β U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked β
π Read
via "Threatpost".
Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.π Read
via "Threatpost".
Threat Post
U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked
Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.
β Zoom Restricts End-to-End Encryption to Paid Users β
π Read
via "Threatpost".
The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.π Read
via "Threatpost".
Threat Post
Zoom Restricts End-to-End Encryption to Paid Users
The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.
β You DID change your password after that data breach, didnβt you? β
π Read
via "Naked Security".
Apparently, some people consider their passwords "invincible", even after a data breach. Don't be those people.π Read
via "Naked Security".
Naked Security
You DID change your password after that data breach, didnβt you?
Apparently, some people consider their passwords βinvincibleβ, even after a data breach. Donβt be those people.
β Understanding the Payload-Less Email Attacks Evading Your Security Team β
π Read
via "Threatpost".
Business email compromise (BEC) attacks represent a small percentage of email attacks, but disproportionately represent the greatest financial risk.π Read
via "Threatpost".
Threat Post
Understanding the Payload-Less Email Attacks Evading Your Security Team
cvcvcvc
π΄ Strengthening Secure Information Sharing Through Technology & Standards π΄
π Read
via "Dark Reading: ".
How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.π Read
via "Dark Reading: ".
Dark Reading
Strengthening Secure Information Sharing Through Technology & Standards
How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.
ATENTIONβΌ New - CVE-2018-21244
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows arbitrary application execution via an embedded executable file in a PDF portfolio, aka FG-VD-18-029.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21243
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.6. It has COM object mishandling when Microsoft Word is used.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21242
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows Remote Code Execution via a GoToE or GoToR action.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21241
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.6. It has an untrusted search path that allows a DLL to execute remote code.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21240
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit Reader and PhantomPDF before 9.2. It allows memory consumption via an ArrayBuffer(0xfffffffe) call.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21239
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit Reader and PhantomPDF before 9.2. It allows NTLM credential theft via a GoToE or GoToR action.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21238
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows memory consumption via an ArrayBuffer(0xfffffffe) call.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21237
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows NTLM credential theft via a GoToE or GoToR action.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21236
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit Reader before 2.4.4. It has a NULL pointer dereference.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21235
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit E-mail advertising system before September 2018. It allows authentication bypass and information disclosure, related to Interspire Email Marketer.π Read
via "National Vulnerability Database".
π΄ Malware Campaign Hides in Resumes and Medical Leave Forms π΄
π Read
via "Dark Reading: ".
The campaigns have been part of the overall increase in coronavirus-related malware activity.π Read
via "Dark Reading: ".
Dark Reading
Malware Campaign Hides in Resumes and Medical Leave Forms
The campaigns have been part of the overall increase in coronavirus-related malware activity.
π Food Companies Spar Over Stolen Trade Secrets Claim π
π Read
via "Subscriber Blog RSS Feed ".
In a new lawsuit, a candy bar company is alleging a former employee downloaded more than 6,000 files involving its trade secrets, strategies, and market insights, before leaving to join a competitor.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Food Companies Spar Over Stolen Trade Secrets Claim
In a new lawsuit, a candy bar company is alleging a former employee downloaded more than 6,000 files involving its trade secrets, strategies, and market insights, before leaving to join a competitor.
β Trump, Biden Campaign Staffers Targeted By APT Phishing Emails β
π Read
via "Threatpost".
Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.π Read
via "Threatpost".
Threat Post
Trump, Biden Campaign Staffers Targeted By APT Phishing Emails
Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.
β Tycoon Ransomware Banks on Unusual Image File Tactic β
π Read
via "Threatpost".
To fly under the radar, the newly discovered ransomware is compiled into a Java image file format that's rarely used by developers.π Read
via "Threatpost".
Threat Post
Tycoon Ransomware Banks on Unusual Image File Tactic
To fly under the radar, the newly discovered ransomware is compiled into a Java image file format that's rarely used by developers.
π1
π΄ New 'Tycoon' Ransomware Strain Targets Windows, Linux π΄
π Read
via "Dark Reading: ".
Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.π Read
via "Dark Reading: ".
Dark Reading
New 'Tycoon' Ransomware Strain Targets Windows, Linux
Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.
π΄ The Privacy & Security Outlook for Businesses Post-COVID-19 π΄
π Read
via "Dark Reading: ".
Long-term business needs -- and the ethical implications that result -- don't simply go away just because we're navigating a global health crisis.π Read
via "Dark Reading: ".
Dark Reading
The Privacy & Security Outlook for Businesses Post-COVID-19
Long-term business needs -- and the ethical implications that result -- don't simply go away just because we're navigating a global health crisis.