β Recently-Patched Adobe ColdFusion Flaw Exploited By APT β
π Read
via "Threatpost | The first stop for security news".
The critical vulnerability, which was patched earlier in September, has put ColdFusion servers at risk.π Read
via "Threatpost | The first stop for security news".
Threat Post
Recently-Patched Adobe ColdFusion Flaw Exploited By APT
The critical vulnerability, which was patched earlier in September, has put ColdFusion servers at risk.
β Lawsuits Aim Billions in Fines at Equifax and Ad-Targeting Companies β
π Read
via "Threatpost | The first stop for security news".
The results could start a wave of major damages for companies that collect and sell consumer information.π Read
via "Threatpost | The first stop for security news".
Threat Post
Lawsuits Aim Billions in Fines at Equifax and Ad-Targeting Companies
The results could start a wave of major damages for companies that collect and sell consumer information.
ATENTIONβΌ New - CVE-2017-17550
π Read
via "National Vulnerability Database".
ZyXEL ZyWALL USG 2.12 AQQ.2 and 3.30 AQQ.7 devices are affected by a CSRF vulnerability via a cgi-bin/zysh-cgi cmd action to add a user account. This account's access could, for example, subsequently be used for stored XSS.π Read
via "National Vulnerability Database".
π Eight reasons more CEOs will be fired over cybersecurity breaches π
π Read
via "Security on TechRepublic".
Security is everyone's problem, but CEOs should make sure their organisation doesn't block its success. Gartner offers eight situations for CEOs to avoid if a breach occurs within their organisation.π Read
via "Security on TechRepublic".
TechRepublic
Eight reasons more CEOs will be fired over cybersecurity breaches
Security is everyone's problem, but CEOs should make sure their organisation doesn't block its success. Gartner offers eight situations for CEOs to avoid if a breach occurs within their organisation.
β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From the 'Martinelli' WhatsApp hoax to Facebook wanting to give your name to the weirdo next to you, and everything in between. Catch up with this and everything we wrote in the last seven days - it's weekly roundup time!π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
From the βMartinelliβ WhatsApp hoax to Facebook wanting to give your name to the weirdo next to you, and everything in between. Catch up with this and everything we wrote in the last seβ¦
β Microsoft mistake leaves Windows 10 users fuming β
π Read
via "Naked Security".
Microsoft Windows 10 users were livid late last week after Microsoft mistakenly told them that their licenses were invalid.π Read
via "Naked Security".
β Terrorists told to hijack social media accounts to spread propaganda β
π Read
via "Naked Security".
Facebook has removed 14 million pieces of content dubbed likely to come from terrorists, as determined by new machine learning technologyπ Read
via "Naked Security".
Naked Security
Terrorists told to hijack social media accounts to spread propaganda
Facebook has removed 14 million pieces of content dubbed likely to come from terrorists, as determined by new machine learning technology
β Botnet pwns 100,000 routers using ancient security flaw β
π Read
via "Naked Security".
Researchers have stumbled on another large botnet thatβs been hijacking home routers while nobody was paying attention.π Read
via "Naked Security".
Naked Security
Botnet pwns 100,000 routers using ancient security flaw
Researchers have stumbled on another large botnet thatβs been hijacking home routers while nobody was paying attention.
β Headmaster fired over cryptocoin mining on the schoolβs dime β
π Read
via "Naked Security".
O, that constant whirring noise? And the sky-high electricity bill? Why, it's those darn air conditioners and heaters!π Read
via "Naked Security".
Naked Security
Headmaster fired over cryptocoin mining on the schoolβs dime
O, that constant whirring noise? And the sky-high electricity bill? Why, itβs those darn air conditioners and heaters!
π΄ 'CARTA': A New Tool in the Breach Prevention Toolbox π΄
π Read
via "Dark Reading: ".
Gartner's continuous adaptive risk and trust assessment for averting a data breach addresses the shortcomings of static security programs.π Read
via "Dark Reading: ".
Darkreading
'CARTA': A New Tool in the Breach Prevention Toolbox
Gartner's continuous adaptive risk and trust assessment for averting a data breach addresses the shortcomings of static security programs.
β New Boom in Facial Recognition Tech Prompts Privacy Alarms β
π Read
via "Threatpost | The first stop for security news".
Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn.π Read
via "Threatpost | The first stop for security news".
Threat Post
New Boom in Facial Recognition Tech Prompts Privacy Alarms
Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn.
β Malware-Laced App Lurked on Google Play For a Year β
π Read
via "Threatpost | The first stop for security news".
Google Playβs policy prohibits apps or SDKs that download executable code, such as dex files or native code, from a source other than Google Playπ Read
via "Threatpost | The first stop for security news".
Threat Post
Malware-Laced App Lurked on Google Play For a Year
Google Playβs policy prohibits apps or SDKs that download executable code, such as dex files or native code, from a source other than Google Play
β How to fit all of Shakespeare in one tweet (and why not to do it!) β
π Read
via "Naked Security".
A security researcher squoze 1,299,999 words into a single tweet, thanks to image metadata that Twitter doesn't remove.π Read
via "Naked Security".
Naked Security
How to fit all of Shakespeare in one tweet (and why not to do it!)
A security researcher squoze 1,299,999 words into a single tweet, thanks to image metadata that Twitter doesnβt remove.
β U.S. Chip Cards Are Being Compromised in the Millions β
π Read
via "Threatpost | The first stop for security news".
A full 60 million U.S. cards were compromised in the past 12 months. While 93 percent of those were EMV chip-enabled, merchants continued to use mag stripes.π Read
via "Threatpost | The first stop for security news".
Threat Post
U.S. Chip Cards Are Being Compromised in the Millions
A full 60 million U.S. cards were compromised in the past 12 months. Of those, 93 percent were EMV chip-enabled β but merchants continue to use mag stripes.
π How CIOs can manage blockchain security: 4 tips π
π Read
via "Security on TechRepublic".
By 2020, an exploited vulnerability will disrupt a major blockchain platform, causing significant damage, Gartner predicts. Here's how to protect your blockchain efforts.π Read
via "Security on TechRepublic".
TechRepublic
How CIOs can manage blockchain security: 4 tips
By 2020, an exploited vulnerability will disrupt a major blockchain platform, causing significant damage, Gartner predicts. Here's how to protect your blockchain efforts.
π How--and why--you should enable Housekeeping in Elementary OS Juno π
π Read
via "Security on TechRepublic".
Elementary OS Juno includes a number of improvements and additions, including a slight security bump over previous releases.π Read
via "Security on TechRepublic".
TechRepublic
How--and why--you should enable Housekeeping in Elementary OS Juno
Elementary OS Juno includes a number of improvements and additions, including a slight security bump over previous releases.
π΄ Cyberattacks Top Business Risks in North America, Europe, EAP π΄
π Read
via "Dark Reading: ".
The World Economic Forum reports cyberattacks are a top enterprise concern following WannaCry and the rise of e-commerce.π Read
via "Dark Reading: ".
Darkreading
Cyberattacks Top Business Risks in North America, Europe, EAP
The World Economic Forum reports cyberattacks are a top enterprise concern following WannaCry and the rise of e-commerce.
π΄ 7 Cool New Security Tools to be Revealed at Black Hat Europe π΄
π Read
via "Dark Reading: ".
Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.π Read
via "Dark Reading: ".
Darkreading
7 Cool New Security Tools to be Revealed at Black Hat Europe
Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.
π΄ Veterans Find New Roles in Enterprise Cybersecurity π΄
π Read
via "Dark Reading: ".
Facebook and Synack create programs to educate vets and grow employment opportunities while shrinking the cybersecurity talent gap.π Read
via "Dark Reading: ".
Darkreading
Veterans Find New Roles in Enterprise Cybersecurity
Facebook and Synack create programs to educate vets and grow employment opportunities while shrinking the cybersecurity talent gap.
π΄ Paris Agreement on Cybercrime Falls Short of Unanimous Agreement π΄
π Read
via "Dark Reading: ".
More than 50 nations and 150 global companies agree to join effort to fight cybercrime.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Emotet Campaign Ramps Up with Mass Email Harvesting Module β
π Read
via "Threatpost | The first stop for security news".
The new variant can exfiltrate emails for a period going back 180 days, en masse.π Read
via "Threatpost | The first stop for security news".
Threat Post
Emotet Campaign Ramps Up with Mass Email Harvesting Module
The new variant can exfiltrate emails for a period going back 180 days, en masse.