β Zerologon Patches Roll Out Beyond Microsoft β
π Read
via "Threatpost".
A Samba patch and a micropatch for end-of-life servers have debuted in the face of the critical vulnerability.π Read
via "Threatpost".
Threat Post
Zerologon Patches Roll Out Beyond Microsoft
A Samba patch and a micropatch for end-of-life servers have debuted in the face of the critical vulnerability.
π΄ Gaming Industry Hit With 10B+ Attacks In Past Two Years π΄
π Read
via "Dark Reading: ".
Criminals scored big with credential stuffing and web app attacks, yet many gamers seem unfazed.π Read
via "Dark Reading: ".
Dark Reading
Gaming Industry Hit With 10B+ Attacks In Past Two Years
Criminals scored big with credential stuffing and web app attacks, yet many gamers seem unfazed.
ATENTIONβΌ New - CVE-2015-4719
π Read
via "National Vulnerability Database".
The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request.π Read
via "National Vulnerability Database".
β iPhone 12 scam pretends to be Apple βchatbotβ β donβt fall for it! β
π Read
via "Naked Security".
If you got someone else's "free offer" in what looked like a misdirected message, would you take a peek?π Read
via "Naked Security".
Naked Security
SMS phishing scam pretends to be Apple βchatbotβ β donβt fall for it!
If you got someone elseβs βfree offerβ in what looked like a misdirected message, would you take a peek?
π Synack: Federal agencies and banks have made the most cybersecurity improvements π
π Read
via "Security on TechRepublic".
The overall Attacker Resistance Score for the IT sector dropped this year due in part to digital transformation work, according to the 2020 Trust Report.π Read
via "Security on TechRepublic".
TechRepublic
Synack: Federal agencies and banks have made the most cybersecurity improvements
The overall Attacker Resistance Score for the IT sector dropped this year due in part to digital transformation work, according to the 2020 Trust Report.
π΄ Since Remote Work Isn't Going Away, Security Should Be the Focus π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
Since Remote Work Isn't Going Away, Security Should Be the Focus
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
β Alien Android Banking Trojan Sidesteps 2FA β
π Read
via "Threatpost".
A new 'fork' of the Cerberus banking trojan, called Alien, targets victims' credentials from more than 200 mobile apps, including Bank of America and Microsoft Outlook.π Read
via "Threatpost".
Threat Post
Alien Android Banking Trojan Sidesteps 2FA
A new 'fork' of the Cerberus banking trojan, called Alien, targets victims' credentials from more than 200 mobile apps, including Bank of America and Microsoft Outlook.
π΄ Microsoft Warns of Attackers Now Exploiting 'Zerologon' Flaw π΄
π Read
via "Dark Reading: ".
The Security Intelligence team at Microsoft is tracking newly waged exploits in the wild.π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
π΄ CrowdStrike Agrees to Acquire Preemptive Security for $96M π΄
π Read
via "Dark Reading: ".
CrowdStrike plans to use Preemptive Security's conditional access technology to strengthen its Falcon platform.π Read
via "Dark Reading: ".
Dark Reading
CrowdStrike Agrees to Acquire Preemptive Security for $96M
CrowdStrike plans to use Preemptive Security's conditional access technology to strengthen its Falcon platform.
π How to install the Graylog system log manager on Ubuntu Server 20.04 π
π Read
via "Security on TechRepublic".
Combing through logs on numerous servers can be a chore. Learn how to simplify that with the Graylog monitoring server.π Read
via "Security on TechRepublic".
π΄ CrowdStrike Agrees to Acquire Preempt Security for $96M π΄
π Read
via "Dark Reading: ".
CrowdStrike plans to use Preempt Security's conditional access technology to strengthen its Falcon platform.π Read
via "Dark Reading: ".
Dark Reading
CrowdStrike Agrees to Acquire Preempt Security for $96M
CrowdStrike plans to use Preempt Security's conditional access technology to strengthen its Falcon platform.
β Free Apple iPhone 12? Chatbot Scam Spreads Via Texts β
π Read
via "Threatpost".
Convincing SMS messages tell victims that they've been selected for a pre-release trial for the soon-to-be-launched device.π Read
via "Threatpost".
Threat Post
Free Apple iPhone 12? Chatbot Scam Spreads Via Texts
Convincing SMS messages tell victims that they've been selected for a pre-release trial for the soon-to-be-launched device.
π SEC Looks to Tamp Down Credential Stuffing π
π Read
via "Subscriber Blog RSS Feed ".
The SEC's compliance arm is encouraging banks and financial institutions to remain vigilant in the face of an uptick in credential stuffing attacks.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
SEC Looks to Tamp Down Credential Stuffing
The SEC's compliance arm is encouraging banks and financial instutions to remain vigilant in the face of an uptick in credential stuffing attacks.
π Falco 0.26.0 π
π Go!
via "Security Tool Files β Packet Storm".
Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Falco 0.26.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Wireshark Analyzer 3.2.7 π
π Go!
via "Security Tool Files β Packet Storm".
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Wireshark Analyzer 3.2.7 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Critical Instagram Flaw Could Let Attackers Spy on Victims π΄
π Read
via "Dark Reading: ".
A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.π Read
via "Dark Reading: ".
Dark Reading
Critical Instagram Flaw Could Let Attackers Spy on Victims
A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.
β Cisco Patch-Palooza Tackles 29 High-Severity Bugs β
π Read
via "Threatpost".
Patches and workaround fixes address flaws on networking hardware running Cisco IOS XE software.π Read
via "Threatpost".
Threat Post
Cisco Patch-Palooza Tackles 29 High-Severity Bugs
Patches and workaround fixes address flaws on networking hardware running Cisco IOS XE software.
β Feds Hit with Successful Cyberattack, Data Stolen β
π Read
via "Threatpost".
The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit.π Read
via "Threatpost".
Threat Post
Feds Hit with Successful Cyberattack, Data Stolen
The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit.
π΄ Bluetooth Security Weaknesses Pile Up, While Patching Remains Problematic π΄
π Read
via "Dark Reading: ".
Turns out, creating wireless ecosystems for a vast number of different architectures, configurations, and use cases is hard.π Read
via "Dark Reading: ".
Dark Reading
Bluetooth Security Weaknesses Pile Up, While Patching Remains Problematic
Turns out, creating wireless ecosystems for a vast number of different architectures, configurations, and use cases is hard.
π΄ Malware Attacks Declined But Became More Evasive in Q2 π΄
π Read
via "Dark Reading: ".
Most of the malware used in attacks last quarter were designed to evade signature-based detection tools, WatchGuard says.π Read
via "Dark Reading: ".
Dark Reading
Malware Attacks Declined But Became More Evasive in Q2
Most of the malware used in attacks last quarter were designed to evade signature-based detection tools, WatchGuard says.