β βDerpTrollβ Faces 10 Years in Prison for DDoSing Gaming Sites as a Teen β
π Read
via "Threatpost | The first stop for security news".
He admitted to taking Steam, EA Origin and Sony Online Entertainment offline in 2013 and 2014, causing at least $95,000 in damages.π Read
via "Threatpost | The first stop for security news".
Threat Post
βDerpTrollβ Faces 10 Years in Prison for DDoSing Gaming Sites as a Teen
He admitted to taking Steam, EA Origin and Sony Online Entertainment offline in 2013 and 2014, causing at least $95,000 in damages.
ATENTIONβΌ New - CVE-2018-0284
π Read
via "National Vulnerability Database".
A vulnerability in the local status page functionality of the Cisco Meraki MR, MS, MX, Z1, and Z3 product lines could allow an authenticated, remote attacker to modify device configuration files. The vulnerability occurs when handling requests to the local status page. An exploit could allow the attacker to establish an interactive session to the device with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device that is being exploited.π Read
via "National Vulnerability Database".
β Cisco Accidentally Released Dirty Cow Exploit Code in Software β
π Read
via "Threatpost | The first stop for security news".
Cisco revealed that it had "inadvertently" shipped an in-house exploit code that was used in test scripts as part of its TelePresence Video Communication Server and Expressway Series software.π Read
via "Threatpost | The first stop for security news".
Threat Post
Cisco Accidentally Released Dirty Cow Exploit Code in Software
The most severe vulnerability, CVE-2018-15439, has a CVSS severity score of 9.8 (out of 10).
β Apple 0, JosΓ© 3 β Man versus Megacorp! [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security Podcast - enjoy!π Read
via "Naked Security".
Naked Security
Apple 0, JosΓ© 3 β Man versus Megacorp! [PODCAST]
Hereβs the latest Naked Security Podcast β enjoy!
π΄ Banking Malware Takes Aim at Brazilians π΄
π Read
via "Dark Reading: ".
Two malware distribution campaigns are sending banking Trojans to customers of financial institutions in Brazil.π Read
via "Dark Reading: ".
Darkreading
Banking Malware Takes Aim at Brazilians
Two malware distribution campaigns are sending banking Trojans to customers of financial institutions in Brazil.
π΄ User Behavior Analytics Could Find a Home in the OT World of the IIoT π΄
π Read
via "Dark Reading: ".
The technology never really took off in IT, but it could be very helpful in the industrial world.π Read
via "Dark Reading: ".
Darkreading
User Behavior Analytics Could Find a Home in the OT World of the IIoT
The technology never really took off in IT, but it could be very helpful in the industrial world.
β Pentagon Draws Back the Veil on APT Malware with Sudden Embrace of VirusTotal β
π Read
via "Threatpost | The first stop for security news".
Two samples have already been added to the malware zoo, indicating a new openness from the federal government when it comes to cyber.π Read
via "Threatpost | The first stop for security news".
Threat Post
Pentagon Draws Back the Veil on APT Malware with Sudden Embrace of VirusTotal
Two samples have already been added to the malware zoo, indicating a new openness from the federal government when it comes to cyber.
π΄ Microsoft President: Governments Must Cooperate on Cybersecurity π΄
π Read
via "Dark Reading: ".
Microsoft's Brad Smith calls on nations and businesses to work toward "digital peace" and acknowledge the effects of cybercrime.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Symantec Uncovers North Korean Group's ATM Attack Malware π΄
π Read
via "Dark Reading: ".
Lazarus Group has been using FastCash Trojan on obsolete AIX servers to empty tens of millions of dollars from ATMs.π Read
via "Dark Reading: ".
Darkreading
Symantec Uncovers North Korean Group's ATM Attack Malware
Lazarus Group has been using FastCash Trojan on obsolete AIX servers to empty tens of millions of dollars from ATMs.
ATENTIONβΌ New - CVE-2017-1119
π Read
via "National Vulnerability Database".
IBM Marketing Operations 9.1.0, 9.1.2, and 10.1 could allow a remote attacker to obtain sensitive information. An attacker could send a specially-crafted request to cause an error message to be returned containing the full root path. An attacker could use this information to launch further attacks against the affected system. IBM X-Force ID: 121171.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-9749
π Read
via "National Vulnerability Database".
