ATENTION‼ New - CVE-2018-8956
📖 Read
via "National Vulnerability Database".
ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.📖 Read
via "National Vulnerability Database".
🕴 Microsoft Reportedly in Talks to Acquire CyberX 🕴
📖 Read
via "Dark Reading: ".
CyberX was founded in 2013 and has raised $48 million to build its cybersecurity platform for IoT and industrial control systems.📖 Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
🕴 Half of Companies Have Suffered a Cybersecurity Issue Amid COVID-19 Crisis 🕴
📖 Read
via "Dark Reading: ".
Survey shows 49% expect to experience a data breach or cybersecurity incident in the next month.📖 Read
via "Dark Reading: ".
Dark Reading
Half of Companies Have Suffered a Cybersecurity Issue Amid COVID-19 Crisis
Survey shows 49% expect to experience a data breach or cybersecurity incident in the next month.
🕴 Financial Phishing Attacks Take Off, Malware Declines 🕴
📖 Read
via "Dark Reading: ".
In the past year, the number of digital threats increased by nearly half as phishing swamped malware to become the most dominant attack technique.📖 Read
via "Dark Reading: ".
Dark Reading
Financial Phishing Attacks Take Off, Malware Declines
In the past year, the number of digital threats increased by nearly half as phishing swamped malware to become the most dominant attack technique.
🕴 What is an 'Endpoint'? 🕴
📖 Read
via "Dark Reading: ".
Some companies' endpoint security strategies may now cover an ever-widening array of devices, as Dark Reading's latest State of Endpoint Security survey discovered.📖 Read
via "Dark Reading: ".
Dark Reading
What is an 'Endpoint'?
Some companies' endpoint security strategies may now cover an ever-widening array of devices, as Dark Reading's latest State of Endpoint Security survey discovered.
🔐 Alarming number of pharma executive login credentials available on the Dark Web 🔐
📖 Read
via "Security on TechRepublic".
A new report details major vulnerabilities among the executive suite at some of the largest pharmaceutical companies.📖 Read
via "Security on TechRepublic".
TechRepublic
Alarming number of pharma executive login credentials available on the Dark Web
A new report details major vulnerabilities among the executive suite at some of the largest pharmaceutical companies.
❌ Lazarus Group Hides macOS Spyware in 2FA Application ❌
📖 Read
via "Threatpost".
The Dacls RAT has been ported from an existing Linux version.📖 Read
via "Threatpost".
Threat Post
Lazarus Group Hides macOS Spyware in 2FA Application
The Dacls RAT has been ported from an existing Linux version.
🕴 Attacks on WordPress Sites Surge 🕴
📖 Read
via "Dark Reading: ".
Defiant says it observed a 30-fold increase in attacks in just the past few days.📖 Read
via "Dark Reading: ".
Dark Reading
Attacks on WordPress Sites Surge
Defiant says it observed a 30-fold increase in attacks in just the past few days.
🕴 Maze Ransomware Operators Step Up Their Game 🕴
📖 Read
via "Dark Reading: ".
Investigations show Maze ransomware operators leave "nothing to chance" when putting pressure on victims to pay.📖 Read
via "Dark Reading: ".
Dark Reading
Maze Ransomware Operators Step Up Their Game
Investigations show Maze ransomware operators leave nothing to chance when putting pressure on victims to pay.
⚠ Police nab InfinityBlack hackers ⚠
📖 Read
via "Naked Security".
Five alleged members of hacking group InfinityBlack got some unexpected visitors last week when Polish law enforcement arrested them.📖 Read
via "Naked Security".
Naked Security
Police nab InfinityBlack hackers
Five alleged members of hacking group InfinityBlack got some unexpected visitors last week when Polish law enforcement arrested them.
⚠ Fake news Facebook accounts used coronavirus to attract followers ⚠
📖 Read
via "Naked Security".
In April, the company yanked 1,887 misleading accounts, pages and groups tied to eight influencer networks building fake engagement.📖 Read
via "Naked Security".
Naked Security
Fake news Facebook accounts used coronavirus to attract followers
In April, the company yanked 1,887 misleading accounts, pages and groups tied to eight influencer networks building fake engagement.
🔐 Businesses are overconfident about the state of their security 🔐
📖 Read
via "Security on TechRepublic".
60% of remote workers use personal devices, many without protection from their business' cybersecurity, a new report found.📖 Read
via "Security on TechRepublic".
TechRepublic
Businesses are overconfident about the state of their security
60% of remote workers use personal devices, many without protection from their business' cybersecurity, a new report found.
🔐 Businesses: Beware of COVID-19 email compromise scams 🔐
📖 Read
via "Security on TechRepublic".
Palo Alto Networks has found 10 separate coronavirus-themed business email compromise campaigns, and all can be tied back to a single Nigerian group called SilverTerrier.📖 Read
via "Security on TechRepublic".
TechRepublic
Businesses: Beware of COVID-19 email compromise scams
Palo Alto Networks has found 10 separate coronavirus-themed business email compromise campaigns, and all can be tied back to a single Nigerian group called SilverTerrier.
❌ Naikon APT Hid Five-Year Espionage Attack Under Radar ❌
📖 Read
via "Threatpost".
The Chinese APT has been discovered behind a five-year espionage campaign that compromises government servers - and uses that as leverage for other attacks.📖 Read
via "Threatpost".
Threat Post
Naikon APT Hid Five-Year Espionage Attack Under Radar
The Chinese APT has been discovered behind a five-year espionage campaign that compromises government servers - and uses that as leverage for other attacks.
🔐 Report: Chinese-linked hacking group has been infiltrating APAC governments for years 🔐
📖 Read
via "Security on TechRepublic".
Newly released evidence points to the Naikon APT being at the head of a 5-year espionage campaign that has phished information from countries all around the Asia-Pacific region.📖 Read
via "Security on TechRepublic".
TechRepublic
Report: Chinese-linked hacking group has been infiltrating APAC governments for years
Newly released evidence points to the Naikon APT being at the head of a 5-year espionage campaign that has phished information from countries all around the Asia-Pacific region.
🔐 A passwordless future: How security keys and biometrics are taking over 🔐
📖 Read
via "Security on TechRepublic".
Passwords are no longer a secure method of identity verification, resulting in many organizations to turn to other tactics, Yubico found.📖 Read
via "Security on TechRepublic".
TechRepublic
A passwordless future: How security keys and biometrics are taking over
Passwords are no longer a secure method of identity verification, resulting in many organizations to turn to other tactics, Yubico found.
🕴 7 Ways Parents Can Better Protect Their Online-Gamer Offspring 🕴
📖 Read
via "Dark Reading: ".
It's 11 a.m. Are your kids locked in their rooms playing games online?📖 Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
🔐 Microsoft: We'll give you $100,000 if you can hack our Azure Sphere IoT platform 🔐
📖 Read
via "Security on TechRepublic".
Microsoft is offering researchers $100,000 if they can crack the company's custom-built Linux OS for Internet of Things devices.📖 Read
via "Security on TechRepublic".
❌ Hackers Dumpster Dive for Taxpayer Data in COVID-19 Relief Money Scams ❌
📖 Read
via "Threatpost".
Threat actors are buying and selling taxpayer data on hacker forums as well as using phishing and other campaigns to steal various U.S. government payouts.📖 Read
via "Threatpost".
Threat Post
Hackers Dumpster Dive for Taxpayer Data in COVID-19 Relief Money Scams
Threat actors are buying and selling taxpayer data on hacker forums as well as using phishing and other campaigns to steal various U.S. government payouts.
🕴 Pandemic Could Accelerate Passwordless Authentication 🕴
📖 Read
via "Dark Reading: ".
As we celebrate another World Password Day, security pros are hopeful that when we move out of the stay-at-home period, companies will continue to focus on digital technologies - and ditching passwords.📖 Read
via "Dark Reading: ".
Dark Reading
Pandemic Could Accelerate Passwordless Authentication
As we celebrate another World Password Day, security pros are hopeful that when we move out of the stay-at-home period, companies will continue to focus on digital technologies - and ditching passwords.
🕴 Cybersecurity Home School: Garfield Teaches Security 🕴
📖 Read
via "Dark Reading: ".
The famous cartoon cat can help kids ages 6 to 11 learn to be more secure when they're online.📖 Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Home School: Garfield Teaches Security
The famous cartoon cat can help kids ages 6 to 11 learn to be more secure when they're online.