ATENTIONβΌ New - CVE-2017-8999
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-8998
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.π Read
via "National Vulnerability Database".
β Cyberattacks Hit Thousands of Canadian Tax, Benefit Accounts β
π Read
via "Threatpost".
The Canada Revenue Agency (CRA) suspended online services after accounts were hit in a third wave of credential stuffing attacks this weekend - giving bad actors access to various government services.π Read
via "Threatpost".
Threat Post
Cyberattacks Hit Thousands of Canadian Tax, Benefit Accounts
The Canada Revenue Agency (CRA) suspended online services after accounts were hit in a third wave of credential stuffing attacks this weekend - giving bad actors access to various government services.
π AI-enabled future crimes ranked: Deepfakes, spearphishing, and more π
π Read
via "Security on TechRepublic".
A study explores the possible range and risk of attacks from military robots and autonomous attack drones to AI-assisted stalking. Here are the top 5.π Read
via "Security on TechRepublic".
TechRepublic
AI-enabled future crimes ranked: Deepfakes, spearphishing, and more
A study explores the possible range and risk of attacks from military robots and autonomous attack drones to AI-assisted stalking. Here are the top 5.
π How one attack campaign steals and sells RDP credentials π
π Read
via "Security on TechRepublic".
A hacker known as TrueFighter has been actively selling compromised Remote Desktop Protocol accounts on the Dark Web, says Nuspire.π Read
via "Security on TechRepublic".
TechRepublic
How one attack campaign steals and sells RDP credentials
A hacker known as TrueFighter has been actively selling compromised Remote Desktop Protocol accounts on the Dark Web, says Nuspire.
ATENTIONβΌ New - CVE-2017-8997
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-8996
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-8995
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-8986
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-6502
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-6499
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-6498
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.π Read
via "National Vulnerability Database".
β Jack Daniels, Ritz London Face Cyberattacks β
π Read
via "Threatpost".
The REvil ransomware and savvy phone scammers have exposed sensitive information.π Read
via "Threatpost".
Threat Post
Jack Daniels, Ritz London Face Cyberattacks
The REvil ransomware and savvy phone scammers have exposed sensitive information.
π΄ Should I Segment my IoT Devices Onto Their Own Networks? π΄
π Read
via "Dark Reading: ".
Understanding the criticality and importance of the device determines the level of segmentation.π Read
via "Dark Reading: ".
Dark Reading
Should I Segment My IoT Devices Onto Their Own Networks?
Understanding the criticality and importance of the device determines the level of segmentation.
π΄ REvil Ransomware Hits Jack Daniel's Manufacturer π΄
π Read
via "Dark Reading: ".
Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.π Read
via "Dark Reading: ".
Dark Reading
REvil Ransomware Hits Jack Daniel's Manufacturer
Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.
β βEmoCrashβ Exploit Stoppered Emotet For 6 Months β
π Read
via "Threatpost".
A researcher developed a killswitch exploiting a buffer overflow in Emotet - preventing the malware from infecting systems for six months.π Read
via "Threatpost".
Threat Post
βEmoCrashβ Exploit Stoppered Emotet For 6 Months
A researcher developed a killswitch exploiting a buffer overflow in Emotet - preventing the malware from infecting systems for six months.
π΄ Cybersecurity Companies Among Smaller Firms Hit with Brand Spoofing π΄
π Read
via "Dark Reading: ".
Researchers find smaller organizations, including some in the cybersecurity space, increasingly targeted with these impersonation attacks.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Companies Among Smaller Firms Hit with Brand Spoofing
Researchers find smaller organizations, including some in the cybersecurity space, increasingly targeted with these impersonation attacks.
π Top 5 decentralized platforms π
π Read
via "Security on TechRepublic".
Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 decentralized platforms
Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.
π Top 5 decentralized platforms π
π Read
via "Security on TechRepublic".
Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 decentralized platforms
Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.
π΄ Reported Breach Count for H1 2020 Lowest in Five Years π΄
π Read
via "Dark Reading: ".
While reported breach numbers are down, a handful of "mega" breaches resulted in more data records being exposed than ever before, analysis shows.π Read
via "Dark Reading: ".
Dark Reading
Reported Breach Count for H1 2020 Lowest in Five Years
While reported breach numbers are down, a handful of mega breaches resulted in more data records being exposed than ever before, analysis shows.
π΄ Advent Completes Forescout Purchase π΄
π Read
via "Dark Reading: ".
The purchase by a private equity fund was announced in February and completed today.π Read
via "Dark Reading: ".
Dark Reading
Advent Completes Forescout Purchase
The purchase by a private equity fund was announced in February and completed today.