ATENTIONβΌ New - CVE-2012-0785
π Read
via "National Vulnerability Database".
Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."π Read
via "National Vulnerability Database".
π 3D map shows how the coronavirus is spreading worldwide π
π Read
via "Security on TechRepublic".
A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.π Read
via "Security on TechRepublic".
TechRepublic
American cases added to 3D map showing the spread of COVID-19
The outbreak is slowing down in China while the WHO warns the rest of the world to "pull out all the stops" to control the spread of the illness.
β Apple Takes Heat Over βVulnerableβ iOS Cut-and-Paste Data β
π Read
via "Threatpost".
Software developer builds a malicious proof-of-concept iOS app that can read data temporarily saved to the deviceβs clipboard.π Read
via "Threatpost".
Threat Post
Apple Takes Heat Over βVulnerableβ iOS Cut-and-Paste Data
Software developer builds a malicious proof-of-concept iOS app that can read data temporarily saved to the deviceβs clipboard.
Forwarded from π‘ Cybersecurity & Privacy π‘ - News
π€ͺπΈ SPECIAL OFFER! πΈπ€ͺ
CYBERSECURITY 2020 by WILEY π
βοΈ Secure yourself a new bundle of cybersecurity ebooks! Get ebooks like Cryptography Engineering: Design Principles and Practical Applications, Reversing: Secrets of Reverse Engineering, Social Engineering: The Science of Human Hacking, and more.
βͺοΈ $959 Worth of awesome ebooks & videos βͺοΈ
β«οΈ Pay $1 or more β«οΈ
βͺοΈ DRM-Free βͺοΈ
β«οΈ Multi-format β«οΈ
π΄ Security, Networking Collaboration Cuts Breach Cost π΄
π Read
via "Dark Reading: ".
CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.π Read
via "Dark Reading: ".
Dark Reading
Security, Networking Collaboration Cuts Breach Cost
CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.
π Smishing, data theft by directors, and a new mental health focus π
π Read
via "Security on TechRepublic".
Security researchers and practitioners will be talking about a surge in SMS-based phishing attacks, the threat employees pose to data security, and how to improve health and wellness on security team members.π Read
via "Security on TechRepublic".
TechRepublic
Smishing, data theft by directors, and a new mental health focus
Security researchers and practitioners will be talking about a surge in SMS-based phishing attacks, the threat employees pose to data security, and how to improve health and wellness on security team members.
π΄ Verizon: Attacks on Mobile Devices Rise π΄
π Read
via "Dark Reading: ".
Companies of all sizes are being hit by mobile attacks and feeling the effects for extended periods of time, according to the 2020 Verizon Mobile Security Index.π Read
via "Dark Reading: ".
Dark Reading
Verizon: Attacks on Mobile Devices Rise
Companies of all sizes are being hit by mobile attacks and feeling the effects for extended periods of time, according to the 2020 Verizon Mobile Security Index.
π΄ Wanted: Hands-On Cybersecurity Experience π΄
π Read
via "Dark Reading: ".
Organizations lament a lack of qualified job candidates as they continue to struggle to hire and retain security teams, the new ISACA State of Cybersecurity 2020 report shows.π Read
via "Dark Reading: ".
Dark Reading
Wanted: Hands-On Cybersecurity Experience
Organizations lament a lack of qualified job candidates as they continue to struggle to hire and retain security teams, the new ISACA State of Cybersecurity 2020 report shows.
β Google denies illegally slurping data off free student Chromebooks β
π Read
via "Naked Security".
Nonsense! says Google in response to a lawsuit filed by New Mexico's AG, which accuses Google of violating COPPA's child privacy laws.π Read
via "Naked Security".
Naked Security
Google denies illegally slurping data off free student Chromebooks
Nonsense! says Google in response to a lawsuit filed by New Mexicoβs AG, which accuses Google of violating COPPAβs child privacy laws.
β Smart speakers mistakenly eavesdrop up to 19 times a day β
π Read
via "Naked Security".
That smart home speaker isn't listening to everything you say, according to new research - but it is listening a lot more than it should.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β The βCloud Snooperβ malware that sneaks into your Linux servers β
π Read
via "Naked Security".
Fascinating research from SophosLabs into a wolf-in-sheep's-clothing malware sample.π Read
via "Naked Security".
Naked Security
The βCloud Snooperβ malware that sneaks into your Linux servers
Fascinating research from SophosLabs into a wolf-in-sheepβs-clothing malware sample.
β Free Download: The Ultimate Security Prosβ Checklist β
π Read
via "Threatpost".
The Ultimate Security Prosβ Checklist fully maps the core duties of common security positions, from the core technical security aspect to team management and executive reporting.π Read
via "Threatpost".
Threat Post
Free Download: The Ultimate Security Prosβ Checklist
The Ultimate Security Prosβ Checklist fully maps the core duties of common security positions, from the core technical security aspect to team management and executive reporting.
β Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work β
π Read
via "Threatpost".
The Department of Homeland Security and two U.S. military branches already had discontinued use of the app based on concerns over Chinese data-security and censorship practices.π Read
via "Threatpost".
Threat Post
Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work
The Department of Homeland Security and two U.S. military branches already had discontinued use of the app based on concerns over Chinese data-security and censorship practices.
π΄ McAfee Acquires Light Point for Browser Isolation Tech π΄
π Read
via "Dark Reading: ".
Company plans to integrate Light Point Security's technology into the McAfee Secure Web Gateway and its Mvision UCE platform.π Read
via "Dark Reading: ".
Dark Reading
McAfee Acquires Light Point for Browser Isolation Tech
Company plans to integrate Light Point Security's technology into the McAfee Secure Web Gateway and its Mvision UCE platform.
π΄ Cybersecurity Industry: It's Time to Stop the Victim Blame Game π΄
π Read
via "Dark Reading: ".
There are far more ways to be helpful than adding to the noise of what a company probably did wrong.π Read
via "Dark Reading: ".
Darkreading
Cybersecurity Industry: It's Time to Stop the Victim Blame Game
There are far more ways to be helpful than adding to the noise of what a company probably did wrong.
π΄ Wendy Nather on How to Make Security 'Democratization' a Reality π΄
π Read
via "Dark Reading: ".
Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users, and start sharing control with them.π Read
via "Dark Reading: ".
Dark Reading
Wendy Nather on How to Make Security 'Democratization' a Reality
Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users -- and start sharing control with them.
π McAfee will acquire Light Point Security to help combat browser-based malware π
π Read
via "Security on TechRepublic".
The acquisition will allow McAfee to integrate browser isolation technology into its Secure Web Gateway product and MVISION Unified Cloud Edge platform.π Read
via "Security on TechRepublic".
TechRepublic
McAfee will acquire Light Point Security to help combat browser-based malware
The acquisition will allow McAfee to integrate browser isolation technology into its Secure Web Gateway product and MVISION Unified Cloud Edge platform.
π Falco 0.20.0 π
π Go!
via "Security Tool Files β Packet Storm".
Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Falco 0.20.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π WhatWeb Scanner 0.5.1 π
π Go!
via "Security Tool Files β Packet Storm".
WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
WhatWeb Scanner 0.5.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers