๐ด A Lesson in Social Engineering ๐ด
๐ Read
via "Dark Reading: ".
What kind of school project is this?๐ Read
via "Dark Reading: ".
Dark Reading
A Lesson in Social Engineering
What kind of school project is this?
ATENTIONโผ New - CVE-2009-5159
๐ Read
via "National Vulnerability Database".
Invision Power Board (aka IPB or IP.Board) 2.x through 3.0.4, when Internet Explorer 5 is used, allows XSS via a .txt attachment.๐ Read
via "National Vulnerability Database".
๐ด Princess Cruises Confirms Data Breach ๐ด
๐ Read
via "Dark Reading: ".
The cruise liner, forced to shut down operations due to coronavirus, says the incident may have compromised passengers' personal data.๐ Read
via "Dark Reading: ".
Darkreading
Princess Cruises Confirms Data Breach
The cruise liner, forced to shut down operations due to coronavirus, says the incident may have compromised passengers' personal data.
๐ด What Cybersecurity Pros Really Think About Artificial Intelligence ๐ด
๐ Read
via "Dark Reading: ".
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.๐ Read
via "Dark Reading: ".
Dark Reading
What Cybersecurity Pros Really Think About Artificial Intelligence
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.
โ Coronavirus-Themed APT Attack Spreads Malware โ
๐ Read
via "Threatpost".
The APT group was spotted sending spear-phishing emails that purport to detail information about coronavirus - but they actually infect victims with a custom RAT.๐ Read
via "Threatpost".
Threat Post
Coronavirus-Themed APT Attack Spreads Malware
The APT group was spotted sending spear-phishing emails that purport to detail information about coronavirus - but they actually infect victims with a custom RAT.
๐ Friday Five: 3/13 ๐
๐ Read
via "Subscriber Blog RSS Feed ".
Ryuk Ransomware targets another U.S. city, University of Kentucky ends a month-long cyberattack, and a secret-sharing app exposes user data - catch up on the week's news with the Friday Five.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 3/13
Ryuk Ransomware targets another U.S. city, University of Kentucky ends a month-long cyberattack, and a secret-sharing app exposes user data - catch up on the week's news with the Friday Five.
๐ด Beyond Burnout: What Is Cybersecurity Doing to Us? ๐ด
๐ Read
via "Dark Reading: ".
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.๐ Read
via "Dark Reading: ".
Dark Reading
Beyond Burnout: What Is Cybersecurity Doing to Us?
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.
๐ด Big BEC Bust Brings Down Dozens ๐ด
๐ Read
via "Dark Reading: ".
Two dozen individuals have been named in the latest arrests of alleged participants in a business email compromise scheme that cost victims $30 million.๐ Read
via "Dark Reading: ".
Darkreading
Big BEC Bust Brings Down Dozens
Two dozen individuals have been named in the latest arrests of alleged participants in a business email compromise scheme that cost victims $30 million.
โ WordPress Plugin Bug in Popup Builder Threatens 100K Websites โ
๐ Read
via "Threatpost".
The high-severity flaw allows malicious code injection into website pop-up windows.๐ Read
via "Threatpost".
Threat Post
WordPress Plugin Bug in Popup Builder Threatens 100K Websites
The high-severity flaw allows malicious code injection into website pop-up windows.
โ Working from Home: COVID-19โs Constellation of Security Challenges โ
๐ Read
via "Threatpost".
Organizations are sending employees and students home to work and learn -- but implementing the plan opens the door to more attacks, IT headaches and brand-new security challenges.๐ Read
via "Threatpost".
Threat Post
Working from Home: COVID-19โs Constellation of Security Challenges
Organizations are sending employees and students home to work and learn โ but implementing the plan opens the door to more attacks, IT headaches and brand-new security challenges.
๐ด DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile ๐ด
๐ Read
via "Dark Reading: ".
Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons.๐ Read
via "Dark Reading: ".
Darkreading
DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile
Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons.
๐ How hospital CIOs can prepare for the onslaught of coronavirus patients ๐
๐ Read
via "Security on TechRepublic".
There are steps that IT departments can take to strengthen their technical infrastructure in advance of COVID-19's arrival at their facility.๐ Read
via "Security on TechRepublic".
TechRepublic
How hospital CIOs can prepare for the onslaught of coronavirus patients
There are steps that IT departments can take to strengthen their technical infrastructure in advance of COVID-19's arrival at their facility.
๐ AIEngine 1.9.2 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
AIEngine 1.9.2 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
โ Monday review โ the hot 23 stories of the week โ
๐ Read
via "Naked Security".
Amazon and eBay shopper data was exposed, and the EARN IT act threatens end-to-end encryption. These stories and more in the weekly roundup.๐ Read
via "Naked Security".
Naked Security
Monday review โ the hot 23 stories of the week
Amazon and eBay shopper data was exposed, and the EARN IT act threatens end-to-end encryption. These stories and more in the weekly roundup.
โ Senate bill would ban TikTok from government phones โ
๐ Read
via "Naked Security".
Concerns over cybersecurity risk and possible spying by China have already brought about bans from DHS, DoD, TSA, and the State Department.๐ Read
via "Naked Security".
Naked Security
Senate bill would ban TikTok from government phones
Concerns over cybersecurity risk and possible spying by China have already brought about bans from DHS, DoD, TSA, and the State Department.
โ Open source bugs have soared in the past year โ
๐ Read
via "Naked Security".
Open source bugs have skyrocketed, according to a report from WhiteSource, with XSS flaws account for a quarter of those bugs.๐ Read
via "Naked Security".
Naked Security
Open source bugs have soared in the past year
Open source bugs have skyrocketed, according to a report from WhiteSource, with XSS flaws account for a quarter of those bugs.
โ Report calls for web pre-screening to end UKโs child abuse โexplosionโ โ
๐ Read
via "Naked Security".
The IICSA report cited "unprecedented levels of depravity" and said that encryption is getting in the way of current screening.๐ Read
via "Naked Security".
Naked Security
Report calls for web pre-screening to end UKโs child abuse โexplosionโ
The IICSA report cited โunprecedented levels of depravityโ and said that encryption is getting in the way of current screening.
โ Microsoft patches wormable Windows 10 โSMBGhostโ flaw โ
๐ Read
via "Naked Security".
Whatโs the difference between a scheduled security update and one thatโs out-of-band? In this case, it's two days.๐ Read
via "Naked Security".
Sophos News
Naked Security โ Sophos News
๐ด 4 Ways Thinking 'Childishly' Can Empower Security Professionals ๐ด
๐ Read
via "Dark Reading: ".
Younger minds -- more agile and less worried by failure -- provide a useful model for cyber defenders to think more creatively.๐ Read
via "Dark Reading: ".
Darkreading
4 Ways Thinking 'Childishly' Can Empower Security Professionals
Younger minds -- more agile and less worried by failure -- provide a useful model for cyber defenders to think more creatively.
๐ Report: US Health and Human Services department hit by cyberattack amidst coronavirus fears ๐
๐ Read
via "Security on TechRepublic".
The Sunday cybersecurity attack was designed to slow down the agency's systems as it tries to grapple with the spread of COVID-19.๐ Read
via "Security on TechRepublic".
TechRepublic
Report: US Health and Human Services department hit by cyberattack amidst coronavirus fears
The Sunday cybersecurity attack was designed to slow down the agency's systems as it tries to grapple with the spread of COVID-19.