ATENTIONโผ New - CVE-2012-0828
๐ Read
via "National Vulnerability Database".
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).๐ Read
via "National Vulnerability Database".
๐ MGM Hotel breach highlights need for sophisticated cloud security ๐
๐ Read
via "Security on TechRepublic".
Cybercriminals posted the information of more than 10 million customers on a hacker forum a year after the initial attack on a cloud server.๐ Read
via "Security on TechRepublic".
TechRepublic
MGM Hotel breach highlights need for sophisticated cloud security
Cybercriminals posted the information of more than 10 million customers on a hacker forum a year after the initial attack on a cloud server.
โ Active Attacks Target Popular Duplicator WordPress Plugin โ
๐ Read
via "Threatpost".
When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then.๐ Read
via "Threatpost".
Threat Post
Active Attacks Target Popular Duplicator WordPress Plugin
When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then.
๐ 5 best practices for IIoT project success ๐
๐ Read
via "Security on TechRepublic".
Based on years of pilot projects and proofs-of-concept, the Industrial Internet Consortium has detailed the best-practices organizations can use to ensure successful deployments.๐ Read
via "Security on TechRepublic".
TechRepublic
5 best practices for IIoT project success
Based on years of pilot projects and proofs-of-concept, the Industrial Internet Consortium has detailed the best practices organizations can use to ensure successful deployments.
โ Lawsuit Claims Google Collects Minorsโ Locations, Browsing History โ
๐ Read
via "Threatpost".
A new lawsuit alleges that Googleโs G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.๐ Read
via "Threatpost".
Threat Post
Lawsuit Claims Google Collects Minorsโ Locations, Browsing History
A new lawsuit alleges that Googleโs G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.
ATENTIONโผ New - CVE-2012-1093
๐ Read
via "National Vulnerability Database".
The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.๐ Read
via "National Vulnerability Database".
๐ด Emotet Malware Rears Its Ugly Head Again ๐ด
๐ Read
via "Dark Reading: ".
A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.๐ Read
via "Dark Reading: ".
Darkreading
Emotet Malware Rears Its Ugly Head Again
A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.
๐ด All About SASE: What It Is, Why It's Here, How to Use It ๐ด
๐ Read
via "Dark Reading: ".
Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments.๐ Read
via "Dark Reading: ".
Dark Reading
All About SASE: What It Is, Why It's Here, How to Use It
Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments.
๐ Wapiti Web Application Vulnerability Scanner 3.0.3 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Wapiti Web Application Vulnerability Scanner 3.0.3 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
โ Monday review โ the hot 25 stories of the week โ
๐ Read
via "Naked Security".
From malware attacks to malicious browser extensions - and everything in between. It's your weekly security roundup.๐ Read
via "Naked Security".
Naked Security
Monday review โ the hot 25 stories of the week
From malware attacks to malicious browser extensions โ and everything in between. Itโs your weekly security roundup.
โ Apple chops Safariโs TLS certificate validity down to one year โ
๐ Read
via "Naked Security".
From 1 September 2020, Safari will no longer trust SSL/TLS certificates with more than a year on the clock.๐ Read
via "Naked Security".
Naked Security
SSL/TLS certificate validity chopped down to one year by Appleโs Safari
From 1 September 2020, Safari will no longer trust SSL/TLS certificates with more than a year on the clock.
๐ด 7 Tips to Improve Your Employees' Mobile Security ๐ด
๐ Read
via "Dark Reading: ".
Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.๐ Read
via "Dark Reading: ".
Darkreading
7 Tips to Improve Your Employees' Mobile Security
Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.
๐ต Major vulnerabilities found in top free VPN apps on Google Play store ๐ต
๐ Read
via "VPNpro".
๐ Read
via "VPNpro".
VPNpro
Major vulnerabilities found in top free VPN apps on Google Play store
Our research uncovered that the top free VPN apps on the Play store are affected by critical MITM vulnerabilities. You should delete these apps immediately.
โ Google purges 600 Android apps for โdisruptiveโ pop-up ads โ
๐ Read
via "Naked Security".
These apps plunk ads in front of us when we're trying to do something else, often leading to inadvertent ad clicks and much cursing.๐ Read
via "Naked Security".
Naked Security
Google purges 600 Android apps for โdisruptiveโ pop-up ads
These apps plunk ads in front of us when weโre trying to do something else, often leading to inadvertent ad clicks and much cursing.
๐ 16 best practices for improving cybersecurity ๐
๐ Read
via "Security on TechRepublic".
Cisco's 2020 CISO Benchmark Study links a robust patch policy and collaboration to smaller data breaches.๐ Read
via "Security on TechRepublic".
TechRepublic
16 best practices for improving cybersecurity
Cisco's 2020 CISO Benchmark Study links a robust patch policy and collaboration to smaller data breaches.
๐ The good, the bad, and the scary from Experian's data breach report ๐
๐ Read
via "Security on TechRepublic".
Many security teams don't update response plans on a regular basis but complying with GDPR is getting easier.๐ Read
via "Security on TechRepublic".
TechRepublic
The good, the bad, and the scary from Experian's data breach report
Many security teams don't update response plans on a regular basis but complying with GDPR is getting easier.
๐ Three things CISOs need to do differently in 2020 ๐
๐ Read
via "Security on TechRepublic".
Security leaders need to connect their work to broader business goals and create a culture of learning to attract talent.๐ Read
via "Security on TechRepublic".
TechRepublic
Three things CISOs need to do differently in 2020
Security leaders need to connect their work to broader business goals and create a culture of learning to attract talent.
โ KidsGuard stalkerware leaks data on secretly surveilled victims โ
๐ Read
via "Naked Security".
The company left a server open and unprotected, regurgitating private data slurped from thousands of surveilled people, including children.๐ Read
via "Naked Security".
Naked Security
KidsGuard stalkerware leaks data on secretly surveilled victims
The company left a server open and unprotected, regurgitating private data slurped from thousands of surveilled people, including children.
โ Data Breach Occurs at Agency in Charge of Secure White House Communications โ
๐ Read
via "Threatpost".
A leak at the Defense Information Systems Agency exposed personal information of government employees, including social security numbers.๐ Read
via "Threatpost".
Threat Post
Data Breach Occurs at Agency in Charge of Secure White House Communications
A leak at the Defense Information Systems Agency exposed personal information of government employees, including social security numbers.
๐ What is Cyber Insurance? ๐
๐ Read
via "Subscriber Blog RSS Feed ".
What is cyber insurance? Get a definition, learn why it's important, how it works, best practices, and more in this week's Data Protection 101, our series on the fundamentals of information security๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
What is Cyber Insurance?
What is cyber insurance? Get a definition, learn why it's important, how it works, best practices, and more in this week's Data Protection 101, our series on the fundamentals of information security.