dark Reading: ".
?
20:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2010-2247 (makepasswd)

makepasswd 1.10 default settings generate insecure passwords

πŸ“– Read

via "National Vulnerability Database".
20:42
πŸ•΄ While CISOs Fret, Business Leaders Tout Security Robustness πŸ•΄

A new Nominet survey shows a familiar disconnect between business and security teams on the matter of cyber preparedness.

πŸ“– Read

via "Dark Reading: ".
13 November 2019
?
08:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ No, YouTube isn’t planning to jettison your unprofitable channel ⚠

Or your small/new channel, or to shut you down if you use an ad blocker, though a clause in its new ToS is leading people to fear the worst.

πŸ“– Read

via "Naked Security".
08:33
⚠ Microsoft says it will honor California’s new privacy law across US ⚠

Microsoft said CCPA is good news, given the failure of Congress to pass a comprehensive privacy protection law at the federal level.

πŸ“– Read

via "Naked Security".
?
08:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Federal Court: Suspicionless Search of Traveler Devices by Border Agents Is Unconstitutional ❌

U.S. Customs agents now must have reasonable cause and suspicion to search traveler devices at points of entry.

πŸ“– Read

via "Threatpost".
?
09:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US-CERT warns of critical flaws in Medtronic equipment ⚠

Medtronic's latest problem is in their Valleylab electrosurgical generators used by surgeons things like cauterisation during operations.

πŸ“– Read

via "Naked Security".
?
09:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple pulls Instagram-watching app from store ⚠

Apple has yanked an app from its iTunes App Store that allowed Instagram users to follow their friends’ activities on the social network.

πŸ“– Read

via "Naked Security".