IBM Campaign 9.1.0, 9.1.2, 10.0, and 10.1 could allow an authenticated user with access to the local network to bypass security due to lack of input validation. IBM X-Force ID: 120206.π Read
via "National Vulnerability Database".
β DerpTrolling game server DDoS attacker pleads guilty β
π Read
via "Naked Security".
Austin Thompson pleaded guilty on November 6 in a San Diego Federal court to knowingly causing damage to third-party computers.π Read
via "Naked Security".
Naked Security
DerpTrolling game server DDoS attacker pleads guilty
Austin Thompson pleaded guilty on November 6 in a San Diego Federal court to knowingly causing damage to third-party computers.
β Update now! WordPress sites vulnerable to WooCommerce plugin flaw β
π Read
via "Naked Security".
Researchers have published details of a dangerous flaw in the way the hugely popular WooCommerce plugin interacts with WordPress that could allow an attacker with access to a single account to take over an entire site.π Read
via "Naked Security".
Naked Security
Update now! WordPress sites vulnerable to WooCommerce plugin flaw
Researchers have published details of a dangerous flaw in the way the hugely popular WooCommerce plugin interacts with WordPress that could allow an attacker with access to a single account to takeβ¦
β Sent a photo to the wrong person? Facebook Messenger to let you unsend it β
π Read
via "Naked Security".
Think fast! You'll only have up to 10 minutes to hit unsend: a lot stingier than the hour afforded by WhatsApp.π Read
via "Naked Security".
Naked Security
Sent a photo to the wrong person? Facebook Messenger to let you unsend it
Think fast! Youβll only have up to 10 minutes to hit unsend: a lot stingier than the hour afforded by WhatsApp.
β 258,000 encrypted IronChat phone messages cracked by police β
π Read
via "Naked Security".
They expect to cuff hundreds of criminals who used the pricey phones, which were sold with the crypto app preinstalled.π Read
via "Naked Security".
Naked Security
258,000 encrypted IronChat phone messages cracked by police
They expect to cuff hundreds of criminals who used the pricey phones, which were sold with the crypto app preinstalled.
π How to install the SIPp testing tool on Ubuntu Server 18.04 π
π Read
via "Security on TechRepublic".
If you need to stress test your VOIP (or other SIP telephony systems) installation, there's an open source tool for that. Jack Wallen shows you how to install and use SIPp.π Read
via "Security on TechRepublic".
TechRepublic
How to install the SIPp testing tool on Ubuntu Server 18.04
If you need to stress test your VOIP (or other SIP telephone systems) installation, there's an open source tool for thatβSIPp.
π΄ Vulnerabilities in our Infrastructure: 5 Ways to Mitigate the Risk π΄
π Read
via "Dark Reading: ".
By teaming up to address key technical and organizational issues, information and operational security teams can improve the resiliency and safety of their infrastructure systems.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities in Our Infrastructure: 5 Ways to Mitigate the Risk
By teaming up to address key technical and organizational issues, information and operational security teams can improve the resiliency and safety of their infr
π΄ The Morris Worm Turns 30 π΄
π Read
via "Dark Reading: ".
How the historic Internet worm attack of 1988 has shaped security - or not.π Read
via "Dark Reading: ".
Darkreading
The Morris Worm Turns 30
How the historic Internet worm attack of 1988 has shaped security β or not.
β Embracing the Cybersecurity βGrey Spaceβ β
π Read
via "Threatpost | The first stop for security news".
Security teams carefully monitor potential threat activity, but incidents arenβt always black and white.π Read
via "Threatpost | The first stop for security news".
Threat Post
Embracing the Cybersecurity βGrey Spaceβ
Security teams carefully monitor potential threat activity, but incidents arenβt always black and white.
β Threatpost News Wrap Podcast for Nov. 9 β
π Read
via "Threatpost | The first stop for security news".
The Threatpost editors break down the top news stories from this week.π Read
via "Threatpost | The first stop for security news".
Threat Post
Threatpost News Wrap Podcast for Nov. 9
The Threatpost editors break down the top news stories from this week.
β ThreatList: Google Play Nine Times Safer Than Third-Party App Stores β
π Read
via "Threatpost | The first stop for security news".
Out of the 2 billion Android users out there, the rate of potential malware infection is less than 1 percent across the board, Google says.π Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: Google Play Nine Times Safer Than Third-Party App Stores
Out of the 2 billion Android users out there, the rate of potential malware infection is less than 1 percent across the board, Google says.