๐ Weak and infrequent cyber-crisis training is leaving companies vulnerable, new research says ๐
๐ Read
via "Security on TechRepublic".
Companies are too reliant on dated software, the most essential-to-crises staff aren't required attendance at cybersecurity training, and the pandemic exacerbated problems, according to a new report.๐ Read
via "Security on TechRepublic".
TechRepublic
Weak and infrequent cyber-crisis training is leaving companies vulnerable, new research says
Companies are too reliant on dated software, the most essential-to-crises staff aren't required attendance at cybersecurity training, and the pandemic exacerbated problems, according to a new report.
๐ US and UK workers still logging 2 extra hours every day, according to VPN data ๐
๐ Read
via "Security on TechRepublic".
People in Europe and Canada have gone back to the hours they were working before the coronavirus shutdown.๐ Read
via "Security on TechRepublic".
TechRepublic
US and UK workers still logging 2 extra hours every day, according to VPN data
People in Europe and Canada have gone back to the hours they were working before the coronavirus shutdown.
๐ Wireshark Analyzer 3.2.6 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Wireshark Analyzer 3.2.6 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
๐ด Secure Development Takes a (Remote) Village ๐ด
๐ Read
via "Dark Reading: ".
The shift to work from home isn't just about giving your Dev team the physical tools they need.๐ Read
via "Dark Reading: ".
Dark Reading
Secure Development Takes a (Remote) Village
The shift to work from home isn't just about giving your Dev team the physical tools they need.
ATENTIONโผ New - CVE-2020-0261
๐ Read
via "National Vulnerability Database".
In C2 flame devices, there is a possible bypass of seccomp due to a missing configuration file. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-146059841๐ Read
via "National Vulnerability Database".
๐ด Boeing's DEF CON Debut a Sign of the Times ๐ด
๐ Read
via "Dark Reading: ".
In the wake of a stalemate between the airplane manufacturer and a security researcher over vulns found in its 787 aircraft's network, Boeing says it's ready to "embrace" the hacker community.๐ Read
via "Dark Reading: ".
Dark Reading
Boeing's DEF CON Debut a Sign of the Times
In the wake of a stalemate between the airplane manufacturer and a security researcher over vulns found in its 787 aircraft's network, Boeing says it's ready to embrace the hacker community.
๐ด The Race to Hack a Satellite at DEF CON ๐ด
๐ Read
via "Dark Reading: ".
Eight teams competed to win cash, bragging rights, and the chance to control a satellite in space.๐ Read
via "Dark Reading: ".
Dark Reading
The Race to Hack a Satellite at DEF CON
Eight teams competed to win cash, bragging rights, and the chance to control a satellite in space.
๐ Zero trust is critical, but very underused ๐
๐ Read
via "Security on TechRepublic".
Organizations must quickly adopt the zero trust mindset of "never trust, always verify" to mitigate the spread of breaches, limit access, and prevent lateral movement, according to an Illumio report.๐ Read
via "Security on TechRepublic".
TechRepublic
Zero trust is critical, but very underused
Organizations must quickly adopt the zero trust mindset of "never trust, always verify" to mitigate the spread of breaches, limit access, and prevent lateral movement, according to an Illumio report.
๐ด RedCurl APT Group Hacks Global Companies for Corporate Espionage ๐ด
๐ Read
via "Dark Reading: ".
Researchers analyze a presumably Russian-speaking APT group that has been stealing corporate data since 2018.๐ Read
via "Dark Reading: ".
Dark Reading
RedCurl APT Group Hacks Global Companies for Corporate Espionage
Researchers analyze a presumably Russian-speaking APT group that has been stealing corporate data since 2018.
๐ New Phishing Campaign Targets SBA COVID-19 Loan Relief Accounts ๐
๐ Read
via "Subscriber Blog RSS Feed ".
