π Packet Fence 10.1.0 π
π Go!
via "Security Tool Files β Packet Storm".
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Packet Fence 10.1.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Zoom Changes Course on End-to-End Encryption π΄
π Read
via "Dark Reading: ".
The videoconferencing company now says it will offer end-to-end encryption to all users beginning in July.π Read
via "Dark Reading: ".
Dark Reading
Zoom Changes Course on End-to-End Encryption
The videoconferencing company now says it will offer end-to-end encryption to all users beginning in July.
β AcidBox Malware Uncovered Using Repurposed VirtualBox Exploit β
π Read
via "Threatpost".
A βvery rareβ malware has been used by an unknown threat actor in cyberattacks against two different Russian organizations in 2017.π Read
via "Threatpost".
Threat Post
AcidBox Malware Uncovered Using Repurposed VirtualBox Exploit
A βvery rareβ malware has been used by an unknown threat actor in cyberattacks against two different Russian organizations in 2017.
π΄ 7 Tips for Employers Navigating Remote Recruitment π΄
π Read
via "Dark Reading: ".
Hiring experts explain how companies should approach recruitment when employers and candidates are working remotely.π Read
via "Dark Reading: ".
Dark Reading
7 Tips for Employers Navigating Remote Recruitment
Hiring experts explain how companies should approach recruitment when employers and candidates are working remotely.
β Adobe drops slew of critical patches β
π Read
via "Naked Security".
Adobe released another set of patches for its products on Tuesday, a week after dropping its first set of fixes for the month.π Read
via "Naked Security".
Naked Security
Adobe drops slew of critical patches
Adobe released another set of patches for its products on Tuesday, a week after dropping its first set of fixes for the month.
β InvisiMole Group Resurfaces Touting Fresh Toolset, Gamaredon Partnership β
π Read
via "Threatpost".
InvisiMole is back, targeting Eastern Europe organizations in the military sector and diplomatic missions with an updated toolset and new APT partnership.π Read
via "Threatpost".
Threat Post
InvisiMole Group Resurfaces Touting Fresh Toolset, Gamaredon Partnership
InvisiMole is back, targeting Eastern Europe organizations in the military sector and diplomatic missions with an updated toolset and new APT partnership.
β Crypto founder admits $25 million ICO backed by celebrities was a scam β
π Read
via "Naked Security".
Endorsed by boxer Floyd Mayweather and DJ Khaled, the Centra Tech ICO debacle has led to the guilty plea of co-founder Robert Farkas.π Read
via "Naked Security".
Naked Security
Crypto founder admits $25 million ICO backed by celebrities was a scam
Endorsed by boxer Floyd Mayweather and DJ Khaled, the Centra Tech ICO debacle has led to the guilty plea of co-founder Robert Farkas.
β Phishing Campaign Targeting Office 365, Exploits Brand Names β
π Read
via "Threatpost".
Attackers use trusted entities to trick victims into giving up their corporate log-in details as well as to bypass security protections.π Read
via "Threatpost".
Threat Post
Phishing Campaign Targeting Office 365, Exploits Brand Names
Attackers use trusted entities to trick victims into giving up their corporate log-in details as well as to bypass security protections.
β Five Password Tips for Securing the New WFH Normal β
π Read
via "Threatpost".
Darren James, product specialist with Specops Software, warned that password resets, for example, are a particularly vexing issue for sysadmins, as they can often lockout end-users from their accounts.π Read
via "Threatpost".
Threat Post
Five Password Tips for Securing the New WFH Normal
Darren James, product specialist with Specops Software, warned that password resets are a serious issue, as they can lockout end-users from their accounts.
β BofA Phish Gets Around DMARC, Other Email Protections β
π Read
via "Threatpost".
The June campaign was targeted and aimed at stealing online banking credentials.π Read
via "Threatpost".
Threat Post
BofA Phish Gets Around DMARC, Other Email Protections
The June campaign was targeted and aimed at stealing online banking credentials.
