π΄ Cybercriminals Targeted Streaming Services to Provide Pandemic Entertainment π΄
π Read
via "Dark Reading: ".
Prior to 2020, about 1 in 5 credential attacks targeted video services, but that's nothing compared to the first quarter of 2020, according to newly published data.π Read
via "Dark Reading: ".
Dark Reading
Cybercriminals Targeted Streaming Services to Provide Pandemic Entertainment
Prior to 2020, about 1 in 5 credential attacks targeted video services, but that's nothing compared to the first quarter of 2020, according to newly published data.
π΄ Election Security: Recovering from 2016, Looking Toward 2020 π΄
π Read
via "Dark Reading: ".
Researchers publish the results of a four-year investigation and discuss whether the US is ready to secure its largest elections.π Read
via "Dark Reading: ".
Dark Reading
Election Security: Recovering from 2016, Looking Toward 2020
Researchers publish the results of a four-year investigation and discuss whether the US is ready to secure its largest elections.
π Friday Five: 7/17 Edition π
π Read
via "Subscriber Blog RSS Feed ".
US Secret Service forms a cyber fraud task force, Twitter deals with the hacking of high-profile Twitter accounts, and more - catch up on all the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 7/17 Edition
US Secret Service forms a cyber fraud task force, Twitter deals with the hacking of high-profile Twitter accounts, and more - catch up on all the week's news with the Friday Five.
π Sifter 8.5 π
π Go!
via "Security Tool Files β Packet Storm".
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Sifter 8.5 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π SMB12 Information Gathering π
π Go!
via "Security Tool Files β Packet Storm".
SMB12 Information Gathering is a data gathering python script that inspects SMB1 and SMB2 endpoints. It will extract various attributes from the remote server such as OS version (only supported by SMB1 as per protocol definition), DNS computer name, DNS domain name, NetBIOS computer name and NetBIOS domain name (SMB1 and SMB2).π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
SMB12 Information Gathering β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover β
π Read
via "Threatpost".
Less than 500 machines have been patched since U.S. Cyber Command issued an alert to patch a critical bug that's under active exploit.π Read
via "Threatpost".
Threat Post
Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover
Less than 500 machines have been patched since U.S. Cyber Command issued an alert to patch a critical bug that's under active exploit.
π΄ Emotet Lives! π΄
π Read
via "Dark Reading: ".
Emotet malware has back to action after a four-month hiatus that allowed cybersecurity experts to worry about other things.π Read
via "Dark Reading: ".
Dark Reading
Emotet Lives!
Emotet malware has back to action after a four-month hiatus that allowed cybersecurity experts to worry about other things.
ATENTIONβΌ New - CVE-2019-4090
π Read
via "National Vulnerability Database".
"HCL Campaign is vulnerable to cross-site scripting when a user provides XSS scripts in Campaign Description field."π Read
via "National Vulnerability Database".
π This new open source project could be key to securing database applications π
π Read
via "Security on TechRepublic".
Commentary: Cyral has been on a roll with two open source projects designed to make security a natural part of the development workflow.π Read
via "Security on TechRepublic".
TechRepublic
This new open source project could be key to securing database applications
Commentary: Cyral has been on a roll with two open source projects designed to make security a natural part of the development workflow.
ATENTIONβΌ New - CVE-2019-12000
π Read
via "National Vulnerability Database".
HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.π Read
via "National Vulnerability Database".
β Monday review β the hot stories of the week β
π Read
via "Naked Security".
Catch up on the past week's stories, and watch our latest Naked Security Live video.π Read
via "Naked Security".
Naked Security
Monday review β the hot stories of the week
Catch up on the past weekβs stories, and watch our latest Naked Security Live video.
π Microsoft Defender ATP for Android: This security software can help protect your devices and data π
π Read
via "Security on TechRepublic".
Microsoft recently announced its first Android security tooling. But what is it for, and should you deploy it to your users?π Read
via "Security on TechRepublic".
π΄ Keys for a Safe Return to the Post-Coronavirus Office π΄
π Read
via "Dark Reading: ".
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.π Read
via "Dark Reading: ".
Dark Reading
Keys for a Safe Return to the Post-Coronavirus Office
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.
β Paving the Path to Passwordless β
π Read
via "Threatpost".
Password management tools and apps can help ease the pain of passwords, but even those donβt totally solve all of the password challenges all of the time. π Read
via "Threatpost".
Threat Post
Paving the Path to Passwordless
Password management tools and apps can help ease the pain of passwords, but even those donβt totally solve all of the password challenges all of the time.
π΄ What Organizations Need to Know About IoT Supply Chain Risk π΄
π Read
via "Dark Reading: ".
Here are some factors organizations should consider as they look to limit the risk posed by risks like Ripple20.π Read
via "Dark Reading: ".
Dark Reading
What Organizations Need to Know About IoT Supply Chain Risk
Here are some factors organizations should consider as they look to limit the risk posed by risks like Ripple20.
π Cybersecurity spending to grow this year but may be hit by budget constraints π
π Read
via "Security on TechRepublic".
Spending on security products and services for 2020 could increase as much as 5.6%, or as little as 2.5%, depending on the economic impact of the coronavirus on IT budgets, says Canalys.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity spending to grow this year but may be hit by budget constraints
Spending on security products and services for 2020 could increase as much as 5.6%, or as little as 2.5%, depending on the economic impact of the coronavirus on IT budgets, says Canalys.
π΄ Keys for a Safe Return to the Post-Quarantine Office π΄
π Read
via "Dark Reading: ".
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.π Read
via "Dark Reading: ".
Dark Reading
Keys for a Safe Return to the Post-Quarantine Office
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.
π What is Cloud Security? π
π Read
via "Subscriber Blog RSS Feed ".
With more businesses running vital business computing functions in the cloud today, cloud security is a must as attackers seek to exploit vulnerabilities and gain unauthorized access to sensitive data. In this post, weβll talk about the benefits of cloud security as well as some best practices to follow.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
What is Cloud Security?
With more businesses running vital business computing functions in the cloud today, cloud security is a must as attackers seek to exploit vulnerabilities and gain unauthorized access to sensitive data. In this post, weβll talk about the benefits of cloudβ¦
β Mac Cryptocurrency Traders Targeted by Trojanized Apps β
π Read
via "Threatpost".
Four trojanized cryptocurrency trading apps have been found spreading malware that drains cryptocurrency wallets and collects Mac users' browsing data.π Read
via "Threatpost".
Threat Post
Mac Cryptocurrency Traders Targeted by Trojanized Apps
Four trojanized cryptocurrency trading apps have been found spreading malware that drains cryptocurrency wallets and collects Mac users' browsing data.
β 7 VPNs that leaked their logs β the logs that βdidnβt existβ β
π Read
via "Naked Security".
Just how private is your Virtual Private Network?π Read
via "Naked Security".
Naked Security
7 VPNs that leaked their logs β logs that werenβt even supposed to exist
Just how private is your Virtual Private Network?
π Phishing attacks aim to steal sensitive data by prompting people to renew Microsoft subscription π
π Read
via "Security on TechRepublic".
The initial scam emails claim that the recipient must renew their Microsoft Office 365 subscription, says Abnormal Security.π Read
via "Security on TechRepublic".