β REvil Ransomware Attack Hits A-List Celeb Law Firm β
π Read
via "Threatpost".
Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.π Read
via "Threatpost".
Threat Post
REvil Ransomware Attack Hits A-List Celeb Law Firm
Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.
π΄ Secure Contact Tracing Needs More Transparent Development π΄
π Read
via "Dark Reading: ".
Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.π Read
via "Dark Reading: ".
Dark Reading
Secure Contact Tracing Needs More Transparent Development
Experts worry that without proper planning, today's decisions about developing contact-tracing apps could have unforeseen consequences in the years to come.
π΄ Nine in 10 Applications Contain Outdated Software Components π΄
π Read
via "Dark Reading: ".
Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.π Read
via "Dark Reading: ".
Dark Reading
Nine in 10 Applications Contain Outdated Software Components
Almost every application uses open-source components and 91% use libraries that are out of date or that have been abandoned altogether.
π΄ Microsoft Fixes 111 Vulnerabilities for Patch Tuesday π΄
π Read
via "Dark Reading: ".
This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Website Attacks Become Quieter & More Persistent π΄
π Read
via "Dark Reading: ".
Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.π Read
via "Dark Reading: ".
Dark Reading
Website Attacks Become Quieter & More Persistent
Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.
β Criminal forum trading stolen data suffers ironic data breach β
π Read
via "Naked Security".
Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.π Read
via "Naked Security".
β TikTokβs handling of child privacy gets another watchdogβs attention β
π Read
via "Naked Security".
Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.π Read
via "Naked Security".
Naked Security
TikTokβs handling of child privacy gets another watchdogβs attention
Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.
β Feds Reveal Hidden Cobraβs Trove of Espionage Tools β
π Read
via "Threatpost".
The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.π Read
via "Threatpost".
Threat Post
Feds Reveal Hidden Cobraβs Trove of Espionage Tools
The APT's new cyber-attack tools are laid bare on three-year anniversary of WannaCry.
π΄ How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team π΄
π Read
via "Dark Reading: ".
Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go "off-script" when it comes to picking out candidates.π Read
via "Dark Reading: ".
Dark Reading
How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team
Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go off-script when it comes to picking out candidates.
π The 3 most popular coronavirus-related scams π
π Read
via "Security on TechRepublic".
The outbreak of COVID-19 has triggered a wave of scams, from fake pharmacies to stimulus payment promises to phony cryptocurrency wallets, says Bolster.π Read
via "Security on TechRepublic".
TechRepublic
The 3 most popular coronavirus-related scams
The outbreak of COVID-19 has triggered a wave of scams, from fake pharmacies to stimulus payment promises to phony cryptocurrency wallets, says Bolster.
π Watch for these job posting red flags π
π Read
via "Security on TechRepublic".
Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.π Read
via "Security on TechRepublic".
TechRepublic
Watch for these job posting red flags
Companies that don't have a social media presence or posts that don't list salary or benefit information are a big turnoff, SimplyHired survey finds.
π΄ More Tips for Staying Safe While Working from Home π΄
π Read
via "Dark Reading: ".
While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.π Read
via "Dark Reading: ".
Dark Reading
More Tips for Staying Safe While Working from Home
While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.
π How to protect your organization against the latest malware threats π
π Read
via "Security on TechRepublic".
With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your organization against the latest malware threats
With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.
π How to prevent unattended SSH connections from remaining connected π
π Read
via "Security on TechRepublic".
Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.π Read
via "Security on TechRepublic".
TechRepublic
How to prevent unattended SSH connections from remaining connected
Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.
β Healthcare Giant Magellan Struck with Ransomware, Data Breach β
π Read
via "Threatpost".
Logins, personal information and tax info were all exfiltrated ahead of the ransomware attack, thanks to a phishing email.π Read
via "Threatpost".
Threat Post
Healthcare Giant Magellan Struck with Ransomware, Data Breach
Logins, personal information and tax info were all exfiltrated ahead of the ransomware attack, thanks to a phishing email.
β Ramsay Malware Targets Air-Gapped Networks β
π Read
via "Threatpost".
The cyber-espionage toolkit is under active development.π Read
via "Threatpost".
Threat Post
Ramsay Malware Targets Air-Gapped Networks
The cyber-espionage toolkit is under active development.
π Insights for hiring the next generation of cybersecurity experts π
π Read
via "Security on TechRepublic".
A new report from Kudelski Security provides companies tips for how to recruit and retain talent up for the digital challenges of tomorrow.π Read
via "Security on TechRepublic".
TechRepublic
Insights for hiring the next generation of cybersecurity experts
A new report from Kudelski Security provides companies tips for how to recruit and retain talent up for the digital challenges of tomorrow.
π΄ CyberArk Acquires Idaptive for Identity-as-a-Service Tech π΄
π Read
via "Dark Reading: ".
The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.π Read
via "Dark Reading: ".
Dark Reading
CyberArk Acquires Idaptive for Identity-as-a-Service Tech
The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.
ATENTIONβΌ New - CVE-2019-16112
π Read
via "National Vulnerability Database".
TylerTech Eagle 2018.3.11 deserializes untrusted user input, resulting in remote code execution via a crafted Java object to the recorder/ServiceManager?service=tyler.empire.settings.SettingManager URI.π Read
via "National Vulnerability Database".
β Beware the DHL delivery message email β it could be a package scam β
π Read
via "Naked Security".
Here's a DHL delivery scam with a simple twist - simplicity and a total lack of drama...π Read
via "Naked Security".
Naked Security
Beware the DHL delivery message email β it could be a package scam
Hereβs a DHL delivery scam with a simple twist β simplicity and a total lack of dramaβ¦
π΄ Ransomware, Data Breach Follow Phishing Attack at Magellan Health π΄
π Read
via "Dark Reading: ".
The healthcare company has informed affected employees of a data breach on a single corporate server.π Read
via "Dark Reading: ".
Dark Reading
Ransomware, Data Breach Follow Phishing Attack at Magellan Health
The healthcare company has informed affected employees of a data breach on a single corporate server.