β PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time β
π Read
via "Threatpost".
Microsoft has warned on a new breed of patient ransomware attacks that lurk in networks for weeks before striking.π Read
via "Threatpost".
Threat Post
PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time
Microsoft has warned on a new breed of patient ransomware attacks that lurk in networks for weeks before striking.
π΄ Data Loss Spikes Under COVID-19 Lockdowns π΄
π Read
via "Dark Reading: ".
Two new reports suggest a massive gap between how organizations have prepared their cybersecurity defenses and the reality of their efficacy.π Read
via "Dark Reading: ".
Dark Reading
Data Loss Spikes Under COVID-19 Lockdowns
Two new reports suggest a massive gap between how organizations have prepared their cybersecurity defenses and the reality of their efficacy.
π΄ Google, Microsoft Brands Impersonated the Most in Form-Based Attacks π΄
π Read
via "Dark Reading: ".
Attackers are preying on users' inclination to click on familiar-looking websites, but instead trick them into sharing usernames and passwords.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Vulnerability Disclosures Drop in Q1 for First Time in a Decade π΄
π Read
via "Dark Reading: ".
Even with more security issues published on Patch Tuesdays, the total number of software flaws dropped for the first three months of 2020, according to one tally.π Read
via "Dark Reading: ".
Dark Reading
Vulnerability Disclosures Drop in Q1 for First Time in a Decade
Even with more security issues published on Patch Tuesdays, the total number of software flaws dropped for the first three months of 2020, according to one tally.
π How to properly secure sysctl on Linux π
π Read
via "Security on TechRepublic".
Protecting your Linux servers against SYN attacks and IP spoofing isn't nearly as hard you think. Jack Wallen shows you how.π Read
via "Security on TechRepublic".
TechRepublic
How to properly secure sysctl on Linux
Protecting your Linux servers against SYN attacks and IP spoofing isn't nearly as hard you think. Jack Wallen shows you how.
ATENTIONβΌ New - CVE-2020-13362
π Read
via "National Vulnerability Database".
In QEMU 4.2.0, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-13361
π Read
via "National Vulnerability Database".
In QEMU 4.2.0, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-20807
π Read
via "National Vulnerability Database".
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).π Read
via "National Vulnerability Database".
β Google Location Tracking Lambasted in Arizona Lawsuit β
π Read
via "Threatpost".
The lawsuit, filed against Google by Arizona's Attorney General, alleges that the tech giant uses βdeceptive and unfair conductβ to obtain usersβ location data.π Read
via "Threatpost".
Threat Post
Google Location Tracking Lambasted in Arizona Lawsuit
The lawsuit, filed against Google by Arizona's Attorney General, alleges that the tech giant uses βdeceptive and unfair conductβ to obtain usersβ location data.
π΄ 3 SMB Cybersecurity Myths Debunked π΄
π Read
via "Dark Reading: ".
Small and midsize businesses are better at cyber resilience than you might think.π Read
via "Dark Reading: ".
Dark Reading
3 SMB Cybersecurity Myths Debunked
Small and midsize businesses are better at cyber resilience than you might think.
π΄ NSA Warns Russia's 'Sandworm' Group Is Targeting Email Servers π΄
π Read
via "Dark Reading: ".
The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.π Read
via "Dark Reading: ".
Dark Reading
NSA Warns Russia's 'Sandworm' Group Is Targeting Email Servers
The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.
π How to enable two-factor authentication for Bitwarden π
π Read
via "Security on TechRepublic".
If you use Bitwarden as your password manager of choice, you owe it to yourself to enable two-factor authentication.π Read
via "Security on TechRepublic".
TechRepublic
How to enable two-factor authentication for Bitwarden
If you use Bitwarden as your password manager of choice, you owe it to yourself to enable two-factor authentication.
ATENTIONβΌ New - CVE-2020-13245
π Read
via "National Vulnerability Database".
Certain NETGEAR devices are affected by Missing SSL Certificate Validation. This affects R7000 1.0.9.6_1.2.19 through 1.0.11.100_10.2.10, and possibly R6120, R7800, R6220, R8000, R6350, R9000, R6400, RAX120, R6400v2, RBR20, R6800, XR300, R6850, XR500, and R7000P.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-11079
π Read
via "National Vulnerability Database".
node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.π Read
via "National Vulnerability Database".
β Hackers Compromise Cisco Servers Via SaltStack Flaws β
π Read
via "Threatpost".
Attackers compromised six Cisco VIRL-PE servers that are affected by critical SaltStack vulnerabilities.π Read
via "Threatpost".
Threat Post
Hackers Compromise Cisco Servers Via SaltStack Flaws
Attackers compromised six Cisco VIRL-PE servers that are affected by critical SaltStack vulnerabilities.
π΄ Valak Malware Retasked to Steal Data from US, German Firms π΄
π Read
via "Dark Reading: ".
Once considered a loader for other malware, Valak regularly conducts reconnaissance and steals information and credentials, new analysis shows.π Read
via "Dark Reading: ".
Dark Reading
Valak Malware Retasked to Steal Data from US, German Firms
Once considered a loader for other malware, Valak regularly conducts reconnaissance and steals information and credentials, new analysis shows.
π΄ Researchers ID Hacktivist Who Defaced Nearly 5,000 Websites π΄
π Read
via "Dark Reading: ".
Opsec mistakes lead a Check Point researcher to an individual in Brazil who was behind a longtime hacking campaign.π Read
via "Dark Reading: ".
Dark Reading
Researchers ID Hacktivist Who Defaced Nearly 5,000 Websites
Opsec mistakes lead a Check Point researcher to an individual in Brazil who was behind a longtime hacking campaign.
π΄ GitHub Supply Chain Attack Uses Octopus Scanner Malware π΄
π Read
via "Dark Reading: ".
Octopus Scanner is a new malware used to compromise 26 open source projects in a massive GitHub supply chain attack.π Read
via "Dark Reading: ".
Dark Reading
GitHub Supply Chain Attack Uses Octopus Scanner Malware
Octopus Scanner is a new malware used to compromise 26 open source projects in a massive GitHub supply chain attack.
β Inside the Hoaxcalls Botnet: Both Success and Failure β
π Read
via "Threatpost".
The DDoS group sets itself apart by using exploits -- but it doesn't always pan out.π Read
via "Threatpost".
Threat Post
Inside the Hoaxcalls Botnet: Both Success and Failure
The DDoS group sets itself apart by using exploits β but it doesn't always pan out.
ATENTIONβΌ New - CVE-2020-11082
π Read
via "National Vulnerability Database".
In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-6342
π Read
via "National Vulnerability Database".
An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.π Read
via "National Vulnerability Database".