β IBM AI-Powered Data Management Software Subject to Simple Exploit β
π Read
via "Threatpost".
A low-privileged process on a vulnerable machine could allow data harvesting and DoS.π Read
via "Threatpost".
Threat Post
IBM AI-Powered Data Management Software Subject to Simple Exploit
A low-privileged process on a vulnerable machine could allow data harvesting and DoS.
β Cisco Critical Flaw Patched in WAN Software Solution β
π Read
via "Threatpost".
Cisco has issued a fix for a critical flaw in its Virtual Wide Area Application Services (vWAAS), software for optimizing WAN on virtual private cloud infrastructure.π Read
via "Threatpost".
Threat Post
Cisco Critical Flaw Patched in WAN Software Solution
Cisco has issued a fix for a critical flaw in its Virtual Wide Area Application Services (vWAAS), software for optimizing WAN on virtual private cloud infrastructure.
β Senate Bill Would Expand Facial-Recognition Restrictions Nationwide β
π Read
via "Threatpost".
The proposed law comes as police departments around the country for their use of facial recognition to identify allegedly violent Black Lives Matter protesters.π Read
via "Threatpost".
Threat Post
Senate Bill Would Expand Facial-Recognition Restrictions Nationwide
Law would require companies to obtain written consent for biometric data collection and allow people to sue firms that violate its terms
π΄ Banks and the New Abnormal π΄
π Read
via "Dark Reading: ".
Banks have hesitated to adopt many strong security practices, and for understandable reasons. But now is the time to be bold.π Read
via "Dark Reading: ".
Dark Reading
Banks and the New Abnormal
Banks have hesitated to adopt many strong security practices, and for understandable reasons. But now is the time to be bold.
π΄ Black Hat USA 2020 Recap: Experts Discuss Election Security Questions, but Offer Few Answers π΄
π Read
via "Dark Reading: ".
The U.S. election in November is once again expected to be a target of digital adversaries. Experts at Black Hat USA 2020 highlighted the many election security questions authorities must address.π Read
via "Dark Reading: ".
Dark Reading
Black Hat USA 2020 Recap: Experts Discuss Election Security Questions, but Offer Few Answers
The U.S. election in November is once again expected to be a target of digital adversaries. Experts at Black Hat USA 2020 highlighted the many election security questions authorities must address.
π Bank of America, Daimler, and Apple partnering with IBM for confidential computing services π
π Read
via "Security on TechRepublic".
A push to provide public cloud services with production-ready confidential computing capabilities able to protect data, applications, and processes.π Read
via "Security on TechRepublic".
TechRepublic
Bank of America, Daimler, and Apple partnering with IBM for confidential computing services
A push to provide public cloud services with production-ready confidential computing capabilities able to protect data, applications, and processes.
π How coronavirus-related telework is changing the enterprise, and how to respond π
π Read
via "Security on TechRepublic".
Security vendor Fortinet found several important similarities between how enterprises responded, and how they plan to adapt, to a future of remote work.π Read
via "Security on TechRepublic".
TechRepublic
How coronavirus-related telework is changing the enterprise, and how to respond
Security vendor Fortinet found several important similarities between how enterprises responded, and how they plan to adapt, to a future of remote work.
π How the shift to remote working has impacted cybersecurity π
π Read
via "Security on TechRepublic".
Cybercriminals have adapted by exploiting improperly secured VPNs, cloud-based services, and business email, says Malwarebytes.π Read
via "Security on TechRepublic".
TechRepublic
How the shift to remote working has impacted cybersecurity
Cybercriminals have adapted by exploiting improperly secured VPNs, cloud-based services, and business email, says Malwarebytes.
β Microsoft Out-of-Band Security Update Fixes Windows Remote Access Flaws β
π Read
via "Threatpost".
The unscheduled security update addresses two "important"-severity flaws in Windows 8.1 and Windows Server 2012.π Read
via "Threatpost".
Threat Post
Microsoft Out-of-Band Security Update Fixes Windows Remote Access Flaws
The unscheduled security update addresses two "important"-severity flaws in Windows 8.1 and Windows Server 2012.
β Transparent Tribe Mounts Ongoing Spy Campaign on Military, Government β
π Read
via "Threatpost".
The group has added a management console and a USB worming function to its main malware, Crimson RAT.π Read
via "Threatpost".
Threat Post
Transparent Tribe Mounts Ongoing Spy Campaign on Military, Government
The group has added a management console and a USB worming function to its main malware, Crimson RAT.
π΄ Black Hat USA 2020 Musings: Weird and Wonderful Virtual Events are Here to Stay π΄
π Read
via "Dark Reading: ".
