โ Travel company CWT avoids ransomware derailment by paying $4.5m blackmail demand โ
๐ Read
via "Naked Security".
US travel company CWT has reportedly coughed up $4.5m to ransomware crooks who stole data and scrambled files.๐ Read
via "Naked Security".
Naked Security
Travel company CWT avoids ransomware derailment by paying $4.5m blackmail demand
US travel company CWT has reportedly coughed up $4.5m to ransomware crooks who stole data and scrambled files.
๐ด 3 Arrested for Massive Twitter Breach ๐ด
๐ Read
via "Dark Reading: ".
Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.๐ Read
via "Dark Reading: ".
Dark Reading
3 Arrested for Massive Twitter Breach
Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.
โ 4 Unpatched Bugs Plague Grandstream ATAs for VoIP Users โ
๐ Read
via "Threatpost".
The flaws have been confirmed by Grandstream, but no firmware update has yet been issued.๐ Read
via "Threatpost".
Threat Post
4 Unpatched Bugs Plague Grandstream ATAs for VoIP Users
The flaws have been confirmed by Grandstream, but no firmware update has yet been issued.
ATENTIONโผ New - CVE-2019-11286
๐ Read
via "National Vulnerability Database".
VMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution.๐ Read
via "National Vulnerability Database".
โ Twitter hack โ three suspects charged in the US โ
๐ Read
via "Naked Security".
Three people have been fingered for the recent Twitter hack in which 45 high-profle accounts were taken over.๐ Read
via "Naked Security".
Naked Security
Twitter hack โ three suspects charged in the US
Three people have been fingered for the recent Twitter hack in which 45 high-profle accounts were taken over.
โโ========================
๐ Look look!
These channels ๐จ are amazing!
========================
๐ Look look!
These channels ๐จ are amazing!
========================
โ Monday review โ our recent stories revisited โ
๐ Read
via "Naked Security".
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.๐ Read
via "Naked Security".
Naked Security
Monday review โ our recent stories revisited
Get yourself up to date with everything we've written in the last seven days โ it's weekly roundup time.
๐ด How Should I Securely Destroy/Discard My Devices? ๐ด
๐ Read
via "Dark Reading: ".
While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious.๐ Read
via "Dark Reading: ".
Dark Reading
How Should I Securely Destroy/Discard My Devices?
While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious.
โ Meetup Critical Flaws Allow โGroupโ Takeover, Payment Theft โ
๐ Read
via "Threatpost".
Researchers disclosed critical flaws in the popular Meetup service at Black Hat USA 2020 this week, which could allow takeover of Meetup "Groups."๐ Read
via "Threatpost".
Threat Post
Meetup Critical Flaws Allow โGroupโ Takeover, Payment Theft
Researchers disclosed critical flaws in the popular Meetup service at Black Hat USA 2020 this week, which could allow takeover of Meetup "Groups."
๐ด A Patriotic Solution to the Cybersecurity Skills Shortage ๐ด
๐ Read
via "Dark Reading: ".
Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.๐ Read
via "Dark Reading: ".
Dark Reading
A Patriotic Solution to the Cybersecurity Skills Shortage
Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.
ATENTIONโผ New - CVE-2019-4589
๐ Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to privlege escalation where the "My schedules and subscriptions" page is visible and accessible to a less privileged user. IBM X-Force ID: 167449.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2019-4366
๐ Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.0 and 11.1 is susceptible to an information disclosure vulnerability where an attacker could gain access to cached browser data. IBM X-Force ID: 161748.๐ Read
via "National Vulnerability Database".
๐ BlackBerry launches free tool for reverse engineering to fight cybersecurity attacks ๐
๐ Read
via "Security on TechRepublic".
One of the first announcements at BlackHat USA 2020 is an open-source tool to fight malware that BlackBerry first used internally and is now making available to everyone.๐ Read
via "Security on TechRepublic".
TechRepublic
BlackBerry launches free tool for reverse engineering to fight cybersecurity attacks
One of the first announcements at BlackHat USA 2020 is an open-source tool to fight malware that BlackBerry first used internally and is now making available to everyone.
๐ How to better protect your organization against mobile threats ๐
๐ Read
via "Security on TechRepublic".
The increased use of personal phones for work and the growth of mobile malware create a risk to organizations, says Gigamon.๐ Read
via "Security on TechRepublic".
TechRepublic
How to better protect your organization against mobile threats
The increased use of personal phones for work and the growth of mobile malware create a risk to organizations, says Gigamon.
โ Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes โ
๐ Read
via "Threatpost".
With Black Hat USA 2020 kicking off this week, Erez Yalon with Checkmarx talks about newly disclosed, critical vulnerabilities in Meetup.com - and why they are the "holy grail" for attackers.๐ Read
via "Threatpost".
Threat Post
Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes
With Black Hat USA 2020 kicking off this week, Erez Yalon with Checkmarx talks about newly disclosed, critical vulnerabilities in Meetup.com - and why they are the "holy grail" for attackers.
๐ด Travel Management Firm CWT Pays $4.5M to Ransomware Attackers ๐ด
๐ Read
via "Dark Reading: ".
Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.๐ Read
via "Dark Reading: ".
Dark Reading
Travel Management Firm CWT Pays $4.5M to Ransomware Attackers
Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.
ATENTIONโผ New - CVE-2019-19455
๐ Read
via "National Vulnerability Database".
Wowza Streaming Engine through 2019-11-28 has Insecure Permissions.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2019-19453
๐ Read
via "National Vulnerability Database".
Wowza Streaming Engine through 2019-11-28 allows XSS (issue 1 of 2).๐ Read
via "National Vulnerability Database".
โ Garmin Pays Up to Evil Corp After Ransomware Attack โ Reports โ
๐ Read
via "Threatpost".
The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.๐ Read
via "Threatpost".
Threat Post
Garmin Pays Up to Evil Corp After Ransomware Attack โ Reports
The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.
๐ Survey: Barriers prevent data privacy initiatives ๐
๐ Read
via "Security on TechRepublic".
Corporate culture, lack of privacy teams hurt privacy initiatives.๐ Read
via "Security on TechRepublic".
TechRepublic
Survey: Barriers prevent data privacy initiatives
Corporate culture, lack of privacy teams hurt privacy initiatives.
๐ Samhain File Integrity Checker 4.4.2 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Samhain File Integrity Checker 4.4.2 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers