π How to patch CentOS against BootHole π
π Read
via "Security on TechRepublic".
If you have CentOS servers in your data center, you'll want to make sure to patch them against BootHole. Jack Wallen shows you how.π Read
via "Security on TechRepublic".
TechRepublic
How to patch CentOS against BootHole
If you have CentOS servers in your data center, you'll want to make sure to patch them against BootHole. Jack Wallen shows you how.
π How to hide files from any file manager on the Linux desktop π
π Read
via "Security on TechRepublic".
Want to hide files and folders from your Linux desktop file manager? Jack Wallen shows you one handy method.π Read
via "Security on TechRepublic".
TechRepublic
How to hide files from any file manager on the Linux desktop
Want to hide files and folders from your Linux desktop file manager? Jack Wallen shows you one handy method.
π 22 cybersecurity courses for aspiring and in-demand IT security pros π
π Read
via "Security on TechRepublic".
If you want to land a high-paying cybersecurity job or ace an IT security certification exam, check out these online training courses, which cover GDPR, business continuity, ethical hacking, and more.π Read
via "Security on TechRepublic".
TechRepublic
22 cybersecurity courses for aspiring and in-demand IT security pros
If you want to land a high-paying cybersecurity job or ace an IT security certification exam, check out these online training courses, which cover GDPR, business continuity, ethical hacking, and more.
β Itβs No βGiggleβ: Managing Expectations for Vulnerability Disclosure β
π Read
via "Threatpost".
Vulnerability-disclosure policies (VDPs), if done right, can help provide clarity and clear guidelines to both bug-hunters and vendors when it comes to going public with security flaws.π Read
via "Threatpost".
Threat Post
Itβs No βGiggleβ: Managing Expectations for Vulnerability Disclosure
Vulnerability-disclosure policies (VDPs), if done right, can help provide clarity and clear guidelines to both bug-hunters and vendors when it comes to going public with security flaws.
π΄ Ransomware Hits US District Court in Louisiana π΄
π Read
via "Dark Reading: ".
The ransomware attack has exposed internal documents from the court and knocked its website offline.π Read
via "Dark Reading: ".
Dark Reading
Ransomware Hits US District Court in Louisiana
The ransomware attack has exposed internal documents from the court and knocked its website offline.
π΄ APT Groups Set Sights on Linux Targets: Inside the Trend π΄
π Read
via "Dark Reading: ".
Researchers see more advanced attack groups creating tools and platforms to target Linux-based devices.π Read
via "Dark Reading: ".
Dark Reading
APT Groups Set Sights on Linux Targets: Inside the Trend
Researchers see more advanced attack groups creating tools and platforms to target Linux-based devices.
π΄ 3 Secure Moments: A Tranquil Trio of Security Haiku π΄
π Read
via "Dark Reading: ".
Placid poems to quiet the infosec pro's harried mind. (Or placid, by infosec standards.)π Read
via "Dark Reading: ".
Dark Reading
3 Secure Moments: A Tranquil Trio of Security Haiku
Placid poems to quiet the infosec pros harried mind. (Or placid, by infosec standards.)
ATENTIONβΌ New - CVE-2014-10401
π Read
via "National Vulnerability Database".
An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-7491
π Read
via "National Vulnerability Database".
An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-7490
π Read
via "National Vulnerability Database".
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.π Read
via "National Vulnerability Database".
β Office 365 Phishing Attack Leverages Real-Time Active Directory Validation β
π Read
via "Threatpost".
Attackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.π Read
via "Threatpost".
Threat Post
Office 365 Phishing Attack Leverages Real-Time Active Directory Validation
Attackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.
β APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins β
π Read
via "Threatpost".
The Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations.π Read
via "Threatpost".
Threat Post
APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins
The Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations.
β Naked Security Live β βShould you worry about your wallpaper?β β
π Read
via "Naked Security".
Naked Security Live - here's the recorded version of our latest video. Enjoy.π Read
via "Naked Security".
Naked Security
Naked Security Live β βShould you worry about your wallpaper?β
Naked Security Live β hereβs the recorded version of our latest video. Enjoy.
π΄ More Printers Could Mean Security Problems for Home-Bound Workers π΄
π Read
via "Dark Reading: ".
Tricked-out home offices have led to an influx in printers, many of which have not been set up securely, leaving workers and their companies vulnerable.π Read
via "Dark Reading: ".
Dark Reading
More Printers Could Mean Security Problems for Home-Bound Workers
Tricked-out home offices have led to an influx in printers, many of which have not been set up securely, leaving workers and their companies vulnerable.
π΄ Open Source Security's Top Threat and What To Do About It π΄
π Read
via "Dark Reading: ".
With open source developers regularly churning out new tools, the risk landscape has become too fragmented to properly monitor.π Read
via "Dark Reading: ".
Dark Reading
Open Source Security's Top Threat and What To Do About It
With open source developers regularly churning out new tools, the risk landscape has become too fragmented to properly monitor.
π How to restrict Nextcloud logins to IP addresses π
π Read
via "Security on TechRepublic".
If you want to lock down your Nextcloud instance so only certain computers can log in, follow these steps.π Read
via "Security on TechRepublic".
TechRepublic
How to restrict Nextcloud logins to IP addresses
If you want to lock down your Nextcloud instance so only certain computers can log in, follow these steps.
π How to install Infection Monkey for breach and attack simulations on your network π
π Read
via "Security on TechRepublic".
Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.π Read
via "Security on TechRepublic".
TechRepublic
How to install Infection Monkey for breach and attack simulations on your network
Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.
π Clam AntiVirus Toolkit 0.103.0 π
π Go!
via "Security Tool Files β Packet Storm".
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Clam AntiVirus Toolkit 0.103.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Magecart Attack Impacts More Than 10K Online Shoppers β
π Read
via "Threatpost".
Close to 2,000 e-commerce sites were infected over the weekend with a payment-card skimmer, maybe the result of a zero-day exploit.π Read
via "Threatpost".
Threat Post
Magecart Attack Impacts More Than 10K Online Shoppers
Close to 2,000 e-commerce sites were infected over the weekend with a payment-card skimmer, maybe the result of a zero-day exploit.
π΄ Virginia's Largest School System Hit With Ransomware π΄
π Read
via "Dark Reading: ".
Fairfax County Public Schools has launched an investigation following a ransomware attack on some of its technology systems.π Read
via "Dark Reading: ".
Dark Reading
Virginia's Largest School System Hit With Ransomware
Fairfax County Public Schools has launched an investigation following a ransomware attack on some of its technology systems.
ATENTIONβΌ New - CVE-2018-20432
π Read
via "National Vulnerability Database".
D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.π Read
via "National Vulnerability Database".