β Wormable, Unpatched Microsoft Bug Threatens Corporate LANs β
π Read
via "Threatpost".
CVE-2020-0796 affects version 3.1.1 of Microsoftβs SMB file-sharing system and was not included in Patch Tuesday.π Read
via "Threatpost".
Threat Post
Microsoft Releases Patch for Wormable Bug That Threatens Corporate LANs
CVE-2020-0796 affects version 3.1.1 of Microsoftβs SMB file-sharing system and was not included in Patch Tuesday, but patched the following day.
β Microsoft leaves critical bug unpatched on Patch Tuesday β
π Read
via "Naked Security".
Microsoft fixed bugs across a range of products on patch Tuesday, issuing patches for 115 distinct CVEs, with 26 rated critical.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Gender Equality in Cybersecurity Could Drive Economic Boost π΄
π Read
via "Dark Reading: ".
If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.π Read
via "Dark Reading: ".
Dark Reading
Gender Equality in Cybersecurity Could Drive Economic Boost
If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.
β TRRespass research reveals rowhammering is alive and well β
π Read
via "Naked Security".
"TRRespass" is a new trick for rowhammering - an attack where you write to a memory chip by reading it over and over (and over) again.π Read
via "Naked Security".
Naked Security
TRRespass research reveals rowhammering is alive and well
βTRRespassβ is a new trick for rowhammering β an attack where you write to a memory chip by reading it over and over (and over) again.
π΄ How the Rise of IoT Is Changing the CISO Role π΄
π Read
via "Dark Reading: ".
Prepare for the future by adopting a risk-based approach. Following these five steps can help.π Read
via "Dark Reading: ".
Darkreading
How the Rise of IoT Is Changing the CISO Role
Prepare for the future by adopting a risk-based approach. Following these five steps can help.
ATENTIONβΌ New - CVE-2013-1753
π Read
via "National Vulnerability Database".
The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-2487
π Read
via "National Vulnerability Database".
The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.π Read
via "National Vulnerability Database".
π΄ I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know? π΄
π Read
via "Dark Reading: ".
Should you happen to be in a meeting with an ICS vendor, here are some terms you will need to know so as to not be laughed out of the room.π Read
via "Dark Reading: ".
Dark Reading
I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know?
Should you happen to be in a meeting with an ICS vendor, here are some terms you will need to know so as to not be laughed out of the room.
β Phishing Attack Skirts Detection With YouTube β
π Read
via "Threatpost".
Attackers are using YouTube redirect links, whitelisted by various security defense mechanisms, to evade detection.π Read
via "Threatpost".
Threat Post
Phishing Attack Skirts Detection With YouTube
Attackers are using YouTube redirect links, whitelisted by various security defense mechanisms, to evade detection.
π Sweeping Federal Cybersecurity Upgrades Needed to Defend US π
π Read
via "Subscriber Blog RSS Feed ".
A new report says the federal government and the private sector needs to better defend the United States in cyberspace.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Sweeping Federal Cybersecurity Upgrades Needed to Defend US
A new report says the federal government and the private sector needs to better defend the United States in cyberspace.
π February sees huge jump in exploits designed to spread Mirai botnet π
π Read
via "Security on TechRepublic".
The Mirai botnet is known for targeting Internet of Things devices and conducting massive DDoS attacks, as described by cyberthreat researcher Check Point Research.π Read
via "Security on TechRepublic".
TechRepublic
February sees huge jump in exploits designed to spread Mirai botnet
The Mirai botnet is known for targeting Internet of Things devices and conducting massive DDoS attacks, as described by cyberthreat researcher Check Point Research.
π Cybersecurity pros are using artificial intelligence but still prefer the human touch π
π Read
via "Security on TechRepublic".
More than half of organizations have adopted AI for security efforts, but a majority are more confident in results verified by humans, according to WhiteHat Security.π Read
via "Security on TechRepublic".
β Flaws Riddle Zyxelβs Network Management Software β
π Read
via "Threatpost".
Over 16 security flaws, including multiple backdoors and hardcoded SSH server keys, plague the software.π Read
via "Threatpost".
Threat Post
Flaws Riddle Zyxelβs Network Management Software
Over 16 security flaws, including multiple backdoors and hardcoded SSH server keys, plague the software.
π΄ COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready? π΄
π Read
via "Dark Reading: ".
A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.π Read
via "Dark Reading: ".
Darkreading
COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready?
A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.
π΄ Microsoft Discloses New Remote Execution Flaw in SMBv3 π΄
π Read
via "Dark Reading: ".
A patch for the flaw is not yet available, but there are no known exploits -- so far.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Ransomware Increasingly Targeting Small Governments π΄
π Read
via "Dark Reading: ".
To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.π Read
via "Dark Reading: ".
Darkreading
Ransomware Increasingly Targeting Small Governments
To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.
π΄ Cyberspace Solarium Commission Slams US Cybersecurity Readiness π΄
π Read
via "Dark Reading: ".
The federal commission outlined more than 60 recommendations to remedy major security problems.π Read
via "Dark Reading: ".
Dark Reading
Cyberspace Solarium Commission Slams US Cybersecurity Readiness
The federal commission outlined more than 60 recommendations to remedy major security problems.
ATENTIONβΌ New - CVE-2016-1000111
π Read
via "National Vulnerability Database".
Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.π Read
via "National Vulnerability Database".