❌ Garmin Suffers Reported Ransomware Attack ❌
📖 Read
via "Threatpost".
Garmin's services, websites and customer service have all been down since Wednesday night.📖 Read
via "Threatpost".
Threat Post
UPDATED: Garmin Suffers Reported Ransomware Attack
Garmin's consumer and commercial aviation services, websites and customer service have all been rendered unavailable.
❌ Cisco Network Security Flaw Leaks Sensitive Data ❌
📖 Read
via "Threatpost".
The flaw exists in Cisco's network security Firepower Threat Defense (FTD) software and its Adaptive Security Appliance (ASA) software.📖 Read
via "Threatpost".
Threat Post
Cisco Network Security Flaw Leaks Sensitive Data
The flaw exists in Cisco's network security Firepower Threat Defense (FTD) software and its Adaptive Security Appliance (ASA) software.
🕴 Twitter Breach a Reminder of Need to Protect Corporate Social Media Use 🕴
📖 Read
via "Dark Reading: ".
Intruders had access to direct messages associated with 36 accounts in last week's attack, social media giant discloses.📖 Read
via "Dark Reading: ".
Dark Reading
Twitter Breach a Reminder of Need to Protect Corporate Social Media Use
Intruders had access to direct messages associated with 36 accounts in last week's attack, social media giant discloses.
🔐 A quick and easy way to lock down SSH 🔐
📖 Read
via "Security on TechRepublic".
Anxious to get your Linux server SSH access locked down? Jack Wallen shows you one more step you can take--one that will only take seconds.📖 Read
via "Security on TechRepublic".
TechRepublic
A quick and easy way to lock down SSH
Anxious to get your Linux server SSH access locked down? Jack Wallen shows you one more step you can take--one that will only take seconds.
🕴 DNA Site Leaves Records Open to Law Enforcement 🕴
📖 Read
via "Dark Reading: ".
A pair of breaches reset user accounts to allow access for two days.📖 Read
via "Dark Reading: ".
Dark Reading
DNA Site Leaves Records Open to Law Enforcement
A pair of breaches reset user accounts to allow access for two days.
🔐 The challenges and opportunities of shadow IT 🔐
📖 Read
via "Security on TechRepublic".
The shadow IT genie is out of the bottle and offers benefits and threats. Learn some tips from the experts on how to effectively harness shadow IT in your company.📖 Read
via "Security on TechRepublic".
TechRepublic
Shadow IT: The challenges and opportunities
The shadow IT genie is out of the bottle and offers benefits and threats. Learn tips from experts on how to effectively harness shadow IT in your company.
🕴 Fundamentals of Network Traffic Decryption and Risk Management 🕴
📖 Read
via "Dark Reading: ".
Visibility into and inspection of inbound encrypted network traffic is essential for sound enterprise network security. Decryption approaches must soon change due to increasing cost and complexity, but alternative technologies are emerging.📖 Read
via "Dark Reading: ".
Ovumkc
Login
🕴 Twilio Security Incident Shows Danger of Misconfigured S3 Buckets 🕴
📖 Read
via "Dark Reading: ".
Twilio says attackers accessed its misconfigured cloud storage system and altered a copy of the JavaScriptSDK it shares with customers.📖 Read
via "Dark Reading: ".
Dark Reading
Twilio Security Incident Shows Danger of Misconfigured S3 Buckets
Twilio says attackers accessed its misconfigured cloud storage system and altered a copy of the JavaScriptSDK it shares with customers.
ATENTION‼ New - CVE-2020-11625
📖 Read
via "National Vulnerability Database".
An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. Failed web UI login attempts elicit different responses depending on whether a user account exists. Because the responses indicate whether a submitted username is valid or not, they make it easier to identify legitimate usernames. If a login request is sent to ISAPI/Security/sessionLogin/capabilities using a username that exists, it will return the value of the salt given to that username, even if the password is incorrect. However, if a login request is sent using a username that is not present in the database, it will return an empty salt value. This allows attackers to enumerate legitimate usernames, facilitating brute-force attacks. NOTE: this is different from CVE-2020-7057.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2020-11624
📖 Read
via "National Vulnerability Database".
An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. They do not require users to change the default password for the admin account. They only show a pop-up window suggesting a change but there's no enforcement. An administrator can click Cancel and proceed to use the device without changing the password. Additionally, they disclose the default username within the login.js script. Since many attacks for IoT devices, including malware and exploits, are based on the usage of default credentials, it makes these cameras an easy target for malicious actors.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2020-11623
📖 Read
via "National Vulnerability Database".
An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. An attacker with physical access to the UART interface could access additional diagnostic and configuration functionalities as well as the camera's bootloader. Successful exploitation could compromise confidentiality, integrity, and availability of the affected system. It could even render the device inoperable.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2019-18834
📖 Read
via "National Vulnerability Database".
Persistent XSS in the WooCommerce Subscriptions plugin before 2.6.3 for WordPress allows remote attackers to execute arbitrary JavaScript because Billing Details are mishandled in WCS_Admin_Post_Types in class-wcs-admin-post-types.php.📖 Read
via "National Vulnerability Database".
❌ Malicious ‘Blur’ Photo App Campaign Discovered on Google Play ❌
📖 Read
via "Threatpost".
Twenty-nine bad mobile apps with a combined 3.5 million downloads bombard users with out-of-context ads.📖 Read
via "Threatpost".
Threat Post
Malicious ‘Blur’ Photo App Campaign Discovered on Google Play
Twenty-nine bad mobile apps with a combined 3.5 million downloads bombard users with out-of-context ads.
🕴 Banning TikTok Won't Solve Our Privacy Problems 🕴
📖 Read
via "Dark Reading: ".
Preventing the use of an apps based solely on its country of origin (no matter how hostile) is merely a Band-Aid that won't fully address all privacy and security concerns.📖 Read
via "Dark Reading: ".
Dark Reading
Banning TikTok Won't Solve Our Privacy Problems
Preventing the use of an apps based solely on its country of origin (no matter how hostile) is merely a Band-Aid that won't fully address all privacy and security concerns.
🕴 Email Security Features Fail to Prevent Phishable 'From' Addresses 🕴
📖 Read
via "Dark Reading: ".
The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.📖 Read
via "Dark Reading: ".
Dark Reading
Email Security Features Fail to Prevent Phishable 'From' Addresses
The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.
🔏 Friday Five: 7/24 Edition 🔏
📖 Read
via "Subscriber Blog RSS Feed ".
A new phishing campaign abuses enterprise cloud services, BadPower attack could set your device on fire, and the UK sports industry under near constant cyber attack - catch up on all the week's news with the Friday Five.📖 Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 7/24 Edition
A new phishing campaign abuses enterprise cloud services, BadPower attack could set your device on fire, and the UK sports industry under near constant cyber attack - catch up on all the week's news with the Friday Five.
🛠 Sifter 8.6 🛠
📖 Go!
via "Security Tool Files ≈ Packet Storm".
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.📖 Go!
via "Security Tool Files ≈ Packet Storm".
Packetstormsecurity
Sifter 8.6 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
⚠ ASUS routers could be reflashed with malware – patch now! ⚠
📖 Read
via "Naked Security".
Responsible disclosure means the bugs are already fixed - but don't forget to check that you applied the patch.📖 Read
via "Naked Security".
Sophos News
Naked Security – Sophos News
🔐 Companies turning to isolation technology to protect against the internet's biggest threats 🔐
📖 Read
via "Security on TechRepublic".
Isolation technology allows companies to keep employee browsers siloed in the cloud.📖 Read
via "Security on TechRepublic".
TechRepublic
Companies turning to isolation technology to protect against the internet's biggest threats
Isolation technology allows companies to keep employee browsers siloed in the cloud.
❌ News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags ❌
📖 Read
via "Threatpost".
Threatpost editors talk about the biggest security news stories for the week ended Jul. 24.📖 Read
via "Threatpost".
Threat Post
News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags
Threatpost editors talk about the biggest security news stories for the week ended Jul. 24.
❌ NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug ❌
📖 Read
via "Threatpost".
Power plants, factories, oil and gas refineries and more are all in the sights of foreign adversaries, the U.S. warns.📖 Read
via "Threatpost".
Threat Post
NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug
Power plants, factories, oil and gas refineries and more are all in the sights of foreign adversaries, the U.S. warns.