π Top 5 things to know about fleeceware π
π Read
via "Security on TechRepublic".
Fleeceware is an important cybersecurity threat to be aware of. Tom Merritt offers five things you should know fleeceware apps.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about fleeceware
Fleeceware is an important cybersecurity threat to be aware of. Tom Merritt offers five things you should know fleeceware apps.
β Ransomware Gang Arrested for Spreading Locky to Hospitals β
π Read
via "Threatpost".
A group of four people calling themselves "Pentaguard" were arrested in house raids.π Read
via "Threatpost".
Threat Post
Ransomware Gang Arrested for Spreading Locky to Hospitals
A group of four people calling themselves "Pentaguard" were arrested in house raids.
ATENTIONβΌ New - CVE-2019-17066
π Read
via "National Vulnerability Database".
In Ivanti WorkSpace Control before 10.4.40.0, a user can elevate rights on the system by hijacking certain user registries. This is possible because pwrgrid.exe first checks the Current User registry hives (HKCU) when starting an application with elevated rights.π Read
via "National Vulnerability Database".
β Verizon Data Breach Report: DoS Skyrockets, Espionage Dips β
π Read
via "Threatpost".
Denial of Service (DoS), ransomware, and financially-motivated data breaches were the winners in this year's Verizon DBIR.π Read
via "Threatpost".
Threat Post
Verizon Data Breach Report: DoS Skyrockets, Espionage Dips
Denial of Service (DoS), ransomware, and financially-motivated data breaches were the winners in this year's Verizon DBIR.
π 86% of data breaches are conducted for financial gain π
π Read
via "Security on TechRepublic".
Increases in hacking, phishing, and cloud-based attacks have been even more prevalent with the influx of remote work, Verizon found.π Read
via "Security on TechRepublic".
TechRepublic
86% of data breaches are conducted for financial gain
Increases in hacking, phishing, and cloud-based attacks have been even more prevalent with the influx of remote work, Verizon found.
π How the dark web is handling the coronavirus pandemic π
π Read
via "Security on TechRepublic".
Many on the dark web are expressing the same thoughts and fears about COVID-19 as everyone else, while others are looking for ways to profit from it, says Trustwave.π Read
via "Security on TechRepublic".
TechRepublic
How the dark web is handling the coronavirus pandemic
Many on the dark web are expressing the same thoughts and fears about COVID-19 as everyone else, while others are looking for ways to profit from it, says Trustwave.
β Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials β
π Read
via "Threatpost".
The attack discovered by Cofense can steal sensitive user data stored on the cloud as well as find other victims to target.π Read
via "Threatpost".
Threat Post
Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials
The attack discovered by Cofense can steal sensitive user data stored on the cloud as well as find other victims to target.
π΄ Hackers Hit Food Supply Company π΄
π Read
via "Dark Reading: ".
The attackers behind the REvil ransomware family has also threatened to release personal data on Madonna and other celebrities to the highest bidders.π Read
via "Dark Reading: ".
Dark Reading
Hackers Hit Food Supply Company
The attackers behind the REvil ransomware family has also threatened to release personal data on Madonna and other celebrities to the highest bidders.
π CEOs, CISOs fear becoming the next big breach target π
π Read
via "Security on TechRepublic".
Yet, less than half believe their business has an effective cybersecurity strategy in place, according to a Forcepoint survey.π Read
via "Security on TechRepublic".
TechRepublic
CEOs, CISOs fear becoming the next big breach target
Yet, less than half believe their business has an effective cybersecurity strategy in place, according to a Forcepoint survey.
π΄ Cybersecurity Extends Far Beyond Security Teams & Everyone Plays a Part π΄
π Read
via "Dark Reading: ".
Security isn't about tools or technology; it's about establishing a broad, fundamental awareness and sense of responsibility among all employees.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Extends Far Beyond Security Teams & Everyone Plays a Part
Security isn't about tools or technology; it's about establishing a broad, fundamental awareness and sense of responsibility among all employees.
β Firefox to tell you if sites are shortening your passwords β
π Read
via "Naked Security".
Mozilla is fixing a longstanding password problem to alert users when their password exceeds the maximum length allowed.π Read
via "Naked Security".
Naked Security
Firefox to tell you if sites are shortening your passwords
Mozilla is fixing a longstanding password problem to alert users when their password exceeds the maximum length allowed.
β Cash-flashing rapper charged with money laundering for BTC-e β
π Read
via "Naked Security".
The FBI nabbed "Plinofficial" when he arrived at Miami airport carrying $20K cash, allegedly made off of the defunct, fraud-fav exchange.π Read
via "Naked Security".
Naked Security
Cash-flashing rapper charged with money laundering for BTC-e
The FBI nabbed βPlinofficialβ when he arrived at Miami airport carrying $20K cash, allegedly made off of the defunct, fraud-fav exchange.
π nfstream 5.1.2 π
π Go!
via "Security Tool Files β Packet Storm".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
nfstream 5.1.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Falco 0.23.0 π
π Go!
via "Security Tool Files β Packet Storm".
Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Falco 0.23.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Adobe Patches Critical RCE Flaw in Character Animator App β
π Read
via "Threatpost".
A critical remote code execution flaw in Adobe Character Animator was fixed in an out-of-band Tuesday patch.π Read
via "Threatpost".
Threat Post
Adobe Patches Critical RCE Flaw in Character Animator App
A critical remote code execution flaw in Adobe Character Animator was fixed in an out-of-band Tuesday patch.
π Encrypt compressed files the easy way from Windows, macOS, or Linux π
π Read
via "Security on TechRepublic".
Learn to secure multiple documents by encrypting compressed files on various OSes using a password.π Read
via "Security on TechRepublic".
TechRepublic
How to encrypt compressed files the easy way from Windows, macOS, or Linux
Learn to secure multiple documents by encrypting compressed files on various OSes using a password.
π΄ 7 Security Pros: What My Nontraditional Background Brings to the Job π΄
π Read
via "Dark Reading: ".
Job experience and degrees outside of the cybersecurity or IT world can provide invaluable diversity of thinking and problem-solving.π Read
via "Dark Reading: ".
Dark Reading
7 Security Pros: What My Nontraditional Background Brings to the Job
Job experience and degrees outside of the cybersecurity or IT world can provide invaluable diversity of thinking and problem-solving.
β Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices β
π Read
via "Threatpost".
A host of unpatched security bugs that allow BIAS attacks affects Bluetooth chips from Apple, Intel, Qualcomm, Samsung and others.π Read
via "Threatpost".
Threat Post
Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices
A host of unpatched security bugs that allow BIAS attacks affects Bluetooth chips from Apple, Intel, Qualcomm, Samsung and others.
π΄ EasyJet Sees 9 Million Customer Email Addresses Stolen π΄
π Read
via "Dark Reading: ".
More than 2,000 customers also had credit card information taken in the attack.π Read
via "Dark Reading: ".
Dark Reading
EasyJet Sees 9 Million Customer Email Addresses Stolen
More than 2,000 customers also had credit card information taken in the attack.
β WolfRAT Android Malware Targets WhatsApp, Facebook Messenger β
π Read
via "Threatpost".
Researchers link the malware to Wolf Research operators with "high confidence" after it was spotted in campaigns targeting Thai users.π Read
via "Threatpost".
Threat Post
WolfRAT Android Malware Targets WhatsApp, Facebook Messenger
Researchers link the malware to Wolf Research with "high confidence" after it was spotted in campaigns targeting Thai users.