π Ahead of Election, FBI, CISA Issue Warning on Disinformation Campaigns π
π Read
via "Digital Guardian".
The FBI and CISA have issued another warning about the 2020 election, asserting that foreign actors are spreading disinformation around hacked voter information.π Read
via "Digital Guardian".
Digital Guardian
Ahead of Election, FBI, CISA Issue Warning on Disinformation Campaigns
The FBI and CISA has issued another warning about the 2020 election, asserting that foreign actors will spread disinformation around hacked voter information.
π΄ Vulnerability in Wireless Router Chipsets Prompts Advisory π΄
π Read
via "Dark Reading".
Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek.π Read
via "Dark Reading".
Dark Reading
Vulnerability in Wireless Router Chipsets Prompts Advisory
Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek.
π¦Ώ FBI says hackers want to stoke doubt about the 2020 election π¦Ώ
π Read
via "Tech Republic".
In a PSA on Monday, the FBI and CISA warned about the potential for widespread disinformation campaigns in the run-up to November.π Read
via "Tech Republic".
TechRepublic
FBI says hackers want to stoke doubt about the 2020 election
In a PSA on Monday, the FBI and CISA warned about the potential for widespread disinformation campaigns in the run-up to November.
π΄ Securing Slack: 5 Tips for Safer Messaging, Collaboration π΄
π Read
via "Dark Reading".
Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack.π Read
via "Dark Reading".
Dark Reading
Securing Slack: 5 Tips for Safer Messaging, Collaboration
Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack.
π΄ New Campaign by China-Linked Group Targets US Orgs for First Time π΄
π Read
via "Dark Reading".
In a least one instance, the Palmerworm APT group was able to remain undetected on a compromised system for nearly six months, according to Symantec.π Read
via "Dark Reading".
Dark Reading
New Campaign by China-Linked Group Targets US Orgs for First Time
In a least one instance, the Palmerworm APT group was able to remain undetected on a compromised system for nearly six months, according to Symantec.
π΄ DDoS Attacks Soar in First Half of 2020 π΄
π Read
via "Dark Reading".
Shorter, faster, multivector attacks had a greater impact on victims.π Read
via "Dark Reading".
Dark Reading
DDoS Attacks Soar in First Half of 2020
Shorter, faster, multivector attacks had a greater impact on victims.
π΄ Microsoft: Ransomware & Nation-State Attacks Rise, Get More Sophisticated π΄
π Read
via "Dark Reading".
Malware-based attacks are out, phishing is in, along with credential stuffing and business email compromise. Microsoft recommends defensive tactics in its new report on rising threats.π Read
via "Dark Reading".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Why Web Browser Padlocks Shouldnβt Be Trusted β
π Read
via "Threat Post".
Popular βsafe browsingβ padlocks are now passe as a majority of bad guys also use them.π Read
via "Threat Post".
Threat Post
Why Web Browser Padlocks Shouldnβt Be Trusted
Popular βsafe browsingβ padlocks are now passe as a majority of bad guys also use them.
βΌ CVE-2020-5132 βΌ
π Read
via "National Vulnerability Database".
SonicWall SSL-VPN products and SonicWall firewall SSL-VPN feature misconfiguration leads to possible DNS flaw known as domain name collision vulnerability. When the users publicly display their organizationΓΒ’Γ’β¬ÒβΒ’s internal domain names in the SSL-VPN authentication page, an attacker with knowledge of internal domain names can potentially take advantage of this vulnerability.π Read
via "National Vulnerability Database".
π΄ Attacker Dwell Time: Ransomware's Most Important Metric π΄
π Read
via "Dark Reading".
How to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your networkπ Read
via "Dark Reading".
Dark Reading
Attacker Dwell Time: Ransomware's Most Important Metric
How to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your network.
β Microsoft Exchange Servers Still Open to Actively Exploited Flaw β
π Read
via "Threat Post".
Despite Microsoft issuing patches almost eight months ago, 61 percent of Exchange servers are still vulnerable.π Read
via "Threat Post".
Threat Post
Microsoft Exchange Servers Still Open to Actively Exploited Flaw
Despite Microsoft issuing patches almost eight months ago, 61 percent of Exchange servers are still vulnerable.
βΌ CVE-2020-15731 βΌ
π Read
via "National Vulnerability Database".
An improper Input Validation vulnerability in the code handling file renaming and recovery in Bitdefender Engines allows an attacker to write an arbitrary file in a location hardcoded in a specially-crafted malicious file name. This issue affects: Bitdefender Engines versions prior to 7.85448.π Read
via "National Vulnerability Database".
βΌ CVE-2019-17098 βΌ
π Read
via "National Vulnerability Database".
Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an attacker to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v10.11.0 and prior versions on Android. August Connect Firmware version 2.2.12 and prior versions.π Read
via "National Vulnerability Database".
π¦Ώ The state of security and the evolving role of CISOs in a pandemic π¦Ώ
π Read
via "Tech Republic".
Cybersecurity leaders discuss business resiliency and identity challenges during a session at VMworld 2020.π Read
via "Tech Republic".
TechRepublic
The state of security and the evolving role of CISOs in a pandemic
Cybersecurity leaders discuss business resiliency and identity challenges during a session at VMworld 2020.
β Facebook Small Business Grants Spark Identity-Theft Scam β
π Read
via "Threat Post".
The cybercrooks spread the COVID-19 relief scam via Telegram and WhatsApp, and ultimately harvest account credentials and even pics of IDs.π Read
via "Threat Post".
Threat Post
Facebook Small Business Grants Spark Identity-Theft Scam
The cybercrooks spread the COVID-19 relief scam via Telegram and WhatsApp, and ultimately harvest account credentials and even pics of IDs.
βΌ CVE-2020-4629 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local user with specialized access to obtain sensitive information from a detailed technical error message. This information could be used in further attacks against the system. IBM X-Force ID: 185370.π Read
via "National Vulnerability Database".
π¦Ώ Account takeover fraud rates skyrocketed 282% over last year π¦Ώ
π Read
via "Tech Republic".
ATO is the weapon of choice for fraudsters leading up to the holiday shopping season, new data from Sift shows, and consumers place account security burden on businesses.π Read
via "Tech Republic".
TechRepublic
Account takeover fraud rates skyrocketed 282% over last year
ATO is the weapon of choice for fraudsters leading up to the holiday shopping season, new data from Sift shows, and consumers place account security burden on businesses.
π΄ COVID-19 Creates Opening for OT Security Reform π΄
π Read
via "Dark Reading".
Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape.π Read
via "Dark Reading".
Dark Reading
COVID-19 Creates Opening for OT Security Reform
Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape.
π΄ Phishing Attack Targets Microsoft 365 Users With Netflix & Amazon Lures π΄
π Read
via "Dark Reading".
Cyberattacker TA2552 primarily targets Spanish speakers with messages that leverage a narrow range of themes and popular brands.π Read
via "Dark Reading".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
βΌ CVE-2020-12506 βΌ
π Read
via "National Vulnerability Database".
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362 version FW03 and prior versions. WAGO 750-363 version FW03 and prior versions. WAGO 750-823 version FW03 and prior versions. WAGO 750-832/xxx-xxx version FW03 and prior versions. WAGO 750-862 version FW03 and prior versions. WAGO 750-891 version FW03 and prior versions. WAGO 750-890/xxx-xxx version FW03 and prior versions.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12505 βΌ
π Read
via "National Vulnerability Database".
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852 version FW07 and prior versions. WAGO 750-880/xxx-xxx version FW07 and prior versions. WAGO 750-881 version FW07 and prior versions. WAGO 750-831/xxx-xxx version FW07 and prior versions. WAGO 750-882 version FW07 and prior versions. WAGO 750-885/xxx-xxx version FW07 and prior versions. WAGO 750-889 version FW07 and prior versions.π Read
via "National Vulnerability Database".