π΄ A-List Celebrity Law Firm Confirms Cyberattack π΄
π Read
via "Dark Reading: ".
Attackers claim to steal 756GB of data from Grubman Shire Meiselas & Sacks, which includes Madonna and Lady Gaga among its clients.π Read
via "Dark Reading: ".
Dark Reading
A-List Celebrity Law Firm Confirms Cyberattack
Attackers claim to steal 756GB of data from Grubman Shire Meiselas & Sacks, which includes Madonna and Lady Gaga among its clients.
π Thunderspy Vulnerabilities Could Allow Data Theft From Encrypted Drives π
π Read
via "Subscriber Blog RSS Feed ".
Assuming an attacker has physical access to a machine, a new attack could let allow for the access of data on a locked, password protected, and encrypted hard drive.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Thunderspy Vulnerabilities Could Allow Data Theft From Encrypted Drives
Assuming an attacker has physical access to a machine, a new attack could let allow for the access of data on a locked, password protected, and encrypted hard drive.
π΄ The Modern SOC Demands New Skills π΄
π Read
via "Dark Reading: ".
Automation and other technologies are improving the organizational structure of the security operations center. This is ultimately for the better, but it means that roles will change too.π Read
via "Dark Reading: ".
Dark Reading
The Modern SOC Demands New Skills
Automation and other technologies are improving the organizational structure of the security operations center. This is ultimately for the better, but it means that roles will change too.
π΄ Three Years After WannaCry, Ransomware Accelerating While Patching Still Problematic π΄
π Read
via "Dark Reading: ".
Using a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons.π Read
via "Dark Reading: ".
Dark Reading
Three Years After WannaCry, Ransomware Accelerating While Patching Still Problematic
Using a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons.
β Microsoft Addresses 111 Bugs for May Patch Tuesday β
π Read
via "Threatpost".
Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.π Read
via "Threatpost".
Threat Post
Microsoft Addresses 111 Bugs for May Patch Tuesday
Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.
π Clam AntiVirus Toolkit 0.102.3 π
π Go!
via "Security Tool Files β Packet Storm".
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Clam AntiVirus Toolkit 0.102.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ DHS, FBI & DoD Report on New North Korean Malware π΄
π Read
via "Dark Reading: ".
Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea.π Read
via "Dark Reading: ".
Dark Reading
DHS, FBI & DoD Report on New North Korean Malware
Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea.
β REvil Ransomware Attack Hits A-List Celeb Law Firm β
π Read
via "Threatpost".
Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.π Read
via "Threatpost".
Threat Post
REvil Ransomware Attack Hits A-List Celeb Law Firm
Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.
π΄ Secure Contact Tracing Needs More Transparent Development π΄
π Read
via "Dark Reading: ".
Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.π Read
via "Dark Reading: ".
Dark Reading
Secure Contact Tracing Needs More Transparent Development
Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.
π΄ Nine in 10 Applications Contain Outdated Software Components π΄
π Read
via "Dark Reading: ".
Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.π Read
via "Dark Reading: ".
Dark Reading
Nine in 10 Applications Contain Outdated Software Components
Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.
π΄ Microsoft Fixes 111 Vulnerabilities for Patch Tuesday π΄
π Read
via "Dark Reading: ".
This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Website Attacks Become Quieter & More Persistent π΄
π Read
via "Dark Reading: ".
Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.π Read
via "Dark Reading: ".
Dark Reading
Website Attacks Become Quieter & More Persistent
Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.
β Criminal forum trading stolen data suffers ironic data breach β
π Read
via "Naked Security".
Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.π Read
via "Naked Security".
β TikTokβs handling of child privacy gets another watchdogβs attention β
π Read
via "Naked Security".
Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.π Read
via "Naked Security".
Naked Security
TikTokβs handling of child privacy gets another watchdogβs attention
Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.
β Feds Reveal Hidden Cobraβs Trove of Espionage Tools β
π Read
via "Threatpost".
The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.π Read
via "Threatpost".
Threat Post
Feds Reveal Hidden Cobraβs Trove of Espionage Tools
The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.
π΄ How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team π΄
π Read
via "Dark Reading: ".
Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go "off-script" when it comes to picking out candidates.π Read
via "Dark Reading: ".
Dark Reading
How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team
Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go off-script when it comes to picking out candidates.
π The 3 most popular coronavirus-related scams π
π Read
via "Security on TechRepublic".
The outbreak of COVID-19 has triggered a wave of scams, from fake pharmacies to stimulus payment promises to phony cryptocurrency wallets, says Bolster.π Read
via "Security on TechRepublic".
TechRepublic
The 3 most popular coronavirus-related scams
The outbreak of COVID-19 has triggered a wave of scams, from fake pharmacies to stimulus payment promises to phony cryptocurrency wallets, says Bolster.
π Watch for these job posting red flags π
π Read
via "Security on TechRepublic".
Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.π Read
via "Security on TechRepublic".
TechRepublic
Watch for these job posting red flags
Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.
π΄ More Tips for Staying Safe While Working from Home π΄
π Read
via "Dark Reading: ".
While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.π Read
via "Dark Reading: ".
Dark Reading
More Tips for Staying Safe While Working from Home
While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.
π How to protect your organization against the latest malware threats π
π Read
via "Security on TechRepublic".
With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your organization against the latest malware threats
With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.
π How to prevent unattended SSH connections from remaining connected π
π Read
via "Security on TechRepublic".
Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.π Read
via "Security on TechRepublic".
TechRepublic
How to prevent unattended SSH connections from remaining connected
Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.