ATENTIONโผ New - CVE-2018-21236
๐ Read
via "National Vulnerability Database".
An issue was discovered in Foxit Reader before 2.4.4. It has a NULL pointer dereference.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2018-21235
๐ Read
via "National Vulnerability Database".
An issue was discovered in Foxit E-mail advertising system before September 2018. It allows authentication bypass and information disclosure, related to Interspire Email Marketer.๐ Read
via "National Vulnerability Database".
๐ด Malware Campaign Hides in Resumes and Medical Leave Forms ๐ด
๐ Read
via "Dark Reading: ".
The campaigns have been part of the overall increase in coronavirus-related malware activity.๐ Read
via "Dark Reading: ".
Dark Reading
Malware Campaign Hides in Resumes and Medical Leave Forms
The campaigns have been part of the overall increase in coronavirus-related malware activity.
๐ Food Companies Spar Over Stolen Trade Secrets Claim ๐
๐ Read
via "Subscriber Blog RSS Feed ".
In a new lawsuit, a candy bar company is alleging a former employee downloaded more than 6,000 files involving its trade secrets, strategies, and market insights, before leaving to join a competitor.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Food Companies Spar Over Stolen Trade Secrets Claim
In a new lawsuit, a candy bar company is alleging a former employee downloaded more than 6,000 files involving its trade secrets, strategies, and market insights, before leaving to join a competitor.
โ Trump, Biden Campaign Staffers Targeted By APT Phishing Emails โ
๐ Read
via "Threatpost".
Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.๐ Read
via "Threatpost".
Threat Post
Trump, Biden Campaign Staffers Targeted By APT Phishing Emails
Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.
โ Tycoon Ransomware Banks on Unusual Image File Tactic โ
๐ Read
via "Threatpost".
To fly under the radar, the newly discovered ransomware is compiled into a Java image file format that's rarely used by developers.๐ Read
via "Threatpost".
Threat Post
Tycoon Ransomware Banks on Unusual Image File Tactic
To fly under the radar, the newly discovered ransomware is compiled into a Java image file format that's rarely used by developers.
๐1
๐ด New 'Tycoon' Ransomware Strain Targets Windows, Linux ๐ด
๐ Read
via "Dark Reading: ".
Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.๐ Read
via "Dark Reading: ".
Dark Reading
New 'Tycoon' Ransomware Strain Targets Windows, Linux
Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.
๐ด The Privacy & Security Outlook for Businesses Post-COVID-19 ๐ด
๐ Read
via "Dark Reading: ".
Long-term business needs -- and the ethical implications that result -- don't simply go away just because we're navigating a global health crisis.๐ Read
via "Dark Reading: ".
Dark Reading
The Privacy & Security Outlook for Businesses Post-COVID-19
Long-term business needs -- and the ethical implications that result -- don't simply go away just because we're navigating a global health crisis.
โ Botnet blasts WordPress sites with configuration download attacks โ
๐ Read
via "Naked Security".
A million sites attacked by 20,000 different computers.๐ Read
via "Naked Security".
Naked Security
Botnet blasts WordPress sites with configuration download attacks
A million sites attacked by 20,000 different computers.
โ S2 Ep42: Apple auth attack, Octopus Scanner, Escobar escapades โ Naked Security podcast โ
๐ Read
via "Naked Security".
The latest Naked Security podcast is out now!๐ Read
via "Naked Security".
Naked Security
S2 Ep42: Apple auth attack, Octopus Scanner, Escobar escapades โ Naked Security podcast
The latest Naked Security podcast is out now!
โ WhatsApp Phone Numbers Pop Up in Google Search Results โ But is it a Bug? โ
๐ Read
via "Threatpost".
A researcher found that phone numbers tied to WhatsApp accounts are indexed publicly on Google Search creating what he claims is a โprivacy issueโ for users.๐ Read
via "Threatpost".
Threat Post
WhatsApp Phone Numbers Pop Up in Google Search Results โ But is it a Bug?
A researcher found that phone numbers tied to WhatsApp accounts are indexed publicly on Google Search creating what he claims is a โprivacy issueโ for users.
๐ด Local, State Governments Face Cybersecurity Crisis ๐ด
๐ Read
via "Dark Reading: ".
Ransomware hit small government organizations hard in 2019. Now they have to deal with budget cuts, pandemic precautions, social unrest, and the coming election cycle.๐ Read
via "Dark Reading: ".
Dark Reading
Local, State Governments Face Cybersecurity Crisis
Ransomware hit small government organizations hard in 2019. Now they have to deal with budget cuts, pandemic precautions, social unrest, and the coming election cycle.
๐ด Name That Toon: Sign of the Tides ๐ด
๐ Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.๐ Read
via "Dark Reading: ".
Dark Reading
Name That Toon: Sign of the Tides
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
โ News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate โ
๐ Read
via "Threatpost".
Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.๐ Read
via "Threatpost".
Threat Post
News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate
Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.
โ Electrolux, Others Conned Out of Big Money by BEC Scammer โ
๐ Read
via "Threatpost".
Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.๐ Read
via "Threatpost".
Threat Post
Electrolux, Others Conned Out of Big Money by BEC Scammer
Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.
๐ Friday Five: 6/5 Edition ๐
๐ Read
via "Subscriber Blog RSS Feed ".
The city of Minneapolis hit with a DDoS attack, Zoom's new security policy causes social media uproar, and a wave of cyber-attacks target anti-racism sites - catch up on the week's news with the Friday Five.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 6/5 Edition
The city of Minneapolis hit with a DDoS attack, Zoom's new security policy causes social media uproar, and a wave of cyber-attacks target anti-racism sites - catch up on the week's news with the Friday Five.
๐ Faraday 3.11.1 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Faraday 3.11.1 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
โ FTC Slams Childrenโs App Developer for COPPA Violations โ
๐ Read
via "Threatpost".
Children's app developer HyperBeard must pay $150,000 after the FTC claimed it violated privacy laws.๐ Read
via "Threatpost".
Threat Post
FTC Slams Childrenโs App Developer for COPPA Violations
Children's app developer HyperBeard must pay $150,000 after the FTC claimed it violated privacy laws.
๐ด Spear-Phishing Campaign Hits Developer Collaboration System Users ๐ด
๐ Read
via "Dark Reading: ".
Users of Zeplin, a popular developer and designer collaboration system, have been hit with new waves of spear-phishing attacks in the last month.๐ Read
via "Dark Reading: ".
Dark Reading
Spear Phishing Campaign Hits Developer Collaboration System Users
Users of Zeplin, a popular developer and designer collaboration system, have been hit with new waves of spearphishing attacks in the last month.
๐ด Q&A: Eugene Spafford on the Risks of Internet Voting ๐ด
๐ Read
via "Dark Reading: ".
Allowing people to cast their ballots online to circumvent coronavirus-related health concerns introduces problems that we simply don't know how to manage, says the Purdue University professor and security leader.๐ Read
via "Dark Reading: ".
Dark Reading
Q&A: Eugene Spafford on the Risks of Internet Voting
Allowing people to cast their ballots online to circumvent coronavirus-related health concerns introduces problems that we simply don't know how to manage, says the Purdue University professor and security leader.