π΄ What to Tell Young People of Color About InfoSec Careers π΄
π Read
via "Dark Reading: ".
CEO and founder of Revolution Cyber Juliet Okafor and Baker Hughes Director of Global OT Security Programs Paul Brager talk about the unique lessons and hard truths they provide when mentoring young black cybersecurity professionals.π Read
via "Dark Reading: ".
Dark Reading
What to Tell Young People of Color About InfoSec Careers
CEO and founder of Revolution Cyber Juliet Okafor and Baker Hughes Director of Global OT Security Programs Paul Brager talk about the unique lessons and hard truths they provide when mentoring young black cybersecurity professionals.
β Twitter Fixes High-Severity Flaw Affecting Android Users β
π Read
via "Threatpost".
A vulnerability in Twitter for Android could have allowed attackers to access private direct messages (DMs) and other data.π Read
via "Threatpost".
Threat Post
Twitter Fixes High-Severity Flaw Affecting Android Users
A vulnerability in Twitter for Android could have allowed attackers to access private direct messages (DMs) and other data.
π΄ Developing Community for Woman Infosec Pros in India π΄
π Read
via "Dark Reading: ".
Vandana Verma tells us how women in India are finding support, education and love of cybersecurity through the growing InfosecGirls community.π Read
via "Dark Reading: ".
Dark Reading
Developing Community for Woman Infosec Pros in India
Vandana Verma tells us how women in India are finding support, education and love of cybersecurity through the growing InfosecGirls community.
π΄ Supporting Women in InfoSec π΄
π Read
via "Dark Reading: ".
Maxine Holt, research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs now.π Read
via "Dark Reading: ".
Dark Reading
Supporting Women in InfoSec
Maxine Holt, research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs now.
ATENTIONβΌ New - CVE-2020-13404
π Read
via "National Vulnerability Database".
The ATOS/Sips (aka Atos-Magento) community module 3.0.0 to 3.0.5 for Magento allows command injection.π Read
via "National Vulnerability Database".
β Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers β
π Read
via "Threatpost".
Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch to security researchers with new safe harbor terms and vulnerability disclosure policies at Black Hat USA 2020.π Read
via "Threatpost".
Threat Post
Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers
Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch to security researchers with new safe harbor terms and vulnerability disclosure policies at Black Hat USA 2020.
β Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs β
π Read
via "Threatpost".
The groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.π Read
via "Threatpost".
Threat Post
Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs
The groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.
π΄ Tales from the Trenches Show Security Issues Endemic to Healthcare π΄
π Read
via "Dark Reading: ".
The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.π Read
via "Dark Reading: ".
Dark Reading
Tales from the Trenches Show Security Issues Endemic to Healthcare
The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.
π΄ What A Security Engineer & Software Engineer Learned By Swapping Roles π΄
π Read
via "Dark Reading: ".
A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.π Read
via "Dark Reading: ".
Dark Reading
What A Security Engineer & Software Engineer Learned By Swapping Roles
A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.
π΅ UK retail giant Monsoon has critical vulnerability giving unauthorized access to internal company servers π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
UK Retail Giant Monsoon Has Vulnerability Exposing Sensitive Data
Report: Monsoon Accessorize uses an insecure version of Pulse Connect Secure VPN, exposing records of company and customer data. Read to learn more.
β U.S. Offers Reward of $10M for Info Leading to Discovery of Election Meddling β
π Read
via "Threatpost".
Government hopes to avoid interference in the upcoming November presidential vote with a hefty reward.π Read
via "Threatpost".
Threat Post
U.S. Offers Reward of $10M for Info Leading to Discovery of Election Meddling
Government hopes to avoid interference in the upcoming November presidential vote with a hefty reward.
β Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits β
π Read
via "Threatpost".
Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets.π Read
via "Threatpost".
Threat Post
Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits
Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets.
