π Office 365 Can Now Open Attachments in a Sandbox π
π Read
via "Subscriber Blog RSS Feed ".
Microsoft has released a new feature update - Application Guard - that opens suspicious looking attachments in a sandbox to prevent malicious activity.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Office 365 Can Now Open Attachments in a Sandbox
Microsoft has released a new feature update - Application Guard - that opens suspicious looking attachments in a sandbox to prevent malicious activity.
ATENTIONβΌ New - CVE-2019-4692
π Read
via "National Vulnerability Database".
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 171829.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-4691
π Read
via "National Vulnerability Database".
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 171828.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-4689
π Read
via "National Vulnerability Database".
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 171826.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-4688
π Read
via "National Vulnerability Database".
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 171825.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-4686
π Read
via "National Vulnerability Database".
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 171822.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-1501
π Read
via "National Vulnerability Database".
IBM Security Guardium 10.5, 10.6, and 11.0 could allow an unauthorized user to obtain sensitive information due to missing security controls. IBM X-Force ID: 141226.π Read
via "National Vulnerability Database".
π΄ US Warns of Ongoing BeagleBoyz Bank-Theft Operations π΄
π Read
via "Dark Reading: ".
The North Korean operatives have attempted to steal more than $2 billion since 2015 in a series of ongoing campaigns.π Read
via "Dark Reading: ".
Dark Reading
US Warns of Ongoing BeagleBoyz Bank-Theft Operations
The North Korean operatives have attempted to steal more than $2 billion since 2015 in a series of ongoing campaigns.
π How to install Malware Information Sharing Platform on Ubuntu Server 18.04 π
π Read
via "Security on TechRepublic".
If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.π Read
via "Security on TechRepublic".
TechRepublic
How to install Malware Information Sharing Platform on Ubuntu Server 18.04
If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.
π΄ 'Transparent Tribe' APT Group Deploys New Android Spyware for Cyber Espionage π΄
π Read
via "Dark Reading: ".
The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India.π Read
via "Dark Reading: ".
Dark Reading
'Transparent Tribe' APT Group Deploys New Android Spyware for Cyber Espionage
The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India.
π Local governments continue to be the biggest target for ransomware attacks π
π Read
via "Security on TechRepublic".
Small municipalities suffer the majority of ransomware, but they aren't the only ones suffering as ransoms rise and payouts become more common.π Read
via "Security on TechRepublic".
TechRepublic
Local governments continue to be the biggest target for ransomware attacks
Small municipalities suffer the majority of ransomware, but they aren't the only ones suffering as ransoms rise and payouts become more common.
β Revamped Qbot Trojan Packs New Punch: Hijacks Email Threads β
π Read
via "Threatpost".
New version of trojan is spreading fast and already has claimed 100,000 victims globally, Check Point has discovered.π Read
via "Threatpost".
Threat Post
Revamped Qbot Trojan Packs New Punch: Hijacks Email Threads
New version of trojan is spreading fast and already has claimed 100,000 victims globally, Check Point has discovered.
β Malicious Attachments Remain a Cybercriminal Threat Vector Favorite β
π Read
via "Threatpost".
Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.π Read
via "Threatpost".
Threat Post
Malicious Attachments Remain a Cybercriminal Threat Vector Favorite
Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.
π What a year of penetration testing data can reveal about the state of cybersecurity π
π Read
via "Security on TechRepublic".
From web app flaws to a lack of 2FA, Rapid7 found lots of common soft targets in the networks it breached on behalf of clients.π Read
via "Security on TechRepublic".
TechRepublic
What a year of penetration testing data can reveal about the state of cybersecurity
From web app flaws to a lack of 2FA, Rapid7 found lots of common soft targets in the networks it breached on behalf of clients.
β Russian cybercrime suspect arrested in $1m ransomware conspiracy β
π Read
via "Naked Security".
When ransomware hits, there are always 3 questions. How much? Did they pay? And the big one: How did the crooks get in?π Read
via "Naked Security".
Naked Security
Russian cybercrime suspect arrested in $1m ransomware conspiracy
When ransomware hits, there are always 3 questions. How much? Did they pay? And the big one: How did the crooks get in?
β Magecartβs Success Paves Way For Cybercriminal Credit Card βSnifferβ Market β
π Read
via "Threatpost".
Magecart's successes have led to threat actors actively advertising 'sniffers' that can be injected into e-commerce websites in order to exfiltrate payment cards.π Read
via "Threatpost".
Threat Post
Magecartβs Success Paves Way For Cybercriminal Credit Card βSnifferβ Market
Magecart's successes have led to threat actors actively advertising 'sniffers' that can be injected into e-commerce websites in order to exfiltrate payment cards.
π΄ How CISOs Can Play a New Role in Defining the Future of Work π΄
π Read
via "Dark Reading: ".
Rather than just reacting to security issues in the COVID-19 era, CISOs are now in a position to be change agents alongside their C-suite peers.π Read
via "Dark Reading: ".
Dark Reading
How CISOs Can Play a New Role in Defining the Future of Work
Rather than just reacting to security issues in the COVID-19 era, CISOs are now in a position to be change agents alongside their C-suite peers.
π Qbot trojan hijacking email threads to carry out phishing campaigns π
π Read
via "Security on TechRepublic".
The latest variant of this trojan extracts email threads from Outlook, which it uses for phishing attacks, says Check Point Research.π Read
via "Security on TechRepublic".
TechRepublic
Qbot trojan hijacking email threads to carry out phishing campaigns
The latest variant of this trojan extracts email threads from Outlook, which it uses for phishing attacks, says Check Point Research.
π I2P 0.9.47 π
π Go!
via "Security Tool Files β Packet Storm".
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
I2P 0.9.47 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π GNU Privacy Guard 2.2.22 π
π Go!
via "Security Tool Files β Packet Storm".
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
GNU Privacy Guard 2.2.22 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers