๐ Friday Five: 7/31 Edition ๐
๐ Read
via "Subscriber Blog RSS Feed ".
The FBI warns of new DDoS attack vectors, iOS14 allows unexpected prying behavior on Instagram, and NCSC research reveals the cybersecurity sector needs improvement in inclusion - catch up on all the week's news with the Friday Five.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 7/31 Edition
The FBI warns of new DDoS attack vectors, iOS14 allows unexpected prying behavior on Instagram, and NCSC research reveals the cybersecurity sector needs improvement in inclusion - catch up on all the week's news with the Friday Five.
๐ Security analysts: Industry has not solved the talent gap or provided clear career paths ๐
๐ Read
via "Security on TechRepublic".
New survey finds that cybersecurity professionals want more training to keep up with the threat landscape and learn new software platforms.๐ Read
via "Security on TechRepublic".
TechRepublic
Security analysts: Industry has not solved the talent gap or provided clear career paths
New survey finds that cybersecurity professionals want more training to keep up with the threat landscape and learn new software platforms.
๐ Top 10 apps every iOS user should download ๐
๐ Read
via "Security on TechRepublic".
Check out a developer's picks of 10 essential iOS apps, which focus on security, productivity, and more.๐ Read
via "Security on TechRepublic".
TechRepublic
10 Essential iOS Apps
Check out a developer's picks of 10 essential iOS apps, which focus on security, productivity, and more.
๐ Sifter 9.01 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Sifter 9.01 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
โ Authorities Arrest Alleged 17-Year-Old โMastermindโ Behind Twitter Hack โ
๐ Read
via "Threatpost".
Three have been charged in alleged connection with the recent high-profile Twitter hack - including a 17-year-old teen from Florida who is the reported "mastermind" behind the attack.๐ Read
via "Threatpost".
Threat Post
Authorities Arrest Alleged 17-Year-Old โMastermindโ Behind Twitter Hack
Three have been charged in alleged connection with the recent high-profile Twitter hack - including a 17-year-old teen from Florida who is the reported "mastermind" behind the attack.
โ Travel company CWT avoids ransomware derailment by paying $4.5m blackmail demand โ
๐ Read
via "Naked Security".
US travel company CWT has reportedly coughed up $4.5m to ransomware crooks who stole data and scrambled files.๐ Read
via "Naked Security".
Naked Security
Travel company CWT avoids ransomware derailment by paying $4.5m blackmail demand
US travel company CWT has reportedly coughed up $4.5m to ransomware crooks who stole data and scrambled files.
๐ด 3 Arrested for Massive Twitter Breach ๐ด
๐ Read
via "Dark Reading: ".
Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.๐ Read
via "Dark Reading: ".
Dark Reading
3 Arrested for Massive Twitter Breach
Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.
โ 4 Unpatched Bugs Plague Grandstream ATAs for VoIP Users โ
๐ Read
via "Threatpost".
The flaws have been confirmed by Grandstream, but no firmware update has yet been issued.๐ Read
via "Threatpost".
Threat Post
4 Unpatched Bugs Plague Grandstream ATAs for VoIP Users
The flaws have been confirmed by Grandstream, but no firmware update has yet been issued.
ATENTIONโผ New - CVE-2019-11286
๐ Read
via "National Vulnerability Database".
VMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution.๐ Read
via "National Vulnerability Database".
โ Twitter hack โ three suspects charged in the US โ
๐ Read
via "Naked Security".
Three people have been fingered for the recent Twitter hack in which 45 high-profle accounts were taken over.๐ Read
via "Naked Security".
Naked Security
Twitter hack โ three suspects charged in the US
Three people have been fingered for the recent Twitter hack in which 45 high-profle accounts were taken over.
โโ========================
๐ Look look!
These channels ๐จ are amazing!
========================
๐ Look look!
These channels ๐จ are amazing!
========================
โ Monday review โ our recent stories revisited โ
๐ Read
via "Naked Security".
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.๐ Read
via "Naked Security".
Naked Security
Monday review โ our recent stories revisited
Get yourself up to date with everything we've written in the last seven days โ it's weekly roundup time.
๐ด How Should I Securely Destroy/Discard My Devices? ๐ด
๐ Read
via "Dark Reading: ".
While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious.๐ Read
via "Dark Reading: ".
Dark Reading
How Should I Securely Destroy/Discard My Devices?
While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious.
โ Meetup Critical Flaws Allow โGroupโ Takeover, Payment Theft โ
๐ Read
via "Threatpost".
Researchers disclosed critical flaws in the popular Meetup service at Black Hat USA 2020 this week, which could allow takeover of Meetup "Groups."๐ Read
via "Threatpost".
Threat Post
Meetup Critical Flaws Allow โGroupโ Takeover, Payment Theft
Researchers disclosed critical flaws in the popular Meetup service at Black Hat USA 2020 this week, which could allow takeover of Meetup "Groups."
๐ด A Patriotic Solution to the Cybersecurity Skills Shortage ๐ด
๐ Read
via "Dark Reading: ".
Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.๐ Read
via "Dark Reading: ".
Dark Reading
A Patriotic Solution to the Cybersecurity Skills Shortage
Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.
ATENTIONโผ New - CVE-2019-4589
๐ Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to privlege escalation where the "My schedules and subscriptions" page is visible and accessible to a less privileged user. IBM X-Force ID: 167449.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2019-4366
๐ Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.0 and 11.1 is susceptible to an information disclosure vulnerability where an attacker could gain access to cached browser data. IBM X-Force ID: 161748.๐ Read
via "National Vulnerability Database".
๐ BlackBerry launches free tool for reverse engineering to fight cybersecurity attacks ๐
๐ Read
via "Security on TechRepublic".
One of the first announcements at BlackHat USA 2020 is an open-source tool to fight malware that BlackBerry first used internally and is now making available to everyone.๐ Read
via "Security on TechRepublic".
TechRepublic
BlackBerry launches free tool for reverse engineering to fight cybersecurity attacks
One of the first announcements at BlackHat USA 2020 is an open-source tool to fight malware that BlackBerry first used internally and is now making available to everyone.
๐ How to better protect your organization against mobile threats ๐
๐ Read
via "Security on TechRepublic".
The increased use of personal phones for work and the growth of mobile malware create a risk to organizations, says Gigamon.๐ Read
via "Security on TechRepublic".
TechRepublic
How to better protect your organization against mobile threats
The increased use of personal phones for work and the growth of mobile malware create a risk to organizations, says Gigamon.
โ Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes โ
๐ Read
via "Threatpost".
With Black Hat USA 2020 kicking off this week, Erez Yalon with Checkmarx talks about newly disclosed, critical vulnerabilities in Meetup.com - and why they are the "holy grail" for attackers.๐ Read
via "Threatpost".
Threat Post
Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes
With Black Hat USA 2020 kicking off this week, Erez Yalon with Checkmarx talks about newly disclosed, critical vulnerabilities in Meetup.com - and why they are the "holy grail" for attackers.
๐ด Travel Management Firm CWT Pays $4.5M to Ransomware Attackers ๐ด
๐ Read
via "Dark Reading: ".
Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.๐ Read
via "Dark Reading: ".
Dark Reading
Travel Management Firm CWT Pays $4.5M to Ransomware Attackers
Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.