🔐 Threat actors have evolved during the pandemic 🔐
📖 Read
via "Security on TechRepublic".
McAfee sees a surge of COVID-19-themed malicious apps and other attacks in the first quarter.📖 Read
via "Security on TechRepublic".
TechRepublic
Threat actors have evolved during the pandemic
McAfee sees a surge of COVID-19-themed malicious apps and other attacks in the first quarter.
🔐 How cybercriminals have exploited the coronavirus pandemic 🔐
📖 Read
via "Security on TechRepublic".
Phishing campaigns, deceptive domains, and malicious apps are just some of the tactics that have taken advantage of the virus and its repercussions, says Check Point Research.📖 Read
via "Security on TechRepublic".
TechRepublic
How cybercriminals have exploited the coronavirus pandemic
Phishing campaigns, deceptive domains, and malicious apps are just some of the tactics that have taken advantage of the virus and its repercussions, says Check Point Research.
ATENTION‼ New - CVE-2019-18619
📖 Read
via "National Vulnerability Database".
Incorrect parameter validation in the synaTee component of Synaptics WBF drivers using an SGX enclave (all versions prior to 2019-11-15) allows a local user to execute arbitrary code in the enclave (that can compromise confidentiality of enclave data) via APIs that accept invalid pointers.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2019-18618
📖 Read
via "National Vulnerability Database".
Incorrect access control in the firmware of Synaptics VFS75xx family fingerprint sensors that include external flash (all versions prior to 2019-11-15) allows a local administrator or physical attacker to compromise the confidentiality of sensor data via injection of an unverified partition table.📖 Read
via "National Vulnerability Database".
❌ Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware ❌
📖 Read
via "Threatpost".
An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group - since 2013.📖 Read
via "Threatpost".
Threat Post
Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware
An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group - since 2013.
❌ Lazarus Group Surfaces with Advanced Malware Framework ❌
📖 Read
via "Threatpost".
The North Korean APT has been using the framework, called MATA, for a number of purposes, from spying to financial gain.📖 Read
via "Threatpost".
Threat Post
Lazarus Group Surfaces with Advanced Malware Framework
The North Korean APT has been using the framework, called MATA, for a number of purposes, from spying to financial gain.
🛠 Logwatch 7.5.4 🛠
📖 Go!
via "Security Tool Files ≈ Packet Storm".
Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.📖 Go!
via "Security Tool Files ≈ Packet Storm".
Packetstormsecurity
Logwatch 7.5.4 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🕴 The InfoSec Barrier to AI 🕴
📖 Read
via "Dark Reading: ".
Information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.📖 Read
via "Dark Reading: ".
Dark Reading
The InfoSec Barrier to AI
Information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.
ATENTION‼ New - CVE-2019-16244
📖 Read
via "National Vulnerability Database".
OMERO.server before 5.6.1 allows attackers to bypass the security filters and access hidden objects via a crafted query.📖 Read
via "National Vulnerability Database".
🕴 COVID-19-Related Attacks Exploded in the First Half of 2020 🕴
📖 Read
via "Dark Reading: ".
COVID-19 as part of a cyberattack increased by more than 3,900% between February and June.📖 Read
via "Dark Reading: ".
Dark Reading
COVID-19-Related Attacks Exploded in the First Half of 2020
COVID-19 as part of a cyberattack increased by more than 3,900% between February and June.
🕴 Ripple20's Effects Will Impact IoT Cybersecurity for Years to Come 🕴
📖 Read
via "Dark Reading: ".
A series of newly discovered TCP/IP software vulnerabilities pose a threat to millions of IoT devices. Undiscovered since the early 1990s, they highlight the need to improve security in an increasingly precarious IoT supply chain.📖 Read
via "Dark Reading: ".
Dark Reading
Ripple20's Effects Will Impact IoT Cybersecurity for Years to Come
A series of newly discovered TCP/IP software vulnerabilities pose a threat to millions of IoT devices. Undiscovered since the early 1990s, they highlight the need to improve security in an increasingly precarious IoT supply chain.
🔐 Phishing attacks and ransomware are the most challenging threats for many organizations 🔐
📖 Read
via "Security on TechRepublic".
