❌ Microsoft Shells Out $100K for IoT Security ❌
📖 Read
via "Threatpost".
A three-month Azure Sphere bug-bounty challenge will offer top rewards for compromising Pluton or Secure World within Microsoft's IoT security suite.📖 Read
via "Threatpost".
Threat Post
Microsoft Shells Out $100K for IoT Security
A three-month bug-bounty challenge will offer top rewards for compromising Pluton or Secure World within the Azure Sphere IoT security suite.
🔐 Healthcare organizations targeted with password spraying attacks 🔐
📖 Read
via "Security on TechRepublic".
Malicious campaigns are using password spraying as a type of brute-force attack to find weak passwords at healthcare and medical facilities.📖 Read
via "Security on TechRepublic".
TechRepublic
Healthcare organizations targeted with password spraying attacks
Malicious campaigns are using password spraying as a type of brute-force attack to find weak passwords at healthcare and medical facilities.
🔐 Survey: Over half of employees admit to watching adult content on work devices 🔐
📖 Read
via "Security on TechRepublic".
A study from Kaspersky also reveals significant changes in the ways people work since COVID-19.📖 Read
via "Security on TechRepublic".
TechRepublic
Survey: Over half of employees admit to watching adult content on work devices
A study from Kaspersky also reveals significant changes in the ways people work since COVID-19.
🕴 When Achieving Deadpool Status Is a Good Thing 🕴
📖 Read
via "Dark Reading: ".
It means attackers have been met with sufficient resistance that it's no longer worth their trouble and have moved on📖 Read
via "Dark Reading: ".
Dark Reading
When Achieving Deadpool Status Is a Good Thing
It means attackers have been met with sufficient resistance that it's no longer worth their trouble and have moved on
🔐 Coronavirus-themed spam surged 14,000% in two weeks says IBM 🔐
📖 Read
via "Security on TechRepublic".
Since February, spam exploiting the novel coronavirus has jumped by 4,300% and 14,000% in the past 14 days, according to IBM X-Force, IBM's threat intelligence group.📖 Read
via "Security on TechRepublic".
TechRepublic
Coronavirus-themed spam surged 14,000% in two weeks says IBM
Since February, spam exploiting the novel coronavirus has jumped by 4,300% and 14,000% in the past 14 days, according to IBM X-Force, IBM's threat intelligence group.
🔐 Zoom 5.0: How to better secure meetings with the latest features 🔐
📖 Read
via "Security on TechRepublic".
With the new 5.0 version of Zoom, the app has added features to help you protect your virtual meetings from Zoombombing and other unwanted intrusion.📖 Read
via "Security on TechRepublic".
TechRepublic
Zoom 5.0: How to better secure meetings with the latest features
With the new 5.0 version of Zoom, the app has added features to help you protect your virtual meetings from Zoombombing and other unwanted intrusion.
🕴 The Price of Fame? Celebrities Face Unique Hacking Threats 🕴
📖 Read
via "Dark Reading: ".
Hackers are hitting the sports industry hard on social media and luring quarantined consumers with offers of free streaming services, a new report shows.📖 Read
via "Dark Reading: ".
Dark Reading
The Price of Fame? Celebrities Face Unique Hacking Threats
Hackers are hitting the sports industry hard on social media and luring quarantined consumers with offers of free streaming services, a new report shows.
🔏 CPRA – a.k.a. CCPA 2.0 – Qualifies for 2020 Ballot 🔏
📖 Read
via "Subscriber Blog RSS Feed ".
The California Privacy Rights Act, a new data privacy effort introduced to narrow the scope of the California Consumer Privacy Act, now has enough support to make it onto the November 2020 ballot.📖 Read
via "Subscriber Blog RSS Feed ".
🔐 How to protect yourself from coronavirus-related SMS spam 🔐
📖 Read
via "Security on TechRepublic".
Spammers are sending text messages with deceptive links designed to exploit interest and fear around COVID-19, says AdaptiveMobile Security.📖 Read
via "Security on TechRepublic".
TechRepublic
How to protect yourself from coronavirus-related SMS spam
Spammers are sending text messages with deceptive links designed to exploit interest and fear around COVID-19, says AdaptiveMobile Security.
❌ InfinityBlack Dismantled After Selling Millions of Credentials ❌
📖 Read
via "Threatpost".
