๐ Friday Five 8/28 ๐
๐ Read
via "Subscriber Blog RSS Feed ".
Ransomware going corporate, Cyber Command changing to a more proactive approach, and cybersecurity professionals weighing in on election security - catch up on all the week's news with the Friday Five.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five 8/28
Ransomware going corporate, Cyber Command changing to a more proactive approach, and cybersecurity professionals weighing in on election security - catch up on all the week's news with the Friday Five.
๐ด Ransomware Red Flags: 7 Signs You're About to Get Hit ๐ด
๐ Read
via "Dark Reading: ".
Caught off guard by a ransomware attack? Security experts say the warning signs were there all along.๐ Read
via "Dark Reading: ".
Dark Reading
Ransomware Red Flags: 7 Signs You're About to Get Hit
Caught off guard by a ransomware attack? Security experts say the warning signs were there all along.
โ Elon Musk Confirms, Tesla Factory a Target of Foiled Cyberattack โ
๐ Read
via "Threatpost".
A Tesla employee was reportedly approached by a Russian national and asked to install malware on the company's systems.๐ Read
via "Threatpost".
Threat Post
Elon Musk Confirms, Tesla Factory a Target of Foiled Cyberattack
A Tesla employee was reportedly approached by a Russian national and asked to install malware on the company's systems.
ATENTIONโผ New - CVE-2019-4579
๐ Read
via "National Vulnerability Database".
IBM Resilient SOAR 38 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 167236.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2019-4533
๐ Read
via "National Vulnerability Database".
IBM Resilient SOAR V38.0 users may experience a denial of service of the SOAR Platform due to a insufficient input validation. IBM X-Force ID: 165589.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2019-19499
๐ Read
via "National Vulnerability Database".
Grafana <= 6.4.3 has an Arbitrary File Read vulnerability, which could be exploited by an authenticated attacker that has privileges to modify the data source configurations.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2019-18392
๐ Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.๐ Read
via "National Vulnerability Database".
๐ด TA542 Returns With Emotet: What's Different Now ๐ด
๐ Read
via "Dark Reading: ".
Researchers report the TA542 threat group has made code changes to its malware and started targeting new locations with Emotet.๐ Read
via "Dark Reading: ".
Dark Reading
TA542 Returns With Emotet: What's Different Now
Researchers report the TA542 threat group has made code changes to its malware and started targeting new locations with Emotet.
๐ด Aruba Enhances Its Edge Services Platform ๐ด
๐ Read
via "Dark Reading: ".
Enhancements unify IoT, IT, and OT networks so customers to help customers adapt to changing environments and user requirements.๐ Read
via "Dark Reading: ".
Dark Reading
Aruba Enhances Its Edge Services Platform
Enhancements unify IoT, IT, and OT networks so customers to help customers adapt to changing environments and user requirements.
๐ด DNC Warns Campaign Staffers of Dating App Dangers ๐ด
๐ Read
via "Dark Reading: ".
The Democratic National Committee advises against sharing too much work and personal information on popular dating apps.๐ Read
via "Dark Reading: ".
Dark Reading
DNC Warns Campaign Staffers of Dating App Dangers
The Democratic National Committee advises against sharing too much work and personal information on popular dating apps.
โ Instagram โHelp Centerโ Phishing Scam Pilfers Credentials โ
๐ Read
via "Threatpost".
Researchers warn that a phishing scam is targeting Instagram users via direct messages on the app.๐ Read
via "Threatpost".
Threat Post
Instagram โHelp Centerโ Phishing Scam Pilfers Credentials
Researchers warn that a phishing scam is targeting Instagram users via direct messages on the app.
๐ด Data Privacy Concerns, Lack of Trust Foil Automated Contact Tracing ๐ด
๐ Read
via "Dark Reading: ".
Efforts to create a technology framework for alerting people to whether they have been exposed to an infectious disease have been hindered by a number of key issues.๐ Read
via "Dark Reading: ".
Dark Reading
Data Privacy Concerns, Lack of Trust Foil Automated Contact Tracing
Efforts to create a technology framework for alerting people to whether they have been exposed to an infectious disease have been hindered by a number of key issues.
Forwarded from ๐ก Cybersecurity & Privacy ๐ก - News
โโ========================
๐ Look look!
These channels ๐จ are amazing!
========================
๐ Look look!
These channels ๐จ are amazing!
========================
โ Monday review โ catch up on our latest articles and videos โ
๐ Read
via "Naked Security".
Our recent articles and videos, all in one place.๐ Read
via "Naked Security".
Naked Security
Monday review โ catch up on our latest articles and videos
Our recent articles and videos, all in one place.
๐ด From Defense to Offense: Giving CISOs Their Due ๐ด
๐ Read
via "Dark Reading: ".
In today's unparalleled era of disruption, forward-thinking CISOs can become key to company transformation -- but this means resetting relationships with the board and C-suite.๐ Read
via "Dark Reading: ".
Dark Reading
From Defense to Offense: Giving CISOs Their Due
In today's unparalleled era of disruption, forward-thinking CISOs can become key to company transformation -- but this means resetting relationships with the board and C-suite.
๐ Sifter 9.8 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
Sifter 9.8 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
โ Critical Slack Bug Allows Access to Private Channels, Conversations โ
๐ Read
via "Threatpost".
The RCE bug affects versions below 4.4 of the Slack desktop app.๐ Read
via "Threatpost".
Threat Post
Critical Slack Bug Allows Access to Private Channels, Conversations
The RCE bug affects versions below 4.4 of the Slack desktop app.
โ Stolen Fortnite Accounts Earn Hackers Millions Per Year โ
๐ Read
via "Threatpost".
More than 2 billion breached Fortnite accounts have gone up for sale in underground forums so far in 2020 alone.๐ Read
via "Threatpost".
Threat Post
Stolen Fortnite Accounts Earn Hackers Millions Per Year
More than 2 billion breached Fortnite accounts have gone up for sale in underground forums so far in 2020 alone.
๐ด UVA Researcher Charged with Computer Intrusion & Trade Secret Theft ๐ด
๐ Read
via "Dark Reading: ".
Chinese national Haizhou Hu was researching bio-mimics and fluid dynamics at the University of Virginia.๐ Read
via "Dark Reading: ".
Dark Reading
UVA Researcher Charged with Computer Intrusion & Trade Secret Theft
Chinese national Haizhou Hu was researching bio-mimics and fluid dynamics at the University of Virginia.
ATENTIONโผ New - CVE-2020-12644
๐ Read
via "National Vulnerability Database".
OX App Suite 7.10.3 and earlier allows SSRF, related to the mail account API and the /folder/list API.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2020-12643
๐ Read
via "National Vulnerability Database".
OX App Suite 7.10.3 and earlier has Incorrect Access Control via an /api/subscriptions request for a snippet containing an email address.๐ Read
via "National Vulnerability Database".