ATENTIONβΌ New - CVE-2015-9549
π Read
via "National Vulnerability Database".
A reflected Cross-site Scripting (XSS) vulnerability exists in OcPortal 9.0.20 via the OCF_EMOTICON_CELL.tpl FIELD_NAME field to data/emoticons.php.π Read
via "National Vulnerability Database".
β Netgear Wonβt Patch 45 Router Models Vulnerable to Serious Flaw β
π Read
via "Threatpost".
Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models.π Read
via "Threatpost".
Threat Post
Netgear Wonβt Patch 45 Router Models Vulnerable to Serious Flaw
Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models.
π New Bill Would Bar IP Theft Offenders From US π
π Read
via "Subscriber Blog RSS Feed ".
Yet another bill designed to crackdown on IP theft, the Stop Theft of Intellectual Property Act of 2020, was introduced in the Senate last weekπ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New Bill Would Bar IP Theft Offenders From US
Yet another bill designed to crackdown on IP theft, the Stop Theft of Intellectual Property Act of 2020, was introduced in the Senate last week.
β Google Updates Ad Policies to Counter Influence Campaigns, Extortion β
π Read
via "Threatpost".
Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or circulate politically influential content.π Read
via "Threatpost".
Threat Post
Google Updates Ad Policies to Counter Influence Campaigns, Extortion
Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or circulate politically influential content.
π΄ Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020 π΄
π Read
via "Dark Reading: ".
Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.π Read
via "Dark Reading: ".
Dark Reading
Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020
Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.
π΄ Why Data Ethics Is a Growing CISO Priority π΄
π Read
via "Dark Reading: ".
With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.π Read
via "Dark Reading: ".
Dark Reading
Why Data Ethics is a Growing CISO Priority
With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.
π΄ New 'Nanodegree' Program Provides Hands-On Cybersecurity Training π΄
π Read
via "Dark Reading: ".
Emerging streamlined curriculum programs aim to help narrow the skills gap.π Read
via "Dark Reading: ".
Dark Reading
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Emerging streamlined curriculum programs aim to help narrow the skills gap.
π΄ DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat π΄
π Read
via "Dark Reading: ".
"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.π Read
via "Dark Reading: ".
Dark Reading
DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat
Taidoor is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.
π΄ FBI Warns on New E-Commerce Fraud π΄
π Read
via "Dark Reading: ".
A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.π Read
via "Dark Reading: ".
Dark Reading
FBI Warns on New E-Commerce Fraud
A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.
π How to make your PC passwordless in the Windows 10 May 2020 Update π
π Read
via "Security on TechRepublic".
You don't need an account password to sign into Windows 10 version 2004.π Read
via "Security on TechRepublic".
TechRepublic
How to make your PC passwordless in the Windows 10 May 2020 Update
You don't need an account password to sign into Windows 10 version 2004.
ATENTIONβΌ New - CVE-2020-11584
π Read
via "National Vulnerability Database".
A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-11583
π Read
via "National Vulnerability Database".
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.π Read
via "National Vulnerability Database".
π΄ 11 Hot Startups to Watch at Black Hat USA π΄
π Read
via "Dark Reading: ".
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
π΄ 11 Hot Startups to Watch at Black Hat USA π΄
π Read
via "Dark Reading: ".
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.π Read
via "Dark Reading: ".
Dark Reading
11 Hot Startups to Watch at Black Hat USA
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.
π VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics π
π Read
via "Security on TechRepublic".
Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.π Read
via "Security on TechRepublic".
TechRepublic
VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics
Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.
β GandCrab ransomware hacker arrested in Belarus β
π Read
via "Naked Security".
Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia.π Read
via "Naked Security".
Naked Security
GandCrab ransomware hacker arrested in Belarus
Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia.
β Podcast: Learning to βSpeak the Languageβ of OT Security Teams β
π Read
via "Threatpost".
Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, talks about the differing priorities between IT and OT security teams as industrial control systems become connected.π Read
via "Threatpost".
Threat Post
Podcast: Learning to βSpeak the Languageβ of OT Security Teams
Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, talks about the differing priorities between IT and OT security teams as industrial control systems become connected.
β Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks β
π Read
via "Threatpost".
COVID-19 pandemic spurs spoofing preference changes, plus a surge in email-based attacks.π Read
via "Threatpost".
Threat Post
Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks
COVID-19 pandemic spurs spoofing preference changes, plus a surge in email-based attacks.
π How poor security practices from remote employees are wasting the time of IT staff π
π Read
via "Security on TechRepublic".
Along with the independence remote work affords employees comes the use of shadow IT and poor password practices, according to a new survey by 1Password.π Read
via "Security on TechRepublic".
TechRepublic
How poor security practices from remote employees are wasting the time of IT staff
Along with the independence remote work affords employees comes the use of shadow IT and poor password practices, according to a new survey by 1Password.
π Study finds misconfigured cloud storage services in 93% of cloud deployments analyzed π
π Read
via "Security on TechRepublic".
An Accurics study said cloud breaches will likely increase in velocity and scale as more enterprises move to the cloud.π Read
via "Security on TechRepublic".
TechRepublic
Study finds misconfigured cloud storage services in 93% of cloud deployments analyzed
An Accurics study said cloud breaches will likely increase in velocity and scale as more enterprises move to the cloud.
π΄ Securing IoT as a Remote Workforce Strategy π΄
π Read
via "Dark Reading: ".
Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security.π Read
via "Dark Reading: ".
Dark Reading
Securing IoT as a Remote Workforce Strategy
Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security.