ATENTIONβΌ New - CVE-2011-2863
π Read
via "National Vulnerability Database".
Insufficient policy enforcement in V8 in Google Chrome prior to 14.0.0.0 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1805
π Read
via "National Vulnerability Database".
Bad cast in CSS in Google Chrome prior to 11.0.0.0 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
β ZLoader-Laced Emails Target Unemployed Victims β
π Read
via "Threatpost".
Researchers are warning of spear-phishing emails with CV lures that spread the ZLoader malware, which steals banking credentials from victims.π Read
via "Threatpost".
Threat Post
ZLoader-Laced Emails Masquerade As CVs From Job-Seekers
Researchers are warning of spear-phishing emails with CV lures that spread the ZLoader malware, which steals banking credentials from victims.
β Google deletes Indian app that deleted Chinese apps β
π Read
via "Naked Security".
Google has deleted an app from the Play Store that offered to delete Android software associated with China.π Read
via "Naked Security".
Naked Security
Google deletes Indian app that deleted Chinese apps
Google has deleted an app from the Play Store that offered to delete Android software associated with China.
π Cybercriminals now spoofing job hunters to deploy password-stealing malware π
π Read
via "Security on TechRepublic".
Malicious files masquerading as curriculum vitae are being sent to businesses to install malware that can capture passwords and other sensitive information, says Check Point Research.π Read
via "Security on TechRepublic".
TechRepublic
Cybercriminals now spoofing job hunters to deploy password-stealing malware
Malicious files masquerading as curriculum vitae are being sent to businesses to install malware that can capture passwords and other sensitive information, says Check Point Research.
β Nuclear missile contractor hacked in Maze ransomware attack β
π Read
via "Naked Security".
Attackers hacked and encrypted the computers of a contractor whose clients include the US military, government agencies and major military contractors.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ What Usability Means to Security Pros π΄
π Read
via "Dark Reading: ".
The last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
β Google Faces Privacy Lawsuit Over Tracking Users in Incognito Mode β
π Read
via "Threatpost".
A $5 billion class-action lawsuit filed in a California federal court alleges that Google's Chrome incognito mode collects browser data without peopleβs knowledge or consent.π Read
via "Threatpost".
Threat Post
Google Faces Privacy Lawsuit Over Tracking Users in Incognito Mode
A $5 billion class-action lawsuit filed in a California federal court alleges that Google's Chrome incognito mode collects browser data without peopleβs knowledge or consent.
π΄ Could Automation Kill the Security Analyst? π΄
π Read
via "Dark Reading: ".
Five skills to ensure job security in the Age of Automation.π Read
via "Dark Reading: ".
Dark Reading
Could Automation Kill the Security Analyst?
Five skills to ensure job security in the Age of Automation.
π How to encrypt an external drive or card in macOS π
π Read
via "Security on TechRepublic".
Looking to encrypt removable storage on macOS, but can't figure out how? Jack Wallen shows you the way to make this work.π Read
via "Security on TechRepublic".
TechRepublic
How to encrypt an external drive or card in macOS
Looking to encrypt removable storage on macOS, but can't figure out how? Jack Wallen shows you the way to make this work.
π New Java-based ransomware targets Windows and Linux servers π
π Read
via "Security on TechRepublic".
Aimed at SMBs, educational facilities, and software companies, the ransomware leverages Java to encrypt server-based files, according to BlackBerry and KPMG.π Read
via "Security on TechRepublic".
TechRepublic
This new ransomware targets Windows and Linux in surprising ways
Aimed at SMBs, educational facilities, and software companies, the ransomware leverages Java to encrypt server-based files, according to BlackBerry and KPMG.
π΄ Microsoft Office Files Most Popular for Exploit Tests π΄
π Read
via "Dark Reading: ".
A new report examines attacker methodologies to better understand how exploit testing is conducted in the wild.π Read
via "Dark Reading: ".
Darkreading
Microsoft Office Files Most Popular for Exploit Tests
A new report examines attacker methodologies to better understand how exploit testing is conducted in the wild.
π Unauthorized drone detection is getting easier with software from Blackberry π
π Read
via "Security on TechRepublic".
A new partnership with Dedrone has led to a platform that can instantly detect and notify security personnel of drones in sensitive airspace.π Read
via "Security on TechRepublic".
TechRepublic
Unauthorized drone detection is getting easier with software from BlackBerry
A new partnership with Dedrone has led to a platform that can instantly detect and notify security personnel of drones in sensitive airspace.
β U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked β
π Read
via "Threatpost".
Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.π Read
via "Threatpost".
Threat Post
U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked
Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.
β Zoom Restricts End-to-End Encryption to Paid Users β
π Read
via "Threatpost".
The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.π Read
via "Threatpost".
Threat Post
Zoom Restricts End-to-End Encryption to Paid Users
The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.
β You DID change your password after that data breach, didnβt you? β
π Read
via "Naked Security".
Apparently, some people consider their passwords "invincible", even after a data breach. Don't be those people.π Read
via "Naked Security".
Naked Security
You DID change your password after that data breach, didnβt you?
Apparently, some people consider their passwords βinvincibleβ, even after a data breach. Donβt be those people.
β Understanding the Payload-Less Email Attacks Evading Your Security Team β
π Read
via "Threatpost".
Business email compromise (BEC) attacks represent a small percentage of email attacks, but disproportionately represent the greatest financial risk.π Read
via "Threatpost".
Threat Post
Understanding the Payload-Less Email Attacks Evading Your Security Team
cvcvcvc
π΄ Strengthening Secure Information Sharing Through Technology & Standards π΄
π Read
via "Dark Reading: ".
How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.π Read
via "Dark Reading: ".
Dark Reading
Strengthening Secure Information Sharing Through Technology & Standards
How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.
ATENTIONβΌ New - CVE-2018-21244
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows arbitrary application execution via an embedded executable file in a PDF portfolio, aka FG-VD-18-029.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21243
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.6. It has COM object mishandling when Microsoft Word is used.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21242
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows Remote Code Execution via a GoToE or GoToR action.π Read
via "National Vulnerability Database".