β The TikTok Ban: Security Experts Weigh in on the Appβs Risks β
π Read
via "Threatpost".
With no hard evidence of abuse, are bans warranted? The real security concerns will likely come after the ban goes into effect, researchers said in our exclusive roundtable.π Read
via "Threatpost".
Threat Post
UPDATE β TikTok Ban: Security Experts Weigh in on the Appβs Risks
With no hard evidence of abuse, are bans warranted? The real security concerns will likely come after the ban goes into effect, researchers said in our exclusive roundtable.
β Naked Security Live β βThe Zerologon hole: are you at risk?β β
π Read
via "Naked Security".
Naked Security Live - here's the recorded version of our latest video. Enjoy.π Read
via "Naked Security".
Naked Security
Naked Security Live β βThe Zerologon hole: are you at risk?β
Naked Security Live β hereβs the recorded version of our latest video. Enjoy.
π Windows Server: Patch this critical flaw now says Homeland Security in emergency warning π
π Read
via "Security on TechRepublic".
Government agencies in the US have until today to patch a Windows Server vulnerability that could give hackers control over federal networks.π Read
via "Security on TechRepublic".
TechRepublic
Patch this critical software flaw now, says Homeland Security in emergency warning
Government agencies in the US have until today to patch a Windows Server vulnerability that could give hackers control over federal networks.
π΄ Hacking Yourself: Marie Moe and Pacemaker Security π΄
π Read
via "Dark Reading: ".
Future consumer devices, including pacemakers, should be built with security from the start.π Read
via "Dark Reading: ".
Dark Reading
Hacking Yourself: Marie Moe and Pacemaker Security
Future consumer devices, including pacemakers, should be built with security from the start.
π΄ 5 Steps to Greater Cyber Resiliency π΄
π Read
via "Dark Reading: ".
Work from home isn't going away anytime soon, and the increased vulnerability means cyber resiliency will continue to be critical to business resiliency.π Read
via "Dark Reading: ".
Dark Reading
5 Steps to Greater Cyber Resiliency
Work from home isn't going away anytime soon, and the increased vulnerability means cyber resiliency will continue to be critical to business resiliency.
π΄ Patch by Tonight: CISA Issues Emergency Directive for Critical Netlogon Flaw π΄
π Read
via "Dark Reading: ".
The directive requires all federal agencies to apply a patch for Windows Netlogon vulnerability CVE-2020-1472 by midnight on Sept. 21.π Read
via "Dark Reading: ".
Dark Reading
Patch by Tonight: CISA Issues Emergency Directive for Critical Netlogon Flaw
The directive requires all federal agencies to apply a patch for Windows Netlogon vulnerability CVE-2020-1472 by midnight on Sept. 21.
β Android Malware Bypasses 2FA And Targets Telegram, Gmail Passwords β
π Read
via "Threatpost".
A new Android malware strain has been uncovered, part of the Rampant Kitten threat group's widespread surveillance campaign that targets Telegram credentials and more.π Read
via "Threatpost".
Threat Post
Android Malware Bypasses 2FA And Targets Telegram, Gmail Passwords
A new Android malware strain has been uncovered, part of the Rampant Kitten threat group's widespread surveillance campaign that targets Telegram credentials and more.
β Firefox for Android Bug Allows βEpic Rick-Rollingβ β
π Read
via "Threatpost".
Anyone on the same Wi-Fi network can force websites to launch, with no user interaction.π Read
via "Threatpost".
Threat Post
Firefox for Android Bug Allows βEpic Rick-Rollingβ
Anyone on the same Wi-Fi network can force websites to launch, with no user interaction.
π΄ Defending Against Deepfakes: From Tells to Crypto π΄
π Read
via "Dark Reading: ".
Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.π Read
via "Dark Reading: ".
Dark Reading
Defending Against Deepfakes: From Tells to Crypto
Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.
π Mozilla's VPN service works across mobile and desktop platforms π
π Read
via "Security on TechRepublic".
Mozilla now offers a VPN service that protects Windows and mobile devices, and soon your Linux and macOS desktops. Jack Wallen shows you how to use the new offering.π Read
via "Security on TechRepublic".
TechRepublic
Mozilla's VPN service works across mobile and desktop platforms
Mozilla now offers a VPN service that protects Windows and mobile devices, and soon your Linux and macOS desktops. Jack Wallen shows you how to use the new offering.
π CISA Asks Federal Agencies to Patch Zerologon Vulnerability ASAP π
π Read
via "Subscriber Blog RSS Feed ".
In a rare emergency directive, CISA asked all federal agencies to immediately deploy last month's Windows Security Update to remediate a critical vulnerability in Netlogon.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
CISA Asks Federal Agencies to Patch 'Zerologon' Vulnerability ASAP
In a rare emergency directive, CISA asked all federal agencies to immediately deploy last month's Windows Security Update to remediate a critical vulnerability in Netlogon.
β DHS Issues Dire Patch Warning for βZerologonβ β
π Read
via "Threatpost".
The deadline looms for U.S. Cybersecurity and Infrastructure Security Agencyβs emergency directive for federal agencies to patch against the so-called βZerologonβ vulnerability.π Read
via "Threatpost".
Threat Post
DHS Issues Dire Patch Warning for βZerologonβ
The deadline looms for U.S. Cybersecurity and Infrastructure Security Agencyβs emergency directive for federal agencies to patch against the so-called βZerologonβ vulnerability.
β Unsecured Microsoft Bing Server Leaks Search Queries, Location Data β
π Read
via "Threatpost".
Data exposed included search terms, location coordinates, and device information - but no personal data.π Read
via "Threatpost".
Threat Post
Unsecured Microsoft Bing Server Leaks Search Queries, Location Data
Data exposed included search terms, location coordinates, and device information - but no personal data.
π΄ 'Dark Overlord' Cyber Extortionist Pleads Guilty π΄
π Read
via "Dark Reading: ".
Nathan Wyatt was sentenced to five years in prison after changing a previously not guilty plea.π Read
via "Dark Reading: ".
Dark Reading
'Dark Overlord' Cyber Extortionist Pleads Guilty
Nathan Wyatt was sentenced to five years in prison after changing a previously not guilty plea.
π΄ 'Dark Overlord' Cyber Extortionist Pleads Guilty π΄
π Read
via "Dark Reading: ".
Nathan Wyatt was sentenced to five years in prison after changing a previously not guilty plea.π Read
via "Dark Reading: ".
Dark Reading
'Dark Overlord' Cyber Extortionist Pleads Guilty
Nathan Wyatt was sentenced to five years in prison after changing a previously not guilty plea.
β Fileless Malware Tops Critical Endpoint Threats for 1H 2020 β
π Read
via "Threatpost".
When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics.π Read
via "Threatpost".
Threat Post
Fileless Malware Tops Critical Endpoint Threats for 1H 2020
When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics.
π΄ Remote Work Exacerbating Data Sprawl π΄
π Read
via "Dark Reading: ".
More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds.π Read
via "Dark Reading: ".
Dark Reading
Remote Work Exacerbating Data Sprawl
More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds.
π nfstream 6.1.3 π
π Go!
via "Security Tool Files β Packet Storm".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
nfstream 6.1.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Nearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of Work π΄
π Read
via "Dark Reading: ".
New research shows how security skills are lacking across multiple IT disciplines as well - including network engineers, sys admins, and cloud developers.π Read
via "Dark Reading: ".
Dark Reading
Nearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of Work
New research shows how security skills are lacking across multiple IT disciplines as well - including network engineers, sys admins, and cloud developers.
π Tech jobs: These are the skills most in demand as companies change their priorities π
π Read
via "Security on TechRepublic".
Keeping the hackers out remains a top priority but firms are also looking at new areas of investment.π Read
via "Security on TechRepublic".
TechRepublic
Tech jobs: These are the skills most in demand as companies change their priorities
Keeping the hackers out remains a top priority but firms are also looking at new areas of investment.
π 75% of AppSec practitioners see a growing cultural divide between AppSec and developers π
π Read
via "Security on TechRepublic".
Thirty-nine percent of developers said the security team is responsible for securing apps, while 67% of AppSec practitioners said their teams are responsible, according to a new study.π Read
via "Security on TechRepublic".
TechRepublic
75% of AppSec practitioners see a growing cultural divide between AppSec and developers
Thirty-nine percent of developers said the security team is responsible for securing apps, while 67% of AppSec practitioners said their teams are responsible, according to a new study.