β WHO Targeted in Espionage Attempt, COVID-19 Cyberattacks Spike β
π Read
via "Threatpost".
The DarkHotel group could have been looking for information on tests, vaccines or trial cures.π Read
via "Threatpost".
Threat Post
WHO Targeted in Espionage Attempt, COVID-19 Cyberattacks Spike
The DarkHotel group could have been looking for information on tests, vaccines or trial cures.
β Covid-19 Privacy Poll: Phone Tracking, Public Health and Surveillance β
π Read
via "Threatpost".
Is sacrificing your personal privacy worth flattening the coronavirus infection curve? Weigh in on our Threatpost poll.π Read
via "Threatpost".
Threat Post
Covid-19 Privacy Poll: Phone Tracking, Public Health and Surveillance
In this Threatpost poll, we want your take on whether sacrificing personal privacy for the public good is worth it.
β Unknown βWildPressureβ Malware Campaign Lets Off Steam in Middle East β
π Read
via "Threatpost".
The cyberattacks -- some on industrial targets -- use a previously unknown trojan dubbed Milum.π Read
via "Threatpost".
Threat Post
Unknown βWildPressureβ Malware Campaign Lets Off Steam in Middle East
The cyberattacks β some on industrial targets β use a previously unknown trojan dubbed Milum.
π΄ How Attackers Could Use Azure Apps to Sneak into Office 365 π΄
π Read
via "Dark Reading: ".
Microsoft 365 account holders are cautioned to pay attention to unknown applications that request permissions.π Read
via "Dark Reading: ".
Darkreading
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Researchers warn Microsoft 365 account holders to pay attention to unknown applications that request permissions.
π Hackers target World Health Organization in attempt to steal passwords π
π Read
via "Security on TechRepublic".
Hacking attempts against the health organization and its partners have jumped as they struggle to battle the coronavirus.π Read
via "Security on TechRepublic".
TechRepublic
Hackers target World Health Organization in attempt to steal passwords
Hacking attempts against the health organization and its partners have jumped as they struggle to battle the coronavirus.
π Coronavirus-related digital fraud: 22% of Americans targeted π
π Read
via "Security on TechRepublic".
A TransUnion report details how COVID-19 has impacted online shopping and fraud.π Read
via "Security on TechRepublic".
TechRepublic
Coronavirus-related digital fraud: 22% of Americans targeted
A TransUnion report details how COVID-19 has impacted online shopping and fraud.
π Data-layer security is a new imperative as employees telecommute due to coronavirus π
π Read
via "Security on TechRepublic".
Commentary: COVID-19 has laid bare our need to take a new, more data-centric approach to security in light of more people working from home.π Read
via "Security on TechRepublic".
TechRepublic
Data-layer security is a new imperative as employees telecommute due to coronavirus
Commentary: COVID-19 has laid bare our need to take a new, more data-centric approach to security in light of more people working from home.
π Infrastructure cyberattacks biggest concern for global IT security leaders π
π Read
via "Security on TechRepublic".
A study on industrial cybersecurity focused on the biggest security threats for the enterprise.π Read
via "Security on TechRepublic".
TechRepublic
Infrastructure cyberattacks biggest concern for global IT security leaders
A study on industrial cybersecurity focused on the biggest security threats for the enterprise.
β Battling the global COVID-19 scammers and fake news hawkers β
π Read
via "Naked Security".
Europol seized 34K fake surgical masks, while the office of NY's AG wants registrars to explain how they're battling the sale of lies.π Read
via "Naked Security".
Naked Security
Battling the global COVID-19 scammers and fake news hawkers
Europol seized 34K fake surgical masks, while the office of NYβs AG wants registrars to explain how theyβre battling the sale of lies.
β Hackers target WHO in phishing attack β
π Read
via "Naked Security".
A cyberattack that targeted the World Health Organization is probably just the tip of the iceberg according to experts reacting to the news this week.π Read
via "Naked Security".
Naked Security
Hackers target WHO in phishing attack
A cyberattack that targeted the World Health Organization is probably just the tip of the iceberg according to experts reacting to the news this week.
β Your unused computer can help find a COVID-19 cure β
π Read
via "Naked Security".
Put it to work for the Folding@Home distributed computing project to uncover how the virus's spikes latch on and how they can be blocked.π Read
via "Naked Security".