Scams targeting small businesses are unfortunately commonplace these days. The latest attempts to phish business owners' SBA loan relief logins.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New Phishing Campaign Targets SBA COVID-19 Loan Relief Accounts
Scams targeting small businesses are unfortunately commonplace these days. The latest attempts to phish business owners' SBA loan relief logins.
โ CactusPete APT Hones Toolset, Resurfaces with New Espionage Targets โ
๐ Read
via "Threatpost".
The APT is becoming more sophisticated over time.๐ Read
via "Threatpost".
Threat Post
CactusPete APT Hones Toolset, Resurfaces with New Espionage Targets
The APT is becoming more sophisticated over time.
๐ด Business Email Compromise Attacks Involving MFA Bypass Increase ๐ด
๐ Read
via "Dark Reading: ".
Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.๐ Read
via "Dark Reading: ".
Dark Reading
Business Email Compromise Attacks Involving MFA Bypass Increase
Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.
โ NSA, FBI Warn of Linux Malware Used in Espionage Attacks โ
๐ Read
via "Threatpost".
A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.๐ Read
via "Threatpost".
Threat Post
NSA, FBI Warn of Linux Malware Used in Espionage Attacks
A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.
๐ด Healthcare Industry Sees Respite From Attacks in First Half of 2020 ๐ด
๐ Read
via "Dark Reading: ".
Breach disclosures are down, and reported ransomware attacks have also plummeted. Good news -- or a calm before the storm?๐ Read
via "Dark Reading: ".
Dark Reading
Healthcare Industry Sees Respite From Attacks in First Half of 2020
Breach disclosures are down, and reported ransomware attacks have also plummeted. Good news -- or a calm before the storm?
๐ด CISA Warns of Phishing Campaign with Loan-Relief Lure ๐ด
๐ Read
via "Dark Reading: ".
Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.๐ Read
via "Dark Reading: ".
Dark Reading
CISA Warns of Phishing Campaign with Loan-Relief Lure
Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.
Forwarded from ๐ก Cybersecurity & Privacy ๐ก - News
โโ========================
๐ Look look!
These channels ๐จ are amazing!
========================
๐ Look look!
These channels ๐จ are amazing!
========================
ATENTIONโผ New - CVE-2019-20383
๐ Read
via "National Vulnerability Database".
ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.๐ Read
via "National Vulnerability Database".
โ Instagram Retained Deleted User Data Despite GDPR Rules โ
๐ Read
via "Threatpost".
The photo-sharing app retained peopleโs photos and private direct messages on its servers even after users removed them.๐ Read
via "Threatpost".
Threat Post
Instagram Retained Deleted User Data Despite GDPR Rules
The photo-sharing app retained peopleโs photos and private direct messages on its servers even after users removed them.
๐ด WFH Summer 2020 Caption Contest Winners ๐ด
๐ Read
via "Dark Reading: ".
Clever wordplay on sandcastles, sandboxes, zero trust. and granular controls. And the winners are ...๐ Read
via "Dark Reading: ".
Dark Reading
WFH Summer 2020 Caption Contest Winners
Clever wordplay on sandcastles, sandboxes, zero trust. and granular controls. And the winners are ...
๐ด 7 Ways to Keep Your Remote Workforce Safe ๐ด
๐ Read
via "Dark Reading: ".
These tips will help you chart a course for a security strategy that just may become part of the normal way organizations will function over the next several years.๐ Read
via "Dark Reading: ".
Dark Reading
7 Ways to Keep Your Remote Workforce Safe
These tips will help you chart a course for a security strategy that just may become part of the normal way organizations will function over the next several years.
๐ How cybercriminals are exploiting US unemployment benefits to make money ๐
๐ Read
via "Security on TechRepublic".
Scammers use Social Security numbers and other data to create synthetic IDs to collect unemployment benefits, says IntSights.๐ Read
via "Security on TechRepublic".
TechRepublic
How cybercriminals are exploiting US unemployment benefits to make money
Scammers use Social Security numbers and other data to create synthetic IDs to collect unemployment benefits, says IntSights.