Black Hat USA 2020 was nothing like an in-person event, but it was incredibly useful for all involved, providing even the most grizzled industry veterans with fresh perspectives.π Read
via "Dark Reading: ".
Dark Reading
Black Hat USA 2020 Musings: Weird and Wonderful Virtual Events are Here to Stay
Black Hat USA 2020 was nothing like an in-person event, but it was incredibly useful for all involved, providing even the most grizzled industry veterans with fresh perspectives.
π΄ MFA Mistakes: 6 Ways to Screw Up Multifactor Authentication π΄
π Read
via "Dark Reading: ".
Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know.π Read
via "Dark Reading: ".
Dark Reading
MFA Mistakes: 6 Ways to Screw Up Multifactor Authentication
Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know.
π΄ IBM Db2 Flaw Gives Attackers Read/Write Access to Shared Memory π΄
π Read
via "Dark Reading: ".
Researchers discover a lack of explicit memory protections around the shared memory used by the Db2 trace facility.π Read
via "Dark Reading: ".
Dark Reading
IBM Db2 Flaw Gives Attackers Read/Write Access to Shared Memory
Researchers discover a lack of explicit memory protections around the shared memory used by the Db2 trace facility.
π΄ Twitter Hack: The Spotlight that Insider Threats Need π΄
π Read
via "Dark Reading: ".
The high profile attack should spur serious board-level conversations around the importance of insider threat prevention.π Read
via "Dark Reading: ".
Dark Reading
Twitter Hack: The Spotlight that Insider Threats Need
The high profile attack should spur serious board-level conversations around the importance of insider threat prevention.
π University CISOs say zero trust is the best defense against the existential threat of phishing π
π Read
via "Security on TechRepublic".
Stanford has replaced logins and passwords with a digital key to improve endpoint security.π Read
via "Security on TechRepublic".
TechRepublic
University CISOs say zero trust is the best defense against the existential threat of phishing
Stanford has replaced logins and passwords with a digital key to improve endpoint security.
β IBM Settles Lawsuit Over Weather Channel App Data Privacy β
π Read
via "Threatpost".
The lawsuit alleged that the IBM-owned Weather Channel mobile app did not let users know it was selling their geolocation data.π Read
via "Threatpost".
Threat Post
IBM Settles Lawsuit Over Weather Channel App Data Privacy
The lawsuit alleged that the IBM-owned Weather Channel mobile app did not let users know it was selling their geolocation data.
π Electric Vehicle Manufacturers Spar Over Trade Secret Case π
π Read
via "Subscriber Blog RSS Feed ".
Two of the countryβs biggest electric vehicle manufacturers continue to dispute the particulars of a lawsuit involving poaching talent and stealing trade secrets.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Electric Vehicle Manufacturers Spar Over Trade Secret Case
Two of the countryβs biggest electric vehicle manufacturers continue to dispute the particulars of a lawsuit involving poaching talent and stealing trade secrets.
π CISOs should put ad fraud security on their radars π
π Read
via "Security on TechRepublic".
Digital advertising has vulnerabilities, and this type of cybercrime will cost businesses $100 million a day by 2023, but goes almost completely unnoticed, according to adtech company TrafficGuard.π Read
via "Security on TechRepublic".
TechRepublic
CISOs should put ad fraud security on their radars
Digital advertising has vulnerabilities, and this type of cybercrime will cost businesses $100 million a day by 2023, but goes almost completely unnoticed, according to adtech company TrafficGuard.
π΄ Former Uber CSO Charged in Hack Cover-up π΄
π Read
via "Dark Reading: ".
The charges stem from a 2016 attack in which 57 million records were breached.π Read
via "Dark Reading: ".
Dark Reading
Former Uber CSO Charged in Hack Cover-up
The charges stem from a 2016 attack in which 57 million records were breached.
π΄ Smart-Lock Hacks Point to Larger IoT Problems π΄
π Read
via "Dark Reading: ".
Two recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.π Read
via "Dark Reading: ".
Dark Reading
Smart-Lock Hacks Point to Larger IoT Problems
Two recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.
β Former Uber CSO Charged With Paying βHush Moneyβ in 2016 Breach Cover-Up β
π Read
via "Threatpost".
Joseph Sullivan allegedly paid off $100K to the hackers responsible for a 2016 data breach, which exposed PII of 57 million passengers and drivers.π Read
via "Threatpost".
Threat Post
Former Uber CSO Charged With Paying βHush Moneyβ in 2016 Breach Cover-Up
Joseph Sullivan allegedly paid off $100K to the hackers responsible for a 2016 data breach, which exposed PII of 57 million passengers and drivers.