๐ Friday Five: 2/21 Edition ๐
๐ Read
via "Subscriber Blog RSS Feed ".
Chinese hackers breach online gambling sites, CISA warns of ransomware attacks across the critical infrastructure sector, and more - catch up on the week's news with the Friday Five.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 2/21 Edition
Chinese hackers breach online gambling sites, CISA warns of ransomware attacks across the critical infrastructure sector, and more - catch up on the week's news with the Friday Five.
๐ด California Man Arrested for Politically Motivated DDoS ๐ด
๐ Read
via "Dark Reading: ".
The distributed denial-of-service attacks took a congressional candidate's website offline for a total of 21 hours during the campaign for office.๐ Read
via "Dark Reading: ".
Darkreading
California Man Arrested for Politically Motivated DDoS
The distributed denial-of-service attacks took a congressional candidate's website offline for a total of 21 hours during the campaign for office.
๐ 70% of IT leaders say security concerns restrict adoption of public cloud ๐
๐ Read
via "Security on TechRepublic".
While the concerns are legitimate, Barracuda also wants IT professionals to know that practical solutions exist.๐ Read
via "Security on TechRepublic".
TechRepublic
70% of IT leaders say security concerns restrict adoption of public cloud
While the concerns are legitimate, Barracuda also wants IT professionals to know that practical solutions exist.
๐ 92% of Americans would delete an app that sold their personal information ๐
๐ Read
via "Security on TechRepublic".
Smartphone users don't want government encryption backdoors and would rather read "terms and conditions" than watch the movie "Cats."๐ Read
via "Security on TechRepublic".
TechRepublic
92% of Americans would delete an app that sold their personal information
Smartphone users don't want government encryption backdoors and would rather read "terms and conditions" than watch the movie "Cats."
ATENTIONโผ New - CVE-2013-3587
๐ Read
via "National Vulnerability Database".
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2012-6277
๐ Read
via "National Vulnerability Database".
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to "a number of underlying issues" in which "some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code."๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2012-0844
๐ Read
via "National Vulnerability Database".
Information-disclosure vulnerability in Netsurf through 2.8 due to a world-readable cookie jar.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2012-0828
๐ Read
via "National Vulnerability Database".
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).๐ Read
via "National Vulnerability Database".
๐ MGM Hotel breach highlights need for sophisticated cloud security ๐
๐ Read
via "Security on TechRepublic".
Cybercriminals posted the information of more than 10 million customers on a hacker forum a year after the initial attack on a cloud server.๐ Read
via "Security on TechRepublic".
TechRepublic
MGM Hotel breach highlights need for sophisticated cloud security
Cybercriminals posted the information of more than 10 million customers on a hacker forum a year after the initial attack on a cloud server.
โ Active Attacks Target Popular Duplicator WordPress Plugin โ
๐ Read
via "Threatpost".
When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then.๐ Read
via "Threatpost".
Threat Post
Active Attacks Target Popular Duplicator WordPress Plugin
When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then.
๐ 5 best practices for IIoT project success ๐
๐ Read
via "Security on TechRepublic".
Based on years of pilot projects and proofs-of-concept, the Industrial Internet Consortium has detailed the best-practices organizations can use to ensure successful deployments.๐ Read
via "Security on TechRepublic".
TechRepublic
5 best practices for IIoT project success
Based on years of pilot projects and proofs-of-concept, the Industrial Internet Consortium has detailed the best practices organizations can use to ensure successful deployments.
โ Lawsuit Claims Google Collects Minorsโ Locations, Browsing History โ
๐ Read
via "Threatpost".
A new lawsuit alleges that Googleโs G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.๐ Read
via "Threatpost".
Threat Post
Lawsuit Claims Google Collects Minorsโ Locations, Browsing History
A new lawsuit alleges that Googleโs G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.
ATENTIONโผ New - CVE-2012-1093
๐ Read
via "National Vulnerability Database".
The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.๐ Read
via "National Vulnerability Database".
๐ด Emotet Malware Rears Its Ugly Head Again ๐ด
๐ Read
via "Dark Reading: ".
A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.๐ Read
via "Dark Reading: ".
Darkreading
Emotet Malware Rears Its Ugly Head Again
A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.
๐ด All About SASE: What It Is, Why It's Here, How to Use It ๐ด
๐ Read
via "Dark Reading: ".
Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments.๐ Read
via "Dark Reading: ".
Dark Reading
All About SASE: What It Is, Why It's Here, How to Use It
Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments.
๐ Wapiti Web Application Vulnerability Scanner 3.0.3 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Wapiti Web Application Vulnerability Scanner 3.0.3 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
โ Monday review โ the hot 25 stories of the week โ
๐ Read
via "Naked Security".
From malware attacks to malicious browser extensions - and everything in between. It's your weekly security roundup.๐ Read
via "Naked Security".
Naked Security
Monday review โ the hot 25 stories of the week
From malware attacks to malicious browser extensions โ and everything in between. Itโs your weekly security roundup.
โ Apple chops Safariโs TLS certificate validity down to one year โ
๐ Read
via "Naked Security".
From 1 September 2020, Safari will no longer trust SSL/TLS certificates with more than a year on the clock.๐ Read
via "Naked Security".
Naked Security
SSL/TLS certificate validity chopped down to one year by Appleโs Safari
From 1 September 2020, Safari will no longer trust SSL/TLS certificates with more than a year on the clock.
๐ด 7 Tips to Improve Your Employees' Mobile Security ๐ด
๐ Read
via "Dark Reading: ".
Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.๐ Read
via "Dark Reading: ".
Darkreading
7 Tips to Improve Your Employees' Mobile Security
Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.
๐ต Major vulnerabilities found in top free VPN apps on Google Play store ๐ต
๐ Read
via "VPNpro".
๐ Read
via "VPNpro".
VPNpro
Major vulnerabilities found in top free VPN apps on Google Play store
Our research uncovered that the top free VPN apps on the Play store are affected by critical MITM vulnerabilities. You should delete these apps immediately.