π΄ 5 Ways to Up Your Threat Management Game π΄
π Read
via "Dark Reading: ".
Good security programs start with a mindset that it's not about the tools, it's what you do with them. Here's how to get out of a reactive fire-drill mode with vulnerability management.π Read
via "Dark Reading: ".
Darkreading
5 Ways to Up Your Threat Management Game
Good security programs start with a mindset that it's not about the tools, it's what you do with them. Here's how to get out of a reactive fire-drill mode with vulnerability management.
π΄ Kr00k Wi-Fi Vulnerability Affected a Billion Devices π΄
π Read
via "Dark Reading: ".
Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.π Read
via "Dark Reading: ".
Dark Reading
Kr00k Wi-Fi Vulnerability Affected a Billion Devices
Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.
β LTE vulnerability allows impersonation of other mobile devices β
π Read
via "Naked Security".
Researchers have found a way to impersonate mobile devices on 4G and 5G mobile networks, and are calling on operators and standards bodies to fix the flaw that caused it.π Read
via "Naked Security".
Naked Security
LTE vulnerability allows impersonation of other mobile devices
Researchers have found a way to impersonate mobile devices on 4G and 5G mobile networks, and are calling on operators and standards bodies to fix the flaw that caused it.
β Appleβs iOS pasteboard leaks location data to spy apps β
π Read
via "Naked Security".
A developer has discovered that malicious apps could exploit the pasteboard to work out a userβs location.π Read
via "Naked Security".
Naked Security
Appleβs iOS pasteboard leaks location data to spy apps
A developer has discovered that malicious apps could exploit the pasteboard to work out a userβs location.
π΄ Open Cybersecurity Alliance Releases New Language for Security Integration π΄
π Read
via "Dark Reading: ".
OpenDXL Ontology is intended to allow security components to interoperate right out of the box.π Read
via "Dark Reading: ".
Dark Reading
Open Cybersecurity Alliance Releases New Language for Security Integration
OpenDXL Ontology is intended to allow security components to interoperate right out of the box.
β Hackers Cashing In On Healthcare Industry Security Weaknesses β
π Read
via "Threatpost".
Between ransomware attacks on healthcare devices, malware-laced βmedicalβ apps, and fraud services available on the dark net, attackers are pushing the boundaries on targeting healthcare.π Read
via "Threatpost".
Threat Post
Hackers Cashing In On Healthcare Industry Security Weaknesses
Between ransomware attacks on healthcare devices, malware-laced βmedicalβ apps, and fraud services available on the dark net, attackers are pushing the boundaries on targeting healthcare.
π΄ Next-Gen SOC Is On Its Way and Here's What It Should Contain π΄
π Read
via "Dark Reading: ".
The next-gen-SOC starts with the next-gen SIEM, and Jason Mical of Devo Technology and Kevin Golas from OpenText talk about what capabilities are required, including threat hunting and greater automation, and how security professionals should exploit the tools.π Read
via "Dark Reading: ".
Dark Reading
Next-Gen SOC Is On Its Way and Here's What It Should Contain - Dark Reading
The next-gen-SOC starts with the next-gen SIEM, and Jason Mical of Devo Technology and Kevin Golas from OpenText talk about what capabilities are required, including threat hunting and greater automation, and how security professionals should exploit theβ¦
π΄ Commonsense Security: Leveraging Dialogue & Collaboration for Better Decisions π΄
π Read
via "Dark Reading: ".
Sometimes, good old-fashioned tools can help an enterprise create a cost-effective risk management strategy.π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
π΄ How to Prevent an AWS Cloud Bucket Data Leak π΄
π Read
via "Dark Reading: ".
Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.π Read
via "Dark Reading: ".
Dark Reading
How to Prevent an AWS Cloud Bucket Data Leak
Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.
ATENTIONβΌ New - CVE-2019-17032
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-17031
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-17030
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-17029
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-17028
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-17027
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
π΄ Elastic Security Makes Case For Blending 'Human Element,' Election Security π΄
π Read
via "Dark Reading: ".
Nate Fick, general manager of Elastic and former CEO of Endgame, talks about the impact of AI and machine learning on security professionals, and how what technologies can be tapped to improve security in the runup to November's election.π Read
via "Dark Reading: ".
Dark Reading
Elastic Security Makes Case For Blending 'Human Element,' Election Security - Dark Reading
Nate Fick, general manager of Elastic and former CEO of Endgame, talks about the impact of AI and machine learning on security professionals, and how what technologies can be tapped to improve security in the runup to November's election.
π RSA: What it's like to attend the first tech conference after the coronavirus epidemic π
π Read
via "Security on TechRepublic".
San Francisco is the site of the RSA 2020 conference, which took place despite cancellations from IBM, Verizon and AT&T.π Read
via "Security on TechRepublic".
TechRepublic
RSA: What it's like to attend a tech conference during the coronavirus epidemic
San Francisco is the site of the RSA 2020 conference, which took place despite cancellations from IBM, Verizon and AT&T.
π΄ Sophos Boosts Threat Hunting, Managed Detection and Response Capabilities π΄
π Read
via "Dark Reading: ".
JJ Thompson, senior director of managed threat response for Sophos digs deep into how organizations can start to make sense of the seemingly unlimited data that's available from endpoints, cloud, and on-premises networks. And that's a critical capability as attacker behaviors start to change.π Read
via "Dark Reading: ".
Dark Reading
Sophos Boosts Threat Hunting, Managed Detection and Response Capabilities - Dark Reading
JJ Thompson, senior director of managed threat response for Sophos digs deep into how organizations can start to make sense of the seemingly unlimited data that's available from endpoints, cloud, and on-premises networks. And that's a critical capabilityβ¦
π΄ US State Dept. Shares Insider Tips to Fight Insider Threats π΄
π Read
via "Dark Reading: ".
The insider threat is a technology, security, and personnel issue, officials said in explaining an approach that addresses all three factors.π Read
via "Dark Reading: ".
Dark Reading
US State Dept. Shares Insider Tips to Fight Insider Threats
The insider threat is a technology, security, and personnel issue, officials said in explaining an approach that addresses all three factors.
π΄ How Should I Answer a Nontech Exec Who Asks, 'How Secure Are We?' π΄
π Read
via "Dark Reading: ".
Consider this your opportunity to educate.π Read
via "Dark Reading: ".
Dark Reading
How Should I Answer a Nontech Exec Who Asks, 'How Secure Are We?'
Consider this your opportunity to educate.
β RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks β
π Read
via "Threatpost".
When it comes to machine learning, research and cybercriminal activity is full speed ahead - but legal policy has not yet caught up.π Read
via "Threatpost".
Threat Post
RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks
When it comes to machine learning, research and cybercriminal activity is full speed ahead - but legal policy has not yet caught up.