π΄ A Rogues' Gallery of MacOS Malware π΄
π Read
via "Dark Reading: ".
MacOS isn't immune from malware. Being prepared means understanding the nature of the worst threats a security team is likely to see attacking Macs in the enterprise.π Read
via "Dark Reading: ".
Dark Reading
A Rogues' Gallery of MacOS Malware
MacOS isn't immune from malware. Being prepared means understanding the nature of the worst threats a security team is likely to see attacking Macs in the enterprise.
ATENTIONβΌ New - CVE-2020-13173
π Read
via "National Vulnerability Database".
Initialization of the pcoip_credential_provider in Teradici PCoIP Standard Agent for Windows and PCoIP Graphics Agent for Windows versions 19.11.1 and earlier creates an insecure named pipe, which allows an attacker to intercept sensitive information or possibly elevate privileges via pre-installing an application which acquires that named pipe.π Read
via "National Vulnerability Database".
β Google sued by Arizona for tracking usersβ locations in spite of settings β
π Read
via "Naked Security".
Maps, weather, searches et al. suck up location data in the background, even if Tracking is turned off. Arizona says it's consumer fraud.π Read
via "Naked Security".
Naked Security
Google sued by Arizona for tracking usersβ locations in spite of settings
Maps, weather, searches et al. suck up location data in the background, even if Tracking is turned off. Arizona says itβs consumer fraud.
β Windows 10 adds new security and privacy features in May update β
π Read
via "Naked Security".
Windows 10 release 2004 is out, with a slew of new features, including several updates to its security and privacy.π Read
via "Naked Security".
Naked Security
Windows 10 adds new security and privacy features in May update
Windows 10 release 2004 is out, with a slew of new features, including several updates to its security and privacy.
β COVID-19 tests, PPE and antivirual drugs find a home on the dark web β
π Read
via "Naked Security".
COVID-19 testing kits, Hydroxychloroquine and PPE - it's all for sale on the dark web.π Read
via "Naked Security".
Naked Security
COVID-19 tests, PPE and antivirual drugs find a home on the dark web
COVID-19 testing kits, Hydroxychloroquine and PPE β itβs all for sale on the dark web.
β ACLU Sues Clearview AI Over Faceprint Collection, Sale β
π Read
via "Threatpost".
Watchdog group said company has violated the Illinois BIPA and βwill end privacy as we know itβ without intervention.π Read
via "Threatpost".
Threat Post
ACLU Sues Clearview AI Over Faceprint Collection, Sale
Watchdog group said company has violated the Illinois BIPA and βwill end privacy as we know itβ without intervention.
π΄ Zscaler Buys Edge Networks π΄
π Read
via "Dark Reading: ".
The acquisition is Zscaler's second major buy this quarter.π Read
via "Dark Reading: ".
Dark Reading
Zscaler Buys Edge Networks
The acquisition is Zscaler's second major buy this quarter.
β βHack-For-Hireβ Firms Spoof WHO To Target Google Credentials β
π Read
via "Threatpost".
Google TAG report reveals that "hack for hire" firms are tapping into the coronavirus pandemic via WHO phishing lures.π Read
via "Threatpost".
Threat Post
βHack-For-Hireβ Firms Spoof WHO To Target Google Credentials
Google TAG report reveals that "hack for hire" firms are tapping into the coronavirus pandemic via WHO phishing lures.
π€1
π΄ All Links Are Safe ... Right? π΄
π Read
via "Dark Reading: ".
Today is a perfect day for a security breach.π Read
via "Dark Reading: ".
Dark Reading
All Links Are Safe ... Right?
Today is a perfect day for a security breach.
π΄ Digital Distancing with Microsegmentation π΄
π Read
via "Dark Reading: ".
Physical distancing has blunted a virus's impact; the same idea can be applied to computers and networks to minimize breaches, attacks, and infections.π Read
via "Dark Reading: ".
Dark Reading
Digital Distancing with Microsegmentation
Physical distancing has blunted a virus's impact; the same idea can be applied to computers and networks to minimize breaches, attacks, and infections.
π Phishing attack spoofs World Health Organization to steal email credentials π
π Read
via "Security on TechRepublic".
The malicious campaign is aimed at people in general in an effort to grab their email addresses and passwords, says Abnormal Security.π Read
via "Security on TechRepublic".
TechRepublic
Phishing attack spoofs World Health Organization to steal email credentials
The malicious campaign is aimed at people in general in an effort to grab their email addresses and passwords, says Abnormal Security.
β Clearview AI facial recogition sued again β this time by ACLU β
π Read
via "Naked Security".
Clearview AI, the company that's scraped billions of images to build a facial recognition system, is getting sued again.π Read
via "Naked Security".
Naked Security
Clearview AI facial recogition sued again β this time by ACLU
Clearview AI, the company thatβs scraped billions of images to build a facial recognition system, is getting sued again.
β NSA Warns of Sandworm Backdoor Attacks on Mail Servers β
π Read
via "Threatpost".
The Russian spy group, a.k.a. BlackEnergy, is actively compromising Exim mail servers via a critical security vulnerability.π Read
via "Threatpost".
Threat Post
NSA Warns of Sandworm Backdoor Attacks on Mail Servers
The Russian spy group, a.k.a. BlackEnergy, is actively compromising Exim mail servers via a critical security vulnerability.
β NTT Communications Data Breach Affects Customers, Threatens Supply Chain β
π Read
via "Threatpost".
Attackers managed to compromise NTT Communicationβs Active Directory server and a construction information management server.π Read
via "Threatpost".
Threat Post
NTT Communications Data Breach Affects Customers, Threatens Supply Chain
Attackers managed to compromise NTT Communicationβs Active Directory server and a construction information management server.
π Security at the network edge: Inside software-defined networking and Kubernetes π
π Read
via "Security on TechRepublic".
Security concerns remain prominent across all network environments, with some unique to the network edge, SDN, and other services. Get some tips from industry insiders.π Read
via "Security on TechRepublic".
TechRepublic
Security at the network edge: Inside software-defined networking and Kubernetes
Security concerns remain prominent across all network environments, with some unique to the network edge, SDN, and other services. Get some tips from industry insiders.
π΄ Cisco Announces Patches to SaltStack π΄
π Read
via "Dark Reading: ".
The patches came after Cisco was notified by the Salt Open Core team that the vulnerabilities and updates were available.π Read
via "Dark Reading: ".
Dark Reading
Cisco Announces Patches to SaltStack
The patches came after Cisco was notified by the Salt Open Core team that the vulnerabilities and updates were available.
π΄ Abandoned Apps May Pose Security Risk to Mobile Devices π΄
π Read
via "Dark Reading: ".
Mobile providers don't often update users when applications are not supported by developers, security firm says.π Read
via "Dark Reading: ".
Dark Reading
Abandoned Apps May Pose Security Risk to Mobile Devices
Mobile providers don't often update users when applications are not supported by developers, security firm says.
ATENTIONβΌ New - CVE-2020-12675
π Read
via "National Vulnerability Database".
The mappress-google-maps-for-wordpress plugin before 2.54.6 for WordPress does not correctly implement capability checks for AJAX functions related to creation/retrieval/deletion of PHP template files, leading to Remote Code Execution. NOTE: this issue exists because of an incomplete fix for CVE-2020-12077.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-11018
π Read
via "National Vulnerability Database".
In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-11017
π Read
via "National Vulnerability Database".
In FreeRDP less than or equal to 2.0.0, by providing manipulated input a malicious client can create a double free condition and crash the server. This is fixed in version 2.1.0.π Read
via "National Vulnerability Database".