π How to check for weak passwords on your Linux systems with John the Ripper π
π Read
via "Security on TechRepublic".
Are you certain your users are working with strong passwords on your Linux servers? Let John the Ripper show you who is and who isn't.π Read
via "Security on TechRepublic".
TechRepublic
How to check for weak passwords on your Linux systems with John the Ripper
Are you certain your users are working with strong passwords on your Linux servers? Let John the Ripper show you who is and who isn't.
β Microsoft Sway Abused in Office 365 Phishing Attack β
π Read
via "Threatpost".
The "PerSwaysion" attackers have leveraged a plethora of Microsoft services to compromise at least 150 executives in a highly targeted phishing campaign.π Read
via "Threatpost".
Threat Post
Microsoft Sway Abused in Office 365 Phishing Attack
The "PerSwaysion" attackers have leveraged a plethora of Microsoft services to compromise at least 150 executives in a highly targeted phishing campaign.
π΄ Researchers Find Baby Banking Trojan, Watch It Grow π΄
π Read
via "Dark Reading: ".
EventBot is an Android information stealer on its way to becoming a very capable piece of malware.π Read
via "Dark Reading: ".
Dark Reading
Researchers Find Baby Banking Trojan, Watch It Grow
EventBot is an Android information stealer on its way to becoming a very capable piece of malware.
π΄ Microsoft's Records Management Tool Aims to Simplify Data Governance π΄
π Read
via "Dark Reading: ".
Records Management is intended to help businesses manage security and data governance as more struggle to handle increased amounts of data and regulatory requirements.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
β COVID-19 prompts DHS warning to review Office 365 security β
π Read
via "Naked Security".
The DHS is urging users to secure Office 365 accounts after reporting security weaknesses in Microsoft's online productivity service.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Google fights spammy extensions with new Chrome Web Store policy β
π Read
via "Naked Security".
The policies are specifically meant to fight spam, but they outlaw tactics taken by malicious extensions as well, including fake reviews.π Read
via "Naked Security".
Naked Security
Google fights spammy extensions with new Chrome Web Store policy
The policies are specifically meant to fight spam, but they outlaw tactics taken by malicious extensions as well, including fake reviews.
β TrickBot Attack Exploits COVID-19 Fears with DocuSign-Themed Ploy β
π Read
via "Threatpost".
Threat actors are spreading the tricky trojan through fake messages in another opportunistic COVID-19-related campaign, said IBM X-Force.π Read
via "Threatpost".
Threat Post
TrickBot Attack Exploits COVID-19 Fears with DocuSign-Themed Ploy
Threat actors are spreading the tricky trojan through fake messages in another opportunistic COVID-19-related campaign, said IBM X-Force.
π΄ Industrial Networks' Newest Threat: Remote Users π΄
π Read
via "Dark Reading: ".
We know remote working isn't going away anytime soon, so it's crucial we be extra vigilant about security for industrial networks and critical infrastructure.π Read
via "Dark Reading: ".
Dark Reading
Industrial Networks' Newest Threat: Remote Users
We know remote working isn't going away anytime soon, so it's crucial we be extra vigilant about security for industrial networks and critical infrastructure.
π Friday Five: 5/1 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Australia's contact tracing app sparks privacy concerns, Shade ransomware ceases operations, and Google Play deals with malicious apps. Catch up on the week's news with the Friday Five!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 5/1 Edition
Australia's contact tracing app sparks privacy concerns, Shade ransomware ceases operations, and Google Play deals with malicious apps. Catch up on the week's news with the Friday Five!
π΄ Apple Makes It Easier to Unlock iPhone While Wearing a Mask π΄
π Read
via "Dark Reading: ".
The beta release of iOS 13.5 brings an updated FaceID so that users wearing masks can bypass facial recognition and unlock their phone with a code.π Read
via "Dark Reading: ".
Dark Reading
Apple Makes It Easier to Unlock iPhone While Wearing a Mask
The beta release of iOS 13.5 brings an updated FaceID so that users wearing masks can bypass facial recognition and unlock their phone with a code.
β Microsoft Teams Impersonation Attacks Flood Inboxes β
π Read
via "Threatpost".