π IT leaders say productivity went up during lockdown despite delaying projects and security work π
π Read
via "Security on TechRepublic".
Survey finds that IT leaders plan to increase security measures when offices reopen.π Read
via "Security on TechRepublic".
TechRepublic
IT leaders say productivity went up during lockdown despite delaying projects and security work
Survey finds that IT leaders plan to increase security measures when offices reopen.
π΄ CISO Dialogue: How to Optimize Your Security Budget π΄
π Read
via "Dark Reading: ".
CISOs are never going to have all the finances they want. Hard choices must be made. The CISO of Amazon Prime Video discusses his approaches to a slimmed-down budget.π Read
via "Dark Reading: ".
Dark Reading
CISO Dialogue: How to Optimize Your Security Budget
CISOs are never going to have all the finances they want. Hard choices must be made. The CISO of Amazon Prime Video discusses his approaches to a slimmed-down budget.
π Continued reliance on passwords continues to compromise data security π
π Read
via "Security on TechRepublic".
IT leaders remain under pressure to balance security and authentication methods, yet this remains a challenge for most organizations, according to a new report by Thales.π Read
via "Security on TechRepublic".
TechRepublic
Continued reliance on passwords continues to compromise data security
IT leaders remain under pressure to balance security and authentication methods, yet this remains a challenge for most organizations, according to a new report by Thales.
β Bundlore adware brings a new nest of risks to Mac users β
π Read
via "Naked Security".
A new SophosLabs report digs into the latest browser-hijacking "bundleware" targeting Mac usersπ Read
via "Naked Security".
Naked Security
Bundlore adware brings a new nest of risks to Mac users
A new SophosLabs report digs into the latest browser-hijacking βbundlewareβ targeting Mac users
π΄ Most Contact-Tracing Apps Fail Basic Security π΄
π Read
via "Dark Reading: ".
A survey of 17 Android applications for informing citizens if they had potential contact with a COVD-19-infected individual finds few have adopted code-hardening techniques.π Read
via "Dark Reading: ".
Dark Reading
Most Contact-Tracing Apps Fail Basic Security
A survey of 17 Android applications for informing citizens if they had potential contact with a COVD-19-infected individual finds few have adopted code-hardening techniques.
π FabulaTech USB device vulnerability exposes devices to risk π
π Read
via "Security on TechRepublic".
A remote USB function in a software provider's code has been found to contain a significant vulnerability. Learn more about what it entails and how you should protect your systems.π Read
via "Security on TechRepublic".
TechRepublic
FabulaTech USB device vulnerability exposes devices to risk
A remote USB function in a software provider's code has been found to contain a significant vulnerability. Learn more about what it entails and how you should protect your systems.
β Microsoft promises to fix Windows 10 printer problem β
π Read
via "Naked Security".
Windows 10 updates released as part of last weekβs Patch Tuesday appear to be making life hard for some printer users.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Zoom changes course on end-to-end encryption and offers it free to everyone π
π Read
via "Security on TechRepublic".
Originally planned for premium accounts only, Zoom will now offer optional E2EE to all account holders.π Read
via "Security on TechRepublic".
TechRepublic
Zoom changes course on end-to-end encryption and offers it free to everyone
Originally planned for premium accounts only, Zoom will now offer optional E2EE to all account holders.
ATENTIONβΌ New - CVE-2017-9109
π Read
via "National Vulnerability Database".
An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by interleaving answers for the CNAME target, with the CNAME itself. In that case the answer data structure (on the heap) can be overrun. With this fixed, it prefers to look only at the answer RRs which come after the CNAME, which is at least arguably correct.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-9108
π Read
via "National Vulnerability Database".
An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-9107
π Read
via "National Vulnerability Database".
An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invalid. But before then it might outrun available memory and crash. In principle this could be a denial of service attack.π Read
via "National Vulnerability Database".