Unpatched systems and misconfigurations are also major concerns for security professionals, Balbix says.📖 Read
via "Security on TechRepublic".
TechRepublic
Phishing attacks and ransomware are the most challenging threats for many organizations
Unpatched systems and misconfigurations are also major concerns for security professionals, Balbix says.
🔐 How to add two-factor authentication to the Bitwarden desktop client 🔐
📖 Read
via "Security on TechRepublic".
If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.📖 Read
via "Security on TechRepublic".
TechRepublic
How to add two-factor authentication to the Bitwarden desktop client
If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.
🔐 How to add two-factor authentication to the Bitwarden desktop client 🔐
📖 Read
via "Security on TechRepublic".
If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.📖 Read
via "Security on TechRepublic".
TechRepublic
How to add two-factor authentication to the Bitwarden desktop client
If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.
🕴 North Korea's Lazarus Group Developing Cross-Platform Malware Framework 🕴
📖 Read
via "Dark Reading: ".
The APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS, and Linux.📖 Read
via "Dark Reading: ".
Dark Reading
North Korea's Lazarus Group Developing Cross-Platform Malware Framework
The APT group, known for its attack on Sony Pictures in 2014, has created an advanced malware framework that can launch and manage attacks against systems running Windows, MacOS, and Linux.
🔏 Our Ongoing Investments to Make it Easier to Switch from Symantec DLP 🔏
📖 Read
via "Subscriber Blog RSS Feed ".
When Broadcom acquired Symantec in the fall of 2019, there were many questions in the market from their customer base. Many of them came to us asking for assistance in protecting their most critical data and reducing their vendor uncertainty.📖 Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Our Ongoing Investments to Make it Easier to Switch from Symantec DLP
When Broadcom acquired Symantec in the fall of 2019, there were many questions in the market from their customer base. Many of them came to us asking for assistance in protecting their most critical data and reducing their vendor uncertainty.
ATENTION‼ New - CVE-2014-1422
📖 Read
via "National Vulnerability Database".
In Ubuntu's trust-store, if a user revokes location access from an application, the location is still available to the application because the application will honour incorrect, cached permissions. This is because the cache was not ordered by creation time by the Select struct in src/core/trust/impl/sqlite3/store.cpp. Fixed in trust-store (Ubuntu) version 1.1.0+15.04.20150123-0ubuntu1 and trust-store (Ubuntu RTM) version 1.1.0+15.04.20150123~rtm-0ubuntu1.📖 Read
via "National Vulnerability Database".
🕴 CISA Hires Security Experts to Boost COVID-19 Response 🕴
📖 Read
via "Dark Reading: ".
The agency brings in expertise from the private sector to improve its technical capabilities and engagement with industry partners.📖 Read
via "Dark Reading: ".
Dark Reading
CISA Hires Security Experts to Boost COVID-19 Response
The agency brings in expertise from the private sector to improve its technical capabilities and engagement with industry partners.
❌ Apple Security Research Device Program Draws Mixed Reactions ❌
📖 Read
via "Threatpost".
Apple's Security Research Device program is now open to select researchers - but some are irked by the program's vulnerability disclosure restrictions.📖 Read
via "Threatpost".
Threat Post
Apple Security Research Device Program Draws Mixed Reactions
Apple's Security Research Device program is now open to select bug bounty hunters.
❌ OilRig APT Drills into Malware Innovation with Unique Backdoor ❌
📖 Read
via "Threatpost".
The RDAT tool uses email as a C2 channel, with attachments that hide data and commands inside images.📖 Read
via "Threatpost".
Threat Post
OilRig APT Drills into Malware Innovation with Unique Backdoor
The RDAT tool uses email as a C2 channel, with attachments that hide data and commands inside images.
🕴 VC Investment in Cybersecurity Dips & Shifts with COVID-19 🕴
📖 Read
via "Dark Reading: ".
While the pandemic has infected funding for cybersecurity startups, it also has emboldened some startups with innovative tools that secure the wave of at-home work.📖 Read
via "Dark Reading: ".
Dark Reading
VC Investment in Cybersecurity Dips & Shifts with COVID-19
While the pandemic has infected funding for cybersecurity startups, it also has emboldened some startups with innovative tools that secure the wave of at-home work.