Naked Security
Your unused computer could help find a COVID-19 cure
Put it to work for the Folding@Home distributed computing project to uncover how the virusβs spikes latch on and how they can be blocked.
β Windows has a zero-day that wonβt be patched for weeks β
π Read
via "Naked Security".
Cybercriminals are exploiting two unpatched zero-day flaws affecting all supported versions of Windows, Microsoft has warned.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Apple Safari Blocks Ad-Targeting Cookie Support β
π Read
via "Threatpost".
The move follows Googleβs announcement last May that it would do the same in Chrome by 2022.π Read
via "Threatpost".
Threat Post
Apple Safari Blocks Ad-Targeting Cookie Support
The move follows Googleβs announcement last May that it would do the same in Chrome by 2022.
β TrickBot App Bypasses Non-SMS Banking 2FA β
π Read
via "Threatpost".
TrickBot victims are being fooled into downloading an app that records their screens - stealing non-SMS 2FA passcodes for banking websites.π Read
via "Threatpost".
Threat Post
TrickBot App Bypasses Non-SMS Banking 2FA
TrickBot victims are being fooled into downloading an app that records their screens - stealing non-SMS 2FA passcodes for banking websites.
π Boost security defenses against Kwampirs RAT malware with new list of IOCs π
π Read
via "Security on TechRepublic".
ReversingLabs did a forensic analysis of attacks from the remote access trojan to understand the malware control structure.π Read
via "Security on TechRepublic".
TechRepublic
Boost security defenses against Kwampirs RAT malware with new list of IOCs
ReversingLabs did a forensic analysis of attacks from the remote access trojan to understand the malware control structure.
π΄ COVID-19: Getting Ready for the Next Business Continuity Challenge π΄
π Read
via "Dark Reading: ".
What comes after you've empowered your remote workforce in the wake of the coronavirus pandemic? Dealing with a large portion of that workforce getting sick at the same time.π Read
via "Dark Reading: ".
Dark Reading
COVID-19: Getting Ready for the Next Business Continuity Challenge
What comes after you've empowered your remote workforce in the wake of the coronavirus pandemic? Dealing with a large portion of that workforce getting sick at the same time.
π΄ FBI Shutters Russian-Based Hacker Platform, Makes Arrest π΄
π Read
via "Dark Reading: ".
The Deer.io platform let cybercriminals buy access to virtual storefronts where they could sell illicit products and services.π Read
via "Dark Reading: ".
Dark Reading
FBI Shutters Russian-Based Hacker Platform, Makes Arrest
The Deer.io platform let cybercriminals buy access to virtual storefronts where they could sell illicit products and services.
β GE Employees Lit Up with Sensitive Doc Breach β
π Read
via "Threatpost".
Marriage, divorce and death certificates, beneficiary info, passports and more were all caught up in an email takeover hack.π Read
via "Threatpost".
Threat Post
GE Employees Lit Up with Sensitive Doc Breach
Marriage, divorce and death certificates, beneficiary info, passports and more were all caught up in an email takeover hack.
ATENTIONβΌ New - CVE-2019-19127
π Read
via "National Vulnerability Database".
An authentication bypass vulnerability is present in the standalone SITS:Vision 9.7.0 component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This occurs because the Uniface TLS Driver is not enabled by default. This vulnerability allows attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does.π Read
via "National Vulnerability Database".
β Chinese Hackers Exploit Cisco, Citrix Flaws in Massive Espionage Campaign β
π Read
via "Threatpost".
Researchers say that APT41's exploits are part of one of the broadest espionage campaigns they've seen from a Chinese-linked actor "in recent years."π Read
via "Threatpost".
Threat Post
Chinese Hackers Exploit Cisco, Citrix Flaws in Massive Espionage Campaign
Researchers say that APT41's exploits are part of one of the broadest espionage campaigns they've seen from a Chinese-linked actor "in recent years."
π Organizations are moving their security to the cloud, but concerns remain π
π Read
via "Security on TechRepublic".
Businesses see advantages in migrating to cloud-based security tools but are worried about such issues as data privacy and unauthorized access, says Exabeam.π Read
via "Security on TechRepublic".
TechRepublic
Organizations are moving their security to the cloud, but concerns remain
Businesses see advantages in migrating to cloud-based security tools but are worried about such issues as data privacy and unauthorized access, says Exabeam.