Two separate attacks have targeted as many as 50,000 different Teams users, with the goal of phishing Office 365 logins.π Read
via "Threatpost".
Threat Post
Microsoft Teams Impersonation Attacks Flood Inboxes
Two separate attacks have targeted as many as 50,000 different Teams users, with the goal of phishing Office 365 logins.
β News Wrap: Microsoft Sway Phish, Malicious GIF and Spyware Attacks β
π Read
via "Threatpost".
Threatpost editors discuss a phishing attack abusing Microsoft Sway, a Microsoft Teams flaw and an Android spyware campaign unearthed this week.π Read
via "Threatpost".
Threat Post
News Wrap: Microsoft Sway Phish, Malicious GIF and Spyware Attacks
Threatpost editors discuss a phishing attack abusing Microsoft Sway, a Microsoft Teams flaws and an Android spyware campaign unearthed this week.
π΄ Best Practices for Managing a Remote SOC π΄
π Read
via "Dark Reading: ".
Experts share what it takes to get your security analysts effectively countering threats from their home offices.π Read
via "Dark Reading: ".
Dark Reading
Best Practices for Managing a Remote SOC
Experts share what it takes to get your security analysts effectively countering threats from their home offices.
π΄ Name That Toon: The Lights Are On ... π΄
π Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading: ".
Dark Reading
Name That Toon: The Lights Are On ...
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
π Fake FedEx, DHL, and UPS delivery issues used in COVID-19 phishing scams π
π Read
via "Security on TechRepublic".
Cybercriminals are leveraging overwhelmed delivery services to further phishing schemes.π Read
via "Security on TechRepublic".
TechRepublic
Fake FedEx, DHL, and UPS delivery issues used in COVID-19 phishing scams
Cybercriminals are leveraging overwhelmed delivery services to further phishing schemes.
π Phishing attacks spoof Microsoft Teams to steal user credentials π
π Read
via "Security on TechRepublic".
Attackers are exploiting the surge in the use of Microsoft Teams in an attempt to trap unsuspecting users, says Abnormal Security.π Read
via "Security on TechRepublic".
TechRepublic
Phishing attacks spoof Microsoft Teams to steal user credentials
Attackers are exploiting the surge in the use of Microsoft Teams in an attempt to trap unsuspecting users, says Abnormal Security.
π΄ DHS CISA Launches Site for Teleworking Security π΄
π Read
via "Dark Reading: ".
The new website is intended to be a one-stop source for information on securing teleworkers and their employers.π Read
via "Dark Reading: ".
Dark Reading
DHS CISA Launches Site for Teleworking Security
The new website is intended to be a one-stop source for information on securing teleworkers and their employers.
π Microsoft catches cybercriminals adding malware to "John Wick 3," "Contagion" torrents π
π Read
via "Security on TechRepublic".
In a Twitter thread, Microsoft warned people in Spain and South America to watch what they torrent.π Read
via "Security on TechRepublic".
π΄ Fake Microsoft Teams Emails Phish for Credentials π΄
π Read
via "Dark Reading: ".
Employees belonging to organizations in industries such as energy, retail, and hospitality have been recipients, Abnormal Security says.π Read
via "Dark Reading: ".
Darkreading
Fake Microsoft Teams Emails Phish for Credentials
Employees belonging to organizations in industries such as energy, retail, and hospitality have been recipients, Abnormal Security says.
β Upgraded Cerberus Spyware Spreads Rapidly via MDM β
π Read
via "Threatpost".
No longer a simple Android banker, Cerberus is now a full-fledged RAT that can take complete control of devices and automatically spread via mobile device management servers.π Read
via "Threatpost".
Threat Post
Upgraded Cerberus Spyware Spreads Rapidly via MDM
No longer a simple Android banker, Cerberus is now a full-fledged RAT that can take complete control of devices and automatically spread via mobile device management servers.
β Monday review β the hot 11 stories of the week β
π Read
via "Naked Security".
It's weekly roundup time!π Read
via "Naked Security".
Naked Security
Monday review β the hot 11 stories of the week
Itβs weekly roundup time!