In the Europol-led takedown, police shut down databases with more than 170 million entries.📖 Read
via "Threatpost".
Threat Post
InfinityBlack Dismantled After Selling Millions of Credentials
In the Europol-led takedown, police shut down databases with more than 170 million entries.
ATENTION‼ New - CVE-2018-8956
📖 Read
via "National Vulnerability Database".
ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.📖 Read
via "National Vulnerability Database".
🕴 Microsoft Reportedly in Talks to Acquire CyberX 🕴
📖 Read
via "Dark Reading: ".
CyberX was founded in 2013 and has raised $48 million to build its cybersecurity platform for IoT and industrial control systems.📖 Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
🕴 Half of Companies Have Suffered a Cybersecurity Issue Amid COVID-19 Crisis 🕴
📖 Read
via "Dark Reading: ".
Survey shows 49% expect to experience a data breach or cybersecurity incident in the next month.📖 Read
via "Dark Reading: ".
Dark Reading
Half of Companies Have Suffered a Cybersecurity Issue Amid COVID-19 Crisis
Survey shows 49% expect to experience a data breach or cybersecurity incident in the next month.
🕴 Financial Phishing Attacks Take Off, Malware Declines 🕴
📖 Read
via "Dark Reading: ".
In the past year, the number of digital threats increased by nearly half as phishing swamped malware to become the most dominant attack technique.📖 Read
via "Dark Reading: ".
Dark Reading
Financial Phishing Attacks Take Off, Malware Declines
In the past year, the number of digital threats increased by nearly half as phishing swamped malware to become the most dominant attack technique.
🕴 What is an 'Endpoint'? 🕴
📖 Read
via "Dark Reading: ".
Some companies' endpoint security strategies may now cover an ever-widening array of devices, as Dark Reading's latest State of Endpoint Security survey discovered.📖 Read
via "Dark Reading: ".
Dark Reading
What is an 'Endpoint'?
Some companies' endpoint security strategies may now cover an ever-widening array of devices, as Dark Reading's latest State of Endpoint Security survey discovered.
🔐 Alarming number of pharma executive login credentials available on the Dark Web 🔐
📖 Read
via "Security on TechRepublic".
A new report details major vulnerabilities among the executive suite at some of the largest pharmaceutical companies.📖 Read
via "Security on TechRepublic".
TechRepublic
Alarming number of pharma executive login credentials available on the Dark Web
A new report details major vulnerabilities among the executive suite at some of the largest pharmaceutical companies.
❌ Lazarus Group Hides macOS Spyware in 2FA Application ❌
📖 Read
via "Threatpost".
The Dacls RAT has been ported from an existing Linux version.📖 Read
via "Threatpost".
Threat Post
Lazarus Group Hides macOS Spyware in 2FA Application
The Dacls RAT has been ported from an existing Linux version.
🕴 Attacks on WordPress Sites Surge 🕴
📖 Read
via "Dark Reading: ".
Defiant says it observed a 30-fold increase in attacks in just the past few days.📖 Read
via "Dark Reading: ".
Dark Reading
Attacks on WordPress Sites Surge
Defiant says it observed a 30-fold increase in attacks in just the past few days.
🕴 Maze Ransomware Operators Step Up Their Game 🕴
📖 Read
via "Dark Reading: ".
Investigations show Maze ransomware operators leave "nothing to chance" when putting pressure on victims to pay.📖 Read
via "Dark Reading: ".
Dark Reading
Maze Ransomware Operators Step Up Their Game
Investigations show Maze ransomware operators leave nothing to chance when putting pressure on victims to pay.
⚠ Police nab InfinityBlack hackers ⚠
📖 Read
via "Naked Security".
Five alleged members of hacking group InfinityBlack got some unexpected visitors last week when Polish law enforcement arrested them.📖 Read
via "Naked Security".
Naked Security
Police nab InfinityBlack hackers
Five alleged members of hacking group InfinityBlack got some unexpected visitors last week when Polish law enforcement arrested them.
⚠ Fake news Facebook accounts used coronavirus to attract followers ⚠
📖 Read
via "Naked Security".
In April, the company yanked 1,887 misleading accounts, pages and groups tied to eight influencer networks building fake engagement.📖 Read
via "Naked Security".
Naked Security
Fake news Facebook accounts used coronavirus to attract followers
In April, the company yanked 1,887 misleading accounts, pages and groups tied to eight influencer networks building fake engagement.