ATENTIONβΌ New - CVE-2016-7064
π Read
via "National Vulnerability Database".
A flaw was found in pritunl-client before version 1.0.1116.6. A lack of signature verification leads to sensitive information leakageπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-7063
π Read
via "National Vulnerability Database".
A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.π Read
via "National Vulnerability Database".
β Chris Vickery: AI Will Drive Tomorrowβs Data Breaches β
π Read
via "Threatpost".
Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top threat no one's ready for.π Read
via "Threatpost".
Threat Post
Chris Vickery: AI Will Drive Tomorrowβs Data Breaches
Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top threat no one's ready for.
ATENTIONβΌ New - CVE-2015-5238
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-3796. Reason: This candidate is a reservation duplicate of CVE-2015-3796. Notes: All CVE users should reference CVE-2015-3796 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
π΄ Fortinet Buys Cloud Security Firm OPAQ π΄
π Read
via "Dark Reading: ".
The company plans to add zero-trust networking capabilities to its Secure Access Service Edge architecture.π Read
via "Dark Reading: ".
Dark Reading
Fortinet Buys Cloud Security Firm OPAQ
The company plans to add zero-trust networking capabilities to its Secure Access Service Edge architecture.
π΄ Microsoft 365 Updated with New Security, Risk, Compliance Tools π΄
π Read
via "Dark Reading: ".
Updates built for remote employees include an endpoint data loss prevention platform, insider risk management, and double key encryption.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
π΄ US Indicts 2 Chinese Nationals for Stealing IP & Business Secrets, Including COVID-19 Research π΄
π Read
via "Dark Reading: ".
Pair working on behalf of themselves and China's Ministry of State Security, Justice Department says.π Read
via "Dark Reading: ".
Dark Reading
US Indicts 2 Chinese Nationals for Stealing IP & Business Secrets, Including COVID-19 Research
Pair working on behalf of themselves and China's Ministry of State Security, Justice Department says.
π΄ The State of Hacktivism in 2020 π΄
π Read
via "Dark Reading: ".
Activism via hacking might not be as noisy as it once was, but it hasn't been silenced yet.π Read
via "Dark Reading: ".
Dark Reading
The State of Hacktivism in 2020
Activism via hacking might not be as noisy as it once was, but it hasn't been silenced yet.
β Emotet Returns in Malspam Attacks Dropping TrickBot, QakBot β
π Read
via "Threatpost".
Emotet has resurfaced after a five-month hiatus, with more than 250,000 malspam messages being sent to email recipients worldwide.π Read
via "Threatpost".
Threat Post
Emotet Returns in Malspam Attacks Dropping TrickBot, QakBot
Emotet has resurfaced after a five-month hiatus, with more than 250,000 malspam messages being sent to email recipients worldwide.
π΄ DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records π΄
π Read
via "Dark Reading: ".
China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.π Read
via "Dark Reading: ".
Dark Reading
DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records
China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.
π Remote working: We're stressed and distracted and making these security errors π
π Read
via "Security on TechRepublic".
Stress, burnout and distractions in the home could result in more cybersecurity breaches as a result of human error, a report from Tessian has found.π Read
via "Security on TechRepublic".
TechRepublic
Remote working: We're stressed and distracted and making these security errors
Stress, burnout and distractions in the home could result in more cybersecurity breaches as a result of human error, a report from Tessian has found.
ATENTIONβΌ New - CVE-2020-12774
π Read
via "National Vulnerability Database".
D-Link DSL-7740C does not properly validate user input, which allows an authenticated LAN user to inject arbitrary command.π Read
via "National Vulnerability Database".
β Leak Exposes Private Data of Genealogy Service Users β
π Read
via "Threatpost".
An exposed ElasticSearch server belonging to Software MacKiev put 60,000 users of Ancestry.comβs Family Tree Maker software at risk.π Read
via "Threatpost".
Threat Post
Leak Exposes Private Data of Genealogy Service Users
An exposed ElasticSearch server belonging to Software MacKiev put 60,000 users of the Family Tree Maker software at risk.
π΄ Cybersecurity Lessons from the Pandemic π΄
π Read
via "Dark Reading: ".
How does cybersecurity support business and society? The pandemic shows us.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Lessons from the Pandemic
How does cybersecurity support business and society? The pandemic shows us.
π΄ Q&A: How Systemic Racism Weakens Cybersecurity π΄
π Read
via "Dark Reading: ".
Cybersecurity policy expert and attorney Camille Stewart explains how to dismantle systemic racism in the industry - and build a more diverse and representative workforce.π Read
via "Dark Reading: ".
Dark Reading
Q&A: How Systemic Racism Weakens Cybersecurity
Cybersecurity policy expert and attorney Camille Stewart explains how to dismantle systemic racism in the industry - and build a more diverse and representative workforce.
π Phishing is the leading type of COVID-19 fraud π
π Read
via "Security on TechRepublic".
TransUnion surveyed consumers in six countries and found that phishing was the preferred method of attack 27% of the time.π Read
via "Security on TechRepublic".
TechRepublic
Phishing is the leading type of COVID-19 fraud
TransUnion surveyed consumers in six countries and found that phishing was the preferred method of attack 27% of the time.
π Threat actors have evolved during the pandemic π
π Read
via "Security on TechRepublic".
McAfee sees a surge of COVID-19-themed malicious apps and other attacks in the first quarter.π Read
via "Security on TechRepublic".
TechRepublic
Threat actors have evolved during the pandemic
McAfee sees a surge of COVID-19-themed malicious apps and other attacks in the first quarter.
π How cybercriminals have exploited the coronavirus pandemic π
π Read
via "Security on TechRepublic".
Phishing campaigns, deceptive domains, and malicious apps are just some of the tactics that have taken advantage of the virus and its repercussions, says Check Point Research.π Read
via "Security on TechRepublic".
TechRepublic
How cybercriminals have exploited the coronavirus pandemic
Phishing campaigns, deceptive domains, and malicious apps are just some of the tactics that have taken advantage of the virus and its repercussions, says Check Point Research.
ATENTIONβΌ New - CVE-2019-18619
π Read
via "National Vulnerability Database".
Incorrect parameter validation in the synaTee component of Synaptics WBF drivers using an SGX enclave (all versions prior to 2019-11-15) allows a local user to execute arbitrary code in the enclave (that can compromise confidentiality of enclave data) via APIs that accept invalid pointers.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-18618
π Read
via "National Vulnerability Database".
Incorrect access control in the firmware of Synaptics VFS75xx family fingerprint sensors that include external flash (all versions prior to 2019-11-15) allows a local administrator or physical attacker to compromise the confidentiality of sensor data via injection of an unverified partition table.π Read
via "National Vulnerability Database".
β Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware β
π Read
via "Threatpost".
An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group - since 2013.π Read
via "Threatpost".
Threat Post
Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware
An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group - since 2013.