ATENTIONβΌ New - CVE-2019-12000
π Read
via "National Vulnerability Database".
HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.π Read
via "National Vulnerability Database".
β Monday review β the hot stories of the week β
π Read
via "Naked Security".
Catch up on the past week's stories, and watch our latest Naked Security Live video.π Read
via "Naked Security".
Naked Security
Monday review β the hot stories of the week
Catch up on the past weekβs stories, and watch our latest Naked Security Live video.
π Microsoft Defender ATP for Android: This security software can help protect your devices and data π
π Read
via "Security on TechRepublic".
Microsoft recently announced its first Android security tooling. But what is it for, and should you deploy it to your users?π Read
via "Security on TechRepublic".
π΄ Keys for a Safe Return to the Post-Coronavirus Office π΄
π Read
via "Dark Reading: ".
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.π Read
via "Dark Reading: ".
Dark Reading
Keys for a Safe Return to the Post-Coronavirus Office
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.
β Paving the Path to Passwordless β
π Read
via "Threatpost".
Password management tools and apps can help ease the pain of passwords, but even those donβt totally solve all of the password challenges all of the time. π Read
via "Threatpost".
Threat Post
Paving the Path to Passwordless
Password management tools and apps can help ease the pain of passwords, but even those donβt totally solve all of the password challenges all of the time.
π΄ What Organizations Need to Know About IoT Supply Chain Risk π΄
π Read
via "Dark Reading: ".
Here are some factors organizations should consider as they look to limit the risk posed by risks like Ripple20.π Read
via "Dark Reading: ".
Dark Reading
What Organizations Need to Know About IoT Supply Chain Risk
Here are some factors organizations should consider as they look to limit the risk posed by risks like Ripple20.
π Cybersecurity spending to grow this year but may be hit by budget constraints π
π Read
via "Security on TechRepublic".
Spending on security products and services for 2020 could increase as much as 5.6%, or as little as 2.5%, depending on the economic impact of the coronavirus on IT budgets, says Canalys.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity spending to grow this year but may be hit by budget constraints
Spending on security products and services for 2020 could increase as much as 5.6%, or as little as 2.5%, depending on the economic impact of the coronavirus on IT budgets, says Canalys.
π΄ Keys for a Safe Return to the Post-Quarantine Office π΄
π Read
via "Dark Reading: ".
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.π Read
via "Dark Reading: ".
Dark Reading
Keys for a Safe Return to the Post-Quarantine Office
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.
π What is Cloud Security? π
π Read
via "Subscriber Blog RSS Feed ".
With more businesses running vital business computing functions in the cloud today, cloud security is a must as attackers seek to exploit vulnerabilities and gain unauthorized access to sensitive data. In this post, weβll talk about the benefits of cloud security as well as some best practices to follow.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
What is Cloud Security?
With more businesses running vital business computing functions in the cloud today, cloud security is a must as attackers seek to exploit vulnerabilities and gain unauthorized access to sensitive data. In this post, weβll talk about the benefits of cloudβ¦
β Mac Cryptocurrency Traders Targeted by Trojanized Apps β
π Read
via "Threatpost".
Four trojanized cryptocurrency trading apps have been found spreading malware that drains cryptocurrency wallets and collects Mac users' browsing data.π Read
via "Threatpost".
Threat Post
Mac Cryptocurrency Traders Targeted by Trojanized Apps
Four trojanized cryptocurrency trading apps have been found spreading malware that drains cryptocurrency wallets and collects Mac users' browsing data.
β 7 VPNs that leaked their logs β the logs that βdidnβt existβ β
π Read
via "Naked Security".
Just how private is your Virtual Private Network?π Read
via "Naked Security".
Naked Security
7 VPNs that leaked their logs β logs that werenβt even supposed to exist
Just how private is your Virtual Private Network?
π Phishing attacks aim to steal sensitive data by prompting people to renew Microsoft subscription π
π Read
via "Security on TechRepublic".
The initial scam emails claim that the recipient must renew their Microsoft Office 365 subscription, says Abnormal Security.π Read
via "Security on TechRepublic".
β Facebookβs NSO Group Lawsuit Over WhatsApp Spying Set to Proceed β
π Read
via "Threatpost".
A federal judge in California ruled that the spyware vendor does not have sovereign immunity.π Read
via "Threatpost".
Threat Post
Facebookβs NSO Group Lawsuit Over WhatsApp Spying Set to Proceed
A federal judge in California ruled that the spyware vendor does not have sovereign immunity.
π΄ UK Data Privacy Legislation Cannot Be Bypassed to Limit Spread of COVID-19 π΄
π Read
via "Dark Reading: ".
The UK faces GDPR data privacy challenges regarding its COVID-19 "Test and Trace" program. Despite the importance of contact tracing, its intent to ignore privacy legislation is extremely worrying.π Read
via "Dark Reading: ".
Dark Reading
UK Data Privacy Legislation Cannot Be Bypassed to Limit Spread of COVID-19
The UK faces GDPR data privacy challenges regarding its COVID-19 Test and Trace program. Despite the importance of contact tracing, its intent to ignore privacy legislation is extremely worrying.
π nfstream 5.2.0 π
π Go!
via "Security Tool Files β Packet Storm".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
nfstream 5.2.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Scapy Packet Manipulation Tool 2.4.4rc1 π
π Go!
via "Security Tool Files β Packet Storm".
Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Scapy Packet Manipulation Tool 2.4.4rc1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ England 'Test and Trace' Program Violates GDPR Privacy Law π΄
π Read
via "Dark Reading: ".
The UK government confirms the program launched in May without a Data Protection Impact Assessment, as required under GDPR.π Read
via "Dark Reading: ".
Dark Reading
England 'Test and Trace' Program Violates GDPR Privacy Law
The UK government confirms the program launched in May without a Data Protection Impact Assessment, as required under GDPR.
π΄ Number of Reported Breaches Decrease In First Half of 2020 π΄
π Read
via "Dark Reading: ".
With the pandemic as a backdrop, publicly reported US data breaches dropped as more employees and suppliers stayed home.π Read
via "Dark Reading: ".
Dark Reading
Number of Reported Breaches Decrease In First Half of 2020
With the pandemic as a backdrop, publicly reported US data breaches dropped as more employees and suppliers stayed home.
π΄ SIGRed: What You Should Know About the Windows DNS Server Bug π΄
π Read
via "Dark Reading: ".
DNS experts share their thoughts on the wormable vulnerability and explain why it should be a high priority for businesses.π Read
via "Dark Reading: ".
Dark Reading
SIGRed: What You Should Know About the Windows DNS Server Bug
DNS experts share their thoughts on the wormable vulnerability and explain why it should be a high priority for businesses.
π΄ Internet Scan Shows Decline in Insecure Network Services π΄
π Read
via "Dark Reading: ".
While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.π Read
via "Dark Reading: ".
Dark Reading
Internet Scan Shows Decline in Insecure Network Services
While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.
π΄ Twitter Breach Highlights Privileged Account Security Issue π΄
π Read
via "Dark Reading: ".
Security incident that allowed attackers to hijack high-profile accounts suggests social media giant's controls for spotting insider abuse were not strong enough, security experts say.π Read
via "Dark Reading: ".
Dark Reading
Twitter Breach Highlights Privileged Account Security Issue
Security incident that allowed attackers to hijack high-profile accounts suggests social media giant's controls for spotting insider abuse were not strong enough, security experts say.