β Huge toll of ransomware attacks revealed in Sophos report β
π Read
via "Naked Security".
To understand the scope of the ransomware threat, Sophos commissioned a study into the state of ransomware 2020.π Read
via "Naked Security".
Naked Security
Huge toll of ransomware attacks revealed in Sophos report
To understand the scope of the ransomware threat, Sophos commissioned a study into the state of ransomware 2020.
β Thunderspy β why turning your computer off is a cool idea! β
π Read
via "Naked Security".
Thunderbolt ports can provide direct access to the memory in your laptop... just how hard is it for crooks to do so when you aren't looking?π Read
via "Naked Security".
Naked Security
Thunderspy β why turning your computer off is a cool idea!
Thunderbolt ports can provide direct access to the memory in your laptopβ¦ just how hard is it for crooks to do so when you arenβt looking?
π How an MIT spin-off is using contact tracing to fight COVID-19, and so can you π
π Read
via "Security on TechRepublic".
Previously, manual contact tracing was used during pandemics. Now, the MIT Media Lab-hosted Safe Paths Project app can help track the virus and inform people if they've been exposed.π Read
via "Security on TechRepublic".
TechRepublic
How an MIT spin-off is using contact tracing to fight COVID-19, and so can you
Previously, manual contact tracing was used during pandemics. Now, the MIT Media Lab-hosted Safe Paths Project app can help track the virus and inform people if they've been exposed.
π BlackBerry Bootcamp boosts university applied computing with cybersecurity program π
π Read
via "Security on TechRepublic".
Canadian-based BlackBerry partnered with the University of Windsor to create a cybersecurity "camp" for students to matriculate online during the COVID-19 crisis.π Read
via "Security on TechRepublic".
TechRepublic
BlackBerry Bootcamp boosts university applied computing with cybersecurity program
Canadian-based BlackBerry partnered with the University of Windsor to create a cybersecurity "camp" for students to matriculate online during the COVID-19 crisis.
β Adobe Kills 16 Critical Flaws in Acrobat and Reader, Digital Negative SDK β
π Read
via "Threatpost".
Adobe patched 36 flaws, including critical vulnerabilities in Acrobat and Reader and its DNG Software Development Kit.π Read
via "Threatpost".
Threat Post
Adobe Kills 16 Critical Flaws in Acrobat and Reader, Digital Negative SDK
Adobe patched 36 flaws, including critical vulnerabilities in Acrobat and Reader and its DNG Software Development Kit.
β WordPress Page Builder Plugin Bugs Threaten 1 Million Sites with Full Takeover β
π Read
via "Threatpost".
Severe CSRF to XSS bugs open the door to code execution and complete website compromise.π Read
via "Threatpost".
Threat Post
WordPress Page Builder Plugin Bugs Threaten 1 Million Sites with Full Takeover
Severe CSRF to XSS bugs open the door to code execution and complete website compromise.
π΄ A-List Celebrity Law Firm Confirms Cyberattack π΄
π Read
via "Dark Reading: ".
Attackers claim to steal 756GB of data from Grubman Shire Meiselas & Sacks, which includes Madonna and Lady Gaga among its clients.π Read
via "Dark Reading: ".
Dark Reading
A-List Celebrity Law Firm Confirms Cyberattack
Attackers claim to steal 756GB of data from Grubman Shire Meiselas & Sacks, which includes Madonna and Lady Gaga among its clients.
π Thunderspy Vulnerabilities Could Allow Data Theft From Encrypted Drives π
π Read
via "Subscriber Blog RSS Feed ".
Assuming an attacker has physical access to a machine, a new attack could let allow for the access of data on a locked, password protected, and encrypted hard drive.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Thunderspy Vulnerabilities Could Allow Data Theft From Encrypted Drives
Assuming an attacker has physical access to a machine, a new attack could let allow for the access of data on a locked, password protected, and encrypted hard drive.
π΄ The Modern SOC Demands New Skills π΄
π Read
via "Dark Reading: ".
Automation and other technologies are improving the organizational structure of the security operations center. This is ultimately for the better, but it means that roles will change too.π Read
via "Dark Reading: ".
Dark Reading
The Modern SOC Demands New Skills
Automation and other technologies are improving the organizational structure of the security operations center. This is ultimately for the better, but it means that roles will change too.
π΄ Three Years After WannaCry, Ransomware Accelerating While Patching Still Problematic π΄
π Read
via "Dark Reading: ".
Using a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons.π Read
via "Dark Reading: ".
Dark Reading
Three Years After WannaCry, Ransomware Accelerating While Patching Still Problematic
Using a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons.
β Microsoft Addresses 111 Bugs for May Patch Tuesday β
π Read
via "Threatpost".
Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.π Read
via "Threatpost".
Threat Post
Microsoft Addresses 111 Bugs for May Patch Tuesday
Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.
π Clam AntiVirus Toolkit 0.102.3 π
π Go!
via "Security Tool Files β Packet Storm".
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Clam AntiVirus Toolkit 0.102.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ DHS, FBI & DoD Report on New North Korean Malware π΄
π Read
via "Dark Reading: ".
Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea.π Read
via "Dark Reading: ".
Dark Reading
DHS, FBI & DoD Report on New North Korean Malware
Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea.
β REvil Ransomware Attack Hits A-List Celeb Law Firm β
π Read
via "Threatpost".
Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.π Read
via "Threatpost".
Threat Post
REvil Ransomware Attack Hits A-List Celeb Law Firm
Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.
π΄ Secure Contact Tracing Needs More Transparent Development π΄
π Read
via "Dark Reading: ".
Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.π Read
via "Dark Reading: ".
Dark Reading
Secure Contact Tracing Needs More Transparent Development
Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.
π΄ Nine in 10 Applications Contain Outdated Software Components π΄
π Read
via "Dark Reading: ".
Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.π Read
via "Dark Reading: ".
Dark Reading
Nine in 10 Applications Contain Outdated Software Components
Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.
π΄ Microsoft Fixes 111 Vulnerabilities for Patch Tuesday π΄
π Read
via "Dark Reading: ".
This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Website Attacks Become Quieter & More Persistent π΄
π Read
via "Dark Reading: ".
Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.π Read
via "Dark Reading: ".
Dark Reading
Website Attacks Become Quieter & More Persistent
Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.
β Criminal forum trading stolen data suffers ironic data breach β
π Read
via "Naked Security".
Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.π Read
via "Naked Security".
β TikTokβs handling of child privacy gets another watchdogβs attention β
π Read
via "Naked Security".
Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.π Read
via "Naked Security".
Naked Security
TikTokβs handling of child privacy gets another watchdogβs attention
Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.
β Feds Reveal Hidden Cobraβs Trove of Espionage Tools β
π Read
via "Threatpost".
The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.π Read
via "Threatpost".
Threat Post
Feds Reveal Hidden Cobraβs Trove of Espionage Tools
The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.