β Black Hat 2020: βZero-Clickβ MacOS Exploit Chain Uses Microsoft Office Macros β
π Read
via "Threatpost".
At Black Hat 2020, Patrick Wardle disclosed an exploit chain that bypasses Microsoft's malicious macros protections to infect MacOS users.π Read
via "Threatpost".
Threat Post
Black Hat 2020: βZero-Clickβ MacOS Exploit Chain Uses Microsoft Office Macros
At Black Hat 2020, Patrick Wardle disclosed an exploit chain that bypasses Microsoft's malicious macros protections to infect MacOS users.
β Porn blast disrupts bail hearing of alleged Twitter hacker β
π Read
via "Naked Security".
An alleged hacker's bail hearing held online via Zoom with screen sharing enabled... what could possibly go wrong?π Read
via "Naked Security".
Naked Security
Porn blast disrupts bail hearing of alleged Twitter hacker
An alleged hackerβs bail hearing held online via Zoom with screen sharing enabledβ¦ what could possibly go wrong?
π FBI announcement on Windows 7 end of life prompts worry from security experts π
π Read
via "Security on TechRepublic".
Despite the FBI announcement, hospitals, schools, and government offices across the world still use Windows 7.π Read
via "Security on TechRepublic".
TechRepublic
FBI announcement on Windows 7 end of life prompts worry from security experts
Despite the FBI announcement, hospitals, schools, and government offices across the world still use Windows 7.
π΄ 3 Tips For Better Security Across the Software Supply Chain π΄
π Read
via "Dark Reading: ".
It may sound look intimidating, but with a few tweaks to tools and processes already in use, it's not hard to get a head start on improving security posture of the software supply chain.π Read
via "Dark Reading: ".
Dark Reading
3 Tips For Better Security Across the Software Supply Chain
It may sound look intimidating, but with a few tweaks to tools and processes already in use, it's not hard to get a head start on improving security posture of the software supply chain.
π COVID-19-related scams cost Americans more than $98 million since the start of 2020 π
π Read
via "Security on TechRepublic".
Online shopping is the most prevalent type of scam with people losing nearly $14 million to date, according to FTC data.π Read
via "Security on TechRepublic".
TechRepublic
COVID-19-related scams cost Americans more than $98 million since the start of 2020
Online shopping is the most prevalent type of scam with people losing nearly $14 million to date, according to FTC data.
π Security analysts want more help from developers to improve DevSecOps π
π Read
via "Security on TechRepublic".
More training on security tools and better performance metrics can accomplish this, according to a new survey.π Read
via "Security on TechRepublic".
TechRepublic
Security analysts want more help from developers to improve DevSecOps
More training on security tools and better performance metrics can accomplish this, according to a new survey.
β High-Severity Cisco DoS Flaw Plagues Small-Business Switches β
π Read
via "Threatpost".
Cisco recently patched the high-severity flaw, which could allow remote, unauthenticated attackers to launch DoS attacks against its popular small business switches.π Read
via "Threatpost".
Threat Post
High-Severity Cisco DoS Flaw Plagues Small-Business Switches
Cisco recently patched the high-severity flaw, which could allow remote, unauthenticated attackers to launch DoS attacks against its popular small business switches.
π΄ Ripple20: More Vulnerable Devices Identified π΄
π Read
via "Dark Reading: ".
Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
Ripple20: More Vulnerable Devices Identified
Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.
π΄ Energy Market Manipulation with High-Wattage IoT Botnets π΄
π Read
via "Dark Reading: ".
Attackers that can compromise enough products such as smart ACs and heaters can tweak power demand in subtle ways for financial gain or to hurt market players, researchers at Black Hat say.π Read
via "Dark Reading: ".
Dark Reading
Energy Market Manipulation with High-Wattage IoT Botnets
Attackers that can compromise enough products such as smart ACs and heaters can tweak power demand in subtle ways for financial gain or to hurt market players, researchers at Black Hat say.