ATENTIONβΌ New - CVE-2017-14200
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2017.π Read
via "National Vulnerability Database".
π΄ 6 Free Cybersecurity Training and Awareness Courses π΄
π Read
via "Dark Reading: ".
Most are designed to help organizations address teleworking risks related to COVID-19 scams.π Read
via "Dark Reading: ".
Dark Reading
6 Free Cybersecurity Training and Awareness Courses
Most are designed to help organizations address teleworking risks related to COVID-19 scams.
β Maze ransomware one year on β a SophosLabs report β
π Read
via "Naked Security".
The latest SophosLabs report tells the story of how the infamous "Maze" ransomware has evolved over the past 12 months...π Read
via "Naked Security".
Naked Security
Maze ransomware one year on β a SophosLabs report
The latest SophosLabs report tells the story of how the infamous βMazeβ ransomware has evolved over the past 12 monthsβ¦
β Anubis Malware Upgrade Logs When Victims Look at Their Screens β
π Read
via "Threatpost".
Threat actors are cooking up new features for the sophisticated banking trojan that targets Google Android apps and devices.π Read
via "Threatpost".
Threat Post
Anubis Malware Upgrade Logs When Victims Look at Their Screens
Threat actors are cooking up new features for the sophisticated banking trojan that targets Google Android apps and devices.
β Dating app user logins found on hacking forum β
π Read
via "Naked Security".
3.5 million user logins for the MobiFriends dating app are being offered for free on a popular dark web hackers forum.π Read
via "Naked Security".
Naked Security
Dating app user logins found on hacking forum
3.5 million user logins for the MobiFriends dating app are being offered for free on a popular dark web hackers forum.
π΄ Data Breaches Declined in Q1 2020 Over Q1 2019 -- Or Did They? π΄
π Read
via "Dark Reading: ".
Numbers are down, but that may only be because organizations have been too busy fighting COVID-19-related cyberthreats to notice compromises, Risk Based Security says.π Read
via "Dark Reading: ".
Dark Reading
Data Breaches Declined in Q1 2020 Over Q1 2019 -- Or Did They?
Numbers are down, but that may only be because organizations have been too busy fighting COVID-19-related cyberthreats to notice compromises, Risk Based Security says.
β Chatbooks Confirms Breach After βShiny Huntersβ Sell Data β
π Read
via "Threatpost".
Photo print service Chatbooks has disclosed a data breach after customers' emails, passwords and more were listed for sale on underground forums.π Read
via "Threatpost".
Threat Post
Chatbooks Confirms Breach After βShiny Huntersβ Sell Data
Photo print service Chatbooks has disclosed a data breach after customers' emails, passwords and more were listed for sale on underground forums.
π΄ Coronavirus, Data Privacy & the New Online Social Contract π΄
π Read
via "Dark Reading: ".
How governments can protect personal privacy in contact tracing while saving peoples' livesπ Read
via "Dark Reading: ".
Dark Reading
Coronavirus, Data Privacy & the New Online Social Contract
How governments can protect personal privacy in contact tracing while saving peoples' lives
β Huge toll of ransomware attacks revealed in Sophos report β
π Read
via "Naked Security".
To understand the scope of the ransomware threat, Sophos commissioned a study into the state of ransomware 2020.π Read
via "Naked Security".
Naked Security
Huge toll of ransomware attacks revealed in Sophos report
To understand the scope of the ransomware threat, Sophos commissioned a study into the state of ransomware 2020.
β Thunderspy β why turning your computer off is a cool idea! β
π Read
via "Naked Security".
Thunderbolt ports can provide direct access to the memory in your laptop... just how hard is it for crooks to do so when you aren't looking?π Read
via "Naked Security".
Naked Security
Thunderspy β why turning your computer off is a cool idea!
Thunderbolt ports can provide direct access to the memory in your laptopβ¦ just how hard is it for crooks to do so when you arenβt looking?
π How an MIT spin-off is using contact tracing to fight COVID-19, and so can you π
π Read
via "Security on TechRepublic".
Previously, manual contact tracing was used during pandemics. Now, the MIT Media Lab-hosted Safe Paths Project app can help track the virus and inform people if they've been exposed.π Read
via "Security on TechRepublic".
TechRepublic
How an MIT spin-off is using contact tracing to fight COVID-19, and so can you
Previously, manual contact tracing was used during pandemics. Now, the MIT Media Lab-hosted Safe Paths Project app can help track the virus and inform people if they've been exposed.
π BlackBerry Bootcamp boosts university applied computing with cybersecurity program π
π Read
via "Security on TechRepublic".
Canadian-based BlackBerry partnered with the University of Windsor to create a cybersecurity "camp" for students to matriculate online during the COVID-19 crisis.π Read
via "Security on TechRepublic".
TechRepublic
BlackBerry Bootcamp boosts university applied computing with cybersecurity program
Canadian-based BlackBerry partnered with the University of Windsor to create a cybersecurity "camp" for students to matriculate online during the COVID-19 crisis.
β Adobe Kills 16 Critical Flaws in Acrobat and Reader, Digital Negative SDK β
π Read
via "Threatpost".
Adobe patched 36 flaws, including critical vulnerabilities in Acrobat and Reader and its DNG Software Development Kit.π Read
via "Threatpost".
Threat Post
Adobe Kills 16 Critical Flaws in Acrobat and Reader, Digital Negative SDK
Adobe patched 36 flaws, including critical vulnerabilities in Acrobat and Reader and its DNG Software Development Kit.
β WordPress Page Builder Plugin Bugs Threaten 1 Million Sites with Full Takeover β
π Read
via "Threatpost".
Severe CSRF to XSS bugs open the door to code execution and complete website compromise.π Read
via "Threatpost".
Threat Post
WordPress Page Builder Plugin Bugs Threaten 1 Million Sites with Full Takeover
Severe CSRF to XSS bugs open the door to code execution and complete website compromise.
π΄ A-List Celebrity Law Firm Confirms Cyberattack π΄
π Read
via "Dark Reading: ".
Attackers claim to steal 756GB of data from Grubman Shire Meiselas & Sacks, which includes Madonna and Lady Gaga among its clients.π Read
via "Dark Reading: ".
Dark Reading
A-List Celebrity Law Firm Confirms Cyberattack
Attackers claim to steal 756GB of data from Grubman Shire Meiselas & Sacks, which includes Madonna and Lady Gaga among its clients.
π Thunderspy Vulnerabilities Could Allow Data Theft From Encrypted Drives π
π Read
via "Subscriber Blog RSS Feed ".
Assuming an attacker has physical access to a machine, a new attack could let allow for the access of data on a locked, password protected, and encrypted hard drive.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Thunderspy Vulnerabilities Could Allow Data Theft From Encrypted Drives
Assuming an attacker has physical access to a machine, a new attack could let allow for the access of data on a locked, password protected, and encrypted hard drive.
π΄ The Modern SOC Demands New Skills π΄
π Read
via "Dark Reading: ".
Automation and other technologies are improving the organizational structure of the security operations center. This is ultimately for the better, but it means that roles will change too.π Read
via "Dark Reading: ".
Dark Reading
The Modern SOC Demands New Skills
Automation and other technologies are improving the organizational structure of the security operations center. This is ultimately for the better, but it means that roles will change too.
π΄ Three Years After WannaCry, Ransomware Accelerating While Patching Still Problematic π΄
π Read
via "Dark Reading: ".
Using a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons.π Read
via "Dark Reading: ".
Dark Reading
Three Years After WannaCry, Ransomware Accelerating While Patching Still Problematic
Using a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons.
β Microsoft Addresses 111 Bugs for May Patch Tuesday β
π Read
via "Threatpost".
Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.π Read
via "Threatpost".
Threat Post
Microsoft Addresses 111 Bugs for May Patch Tuesday
Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.
π Clam AntiVirus Toolkit 0.102.3 π
π Go!
via "Security Tool Files β Packet Storm".
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Clam AntiVirus Toolkit 0.102.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ DHS, FBI & DoD Report on New North Korean Malware π΄
π Read
via "Dark Reading: ".
Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea.π Read
via "Dark Reading: ".
Dark Reading
DHS, FBI & DoD Report on New North Korean Malware
Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea.