๐ Survey: Barriers prevent data privacy initiatives ๐
๐ Read
via "Security on TechRepublic".
Corporate culture, lack of privacy teams hurt privacy initiatives.๐ Read
via "Security on TechRepublic".
TechRepublic
Survey: Barriers prevent data privacy initiatives
Corporate culture, lack of privacy teams hurt privacy initiatives.
๐ Samhain File Integrity Checker 4.4.2 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Samhain File Integrity Checker 4.4.2 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
๐ Sifter 9.1 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Sifter 9.1 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
Forwarded from ๐ก Cybersecurity & Privacy ๐ก - News
โโ========================
๐ Look look!
These channels ๐จ are amazing!
========================
๐ Look look!
These channels ๐จ are amazing!
========================
๐ The Linux Foundation announces collective to enhance open source software security ๐
๐ Read
via "Security on TechRepublic".
The newly formed Open Source Security Foundation includes titans in technology such as Google, Intel, Microsoft, IBM, and more.๐ Read
via "Security on TechRepublic".
ATENTIONโผ New - CVE-2015-9549
๐ Read
via "National Vulnerability Database".
A reflected Cross-site Scripting (XSS) vulnerability exists in OcPortal 9.0.20 via the OCF_EMOTICON_CELL.tpl FIELD_NAME field to data/emoticons.php.๐ Read
via "National Vulnerability Database".
โ Netgear Wonโt Patch 45 Router Models Vulnerable to Serious Flaw โ
๐ Read
via "Threatpost".
Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models.๐ Read
via "Threatpost".
Threat Post
Netgear Wonโt Patch 45 Router Models Vulnerable to Serious Flaw
Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models.
๐ New Bill Would Bar IP Theft Offenders From US ๐
๐ Read
via "Subscriber Blog RSS Feed ".
Yet another bill designed to crackdown on IP theft, the Stop Theft of Intellectual Property Act of 2020, was introduced in the Senate last week๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New Bill Would Bar IP Theft Offenders From US
Yet another bill designed to crackdown on IP theft, the Stop Theft of Intellectual Property Act of 2020, was introduced in the Senate last week.
โ Google Updates Ad Policies to Counter Influence Campaigns, Extortion โ
๐ Read
via "Threatpost".
Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or circulate politically influential content.๐ Read
via "Threatpost".
Threat Post
Google Updates Ad Policies to Counter Influence Campaigns, Extortion
Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or circulate politically influential content.
๐ด Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020 ๐ด
๐ Read
via "Dark Reading: ".
Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.๐ Read
via "Dark Reading: ".
Dark Reading
Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020
Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.
๐ด Why Data Ethics Is a Growing CISO Priority ๐ด
๐ Read
via "Dark Reading: ".
With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.๐ Read
via "Dark Reading: ".
Dark Reading
Why Data Ethics is a Growing CISO Priority
With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.
๐ด New 'Nanodegree' Program Provides Hands-On Cybersecurity Training ๐ด
๐ Read
via "Dark Reading: ".
Emerging streamlined curriculum programs aim to help narrow the skills gap.๐ Read
via "Dark Reading: ".
Dark Reading
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Emerging streamlined curriculum programs aim to help narrow the skills gap.
๐ด DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat ๐ด
๐ Read
via "Dark Reading: ".
"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.๐ Read
via "Dark Reading: ".
Dark Reading
DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat
Taidoor is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.
๐ด FBI Warns on New E-Commerce Fraud ๐ด
๐ Read
via "Dark Reading: ".
A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.๐ Read
via "Dark Reading: ".
Dark Reading
FBI Warns on New E-Commerce Fraud
A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.
๐ How to make your PC passwordless in the Windows 10 May 2020 Update ๐
๐ Read
via "Security on TechRepublic".
You don't need an account password to sign into Windows 10 version 2004.๐ Read
via "Security on TechRepublic".
TechRepublic
How to make your PC passwordless in the Windows 10 May 2020 Update
You don't need an account password to sign into Windows 10 version 2004.
ATENTIONโผ New - CVE-2020-11584
๐ Read
via "National Vulnerability Database".
A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2020-11583
๐ Read
via "National Vulnerability Database".
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.๐ Read
via "National Vulnerability Database".
๐ด 11 Hot Startups to Watch at Black Hat USA ๐ด
๐ Read
via "Dark Reading: ".
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.๐ Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
๐ด 11 Hot Startups to Watch at Black Hat USA ๐ด
๐ Read
via "Dark Reading: ".
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.๐ Read
via "Dark Reading: ".
Dark Reading
11 Hot Startups to Watch at Black Hat USA
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.
๐ VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics ๐
๐ Read
via "Security on TechRepublic".
Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.๐ Read
via "Security on TechRepublic".
TechRepublic
VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics
Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.
โ GandCrab ransomware hacker arrested in Belarus โ
๐ Read
via "Naked Security".
Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia.๐ Read
via "Naked Security".
Naked Security
GandCrab ransomware hacker arrested in Belarus
Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia.