π What is Data Loss Prevention (DLP)? A Definition of Data Loss Prevention π
π Read
via "Digital Guardian".
Learn more about data loss prevention software in Data Protection 101, our series covering the fundamentals of data security.π Read
via "Digital Guardian".
Digitalguardian
What is Data Loss Prevention (DLP)? Definition, Types & Tips
Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. Learn more about data loss prevention software in Data Protection 101, our series covering the fundamentalsβ¦
β NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk β
π Read
via "Threat Post".
Federal prosecutors charged two men with crimes that carry up to 20 years in prison.π Read
via "Threat Post".
Threat Post
NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk
Federal prosecutors charged two men with crimes that carry up to 20 years in prison.
π΄ 'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness π΄
π Read
via "Dark Reading".
To protect your organization from all emerging file-borne threats, the security and leadership teams must align to develop a streamlined approach to file security.π Read
via "Dark Reading".
Dark Reading
'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness
To protect your organization from all emerging file-borne threats, the security and leadership teams must align to develop a streamlined approach to file security.
β Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs β
π Read
via "Threat Post".
Cybercriminals set up three different CAPTCHAs that Office 365 targets must click through before the final phishing page.π Read
via "Threat Post".
Threat Post
Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs
Cybercriminals set up three different CAPTCHAs that Office 365 targets must click through before the final phishing page.
βΌ CVE-2020-16844 βΌ
π Read
via "National Vulnerability Database".
In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy.π Read
via "National Vulnerability Database".
π¦Ώ How to add clients to the Graylog system log manager π¦Ώ
π Read
via "Tech Republic".
Graylog makes it easy to send syslog information from clients to the hosting server. Jack Wallen shows you how.π Read
via "Tech Republic".
TechRepublic
How to add clients to the Graylog system log manager | TechRepublic
Graylog makes it easy to send syslog information from clients to the hosting server. Jack Wallen shows you how.
π΄ Imperva Agrees to Buy jSonar π΄
π Read
via "Dark Reading".
The deal is expected to close in mid-October.π Read
via "Dark Reading".
Dark Reading
Imperva Agrees to Buy jSonar
The deal is expected to close in mid-October.
π΄ CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros π΄
π Read
via "Dark Reading".
From WarGames, to Aaron Swartz, to bug bounties, to Van Buren, here's what cybersecurity researchers should know about the US's primary anti-hacking law before it gets its day in the Supreme Court.π Read
via "Dark Reading".
Dark Reading
CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros
From WarGames, to Aaron Swartz, to bug bounties, to Van Buren, here's what cybersecurity researchers should know about the US's primary anti-hacking law before it gets its day in the Supreme Court.
π΄ US Treasury Warns of Sanctions Violations for Paying Ransomware Attackers π΄
π Read
via "Dark Reading".
An alarming new advisory issued today by the federal government could upend ransomware response.π Read
via "Dark Reading".
Dark Reading
US Treasury Warns of Sanctions Violations for Paying Ransomware Attackers
An alarming new advisory issued today by the federal government could upend ransomware response.
βΌ CVE-2020-15673 βΌ
π Read
via "National Vulnerability Database".
Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15533 βΌ
π Read
via "National Vulnerability Database".
In Zoho ManageEngine Application Manager 14.7 Build 14730 (before 14684, and between 14689 and 14750), the AlarmEscalation module is vulnerable to unauthenticated SQL Injection attack.π Read
via "National Vulnerability Database".
β QR Codes: A Sneaky Security Threat β
π Read
via "Threat Post".
What to watch out for, and how to protect yourself from malicious versions of these mobile shortcuts.π Read
via "Threat Post".
Threat Post
QR Codes: A Sneaky Security Threat
What to watch out for, and how to protect yourself from malicious versions of these mobile shortcuts.
π΄ New HP Bug Bounty Program Targets Vulns in Printer Cartridges π΄
π Read
via "Dark Reading".
White-hat hackers will receive $10,000 for each security bug they discover plus a base fee, under this invitation-only initiative.π Read
via "Dark Reading".
Dark Reading
New HP Bug Bounty Program Targets Vulns in Printer Cartridges
White-hat hackers will receive $10,000 for each security bug they discover plus a base fee, under this invitation-only initiative.
π΄ Singapore Asks Big Cybersecurity Questions to Improve National Defense π΄
π Read
via "Dark Reading".
An executive from Singapore's Cyber Security Agency examines the role of security in a nation increasingly dependent on technology.π Read
via "Dark Reading".
Dark Reading
Singapore Asks Big Cybersecurity Questions to Improve National Defense
An executive from Singapore's Cyber Security Agency examines the role of security in a nation increasingly dependent on technology.
π¦Ώ Cybersecurity best practices: An open letter to end users π¦Ώ
π Read
via "Tech Republic".
In an effort to make IT pros' jobs easier, Jack Wallen offers cybersecurity tips to end users--in particular, what not to do to keep company networks, equipment, and data secure.π Read
via "Tech Republic".
TechRepublic
Cybersecurity best practices: An open letter to end users
In an effort to make IT pros' jobs easier, Jack Wallen offers cybersecurity tips to end users--in particular, what not to do to keep company networks, equipment, and data secure.
βΌ CVE-2020-5787 βΌ
π Read
via "National Vulnerability Database".
Relative Path Traversal in Teltonika firmware TRB2_R_00.02.04.3 allows a remote, authenticated attacker to delete arbitrary files on disk via the admin/services/packages/remove action.π Read
via "National Vulnerability Database".
βΌ CVE-2020-5786 βΌ
π Read
via "National Vulnerability Database".
Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.π Read
via "National Vulnerability Database".
βΌ CVE-2020-9486 βΌ
π Read
via "National Vulnerability Database".
In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26524 βΌ
π Read
via "National Vulnerability Database".
CodeLathe FileCloud before 20.2.0.11915 allows username enumeration.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26538 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. It allows attackers to execute arbitrary code via a Trojan horse taskkill.exe in the current working directory.π Read
via "National Vulnerability Database".
β Serious Security: Phishing without links β when phishers bring along their own web pages β
π Read
via "Naked Security".
How do you "check the URL before you click" if the web page you're visiting is already on your own computer?π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News