π΄ Sophos Buys Cloud Security Company π΄
π Read
via "Dark Reading: ".
Deal gives Sophos a new AI-based cloud security platform.π Read
via "Dark Reading: ".
Dark Reading
Sophos Buys Cloud Security Company
Deal gives Sophos a new AI-based cloud security platform.
π΄ Whitfield Diffie Joins Quantum Xchange Advisory Board π΄
π Read
via "Dark Reading: ".
The noted cryptography expert has joined the advisory board of the quantum key exchange provider.π Read
via "Dark Reading: ".
Dark Reading
Whitfield Diffie Joins Quantum Xchange Advisory Board
The noted cryptography expert has joined the advisory board of the quantum key exchange provider.
β SMS phishing is alive and wellβ¦ and simply believable β
π Read
via "Naked Security".
Sometimes, the limited length of an SMS makes it easier for the crooks to 'get it to look right' and reel you in to a phishing site...π Read
via "Naked Security".
Naked Security
SMS phishing is alive and well⦠and simply believable
Sometimes, the limited length of an SMS makes it easier for the crooks to βget it to look rightβ and reel you in to a phishing siteβ¦
π΄ Humana Breaches Reflect Chronic Credential Theft in Healthcare π΄
π Read
via "Dark Reading: ".
A series of 2018 cybersecurity incidents shows credential stuffing is a trend to watch among healthcare organizations.π Read
via "Dark Reading: ".
Darkreading
Humana Breaches Reflect Chronic Credential Theft in Healthcare
A series of 2018 cybersecurity incidents shows credential stuffing is a trend to watch among healthcare organizations.
β Malvertising Campaign Delivers Double Whammy of Ransomware and Info-Stealing β
π Read
via "Threatpost | The first stop for security news".
The whole attack takes place in under a minute.π Read
via "Threatpost | The first stop for security news".
Threat Post
Malvertising Campaign Delivers Double Whammy of Ransomware and Info-Stealing
The whole attack takes place in under a minute.
π΄ Your Life Is the Attack Surface: The Risks of IoT π΄
π Read
via "Dark Reading: ".
To protect yourself, you must know where you're vulnerable - and these tips can help.π Read
via "Dark Reading: ".
Darkreading
Your Life Is the Attack Surface: The Risks of IoT
To protect yourself, you must know where you're vulnerable β and these tips can help.
π΄ 20-Year Old Student Admits to Massive Data Leak in Germany π΄
π Read
via "Dark Reading: ".
Hack was not politically motivated; no sign of third-party involvement, authorities say.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β Microsoft Issues Multiple Critical Patches for Edge Browser β
π Read
via "Threatpost | The first stop for security news".
Microsoft January Patch Tuesday roundup includes four critical patches for its Edge browser.π Read
via "Threatpost | The first stop for security news".
Threat Post
Microsoft Issues Multiple Critical Patches for Edge Browser
Microsoft January Patch Tuesday roundup includes four critical patches for its Edge browser.
β Shipping Firms Speared with Targeted βWhalingβ Attacks β
π Read
via "Threatpost | The first stop for security news".
Bad actors are imitating high-level executives in the shipping industry to launch BEC attacks that could lead to credential theft or worse - system compromise.π Read
via "Threatpost | The first stop for security news".
Threat Post
Shipping Firms Speared with Targeted βWhalingβ Attacks
Bad actors are targeting higher-level executives in the shipping industry with simply phishing attacks that could lead to credential theft or worse - system compromise.
π Phishing and spearphishing: A cheat sheet for business professionals π
π Read
via "Security on TechRepublic".
When criminals use technology to propagate social engineering attacks, securing your organization can become complicated. Here's what you need to know about phishing and spearphishing.π Read
via "Security on TechRepublic".
TechRepublic
Phishing and spearphishing: A cheat sheet for business professionals | TechRepublic
When criminals use technology to propagate social engineering attacks, securing your organization can become complicated. Here's what you need to know about phishing and spearphishing.
π΄ Remote Code Execution Bugs Are Primary Focus of January Patch Tuesday π΄
π Read
via "Dark Reading: ".
This month's security update includes seven patches ranked Critical and one publicly known vulnerability.π Read
via "Dark Reading: ".
Dark Reading
Remote Code Execution Bugs Are Primary Focus of January Patch Tuesday
This month's security update includes seven patches ranked Critical and one publicly known vulnerability.
π΄ New 'Crypto Dusting' Attack Gives Cash, Takes Reputation π΄
π Read
via "Dark Reading: ".
This new form of crypto wallet fraud enlists unwary consumers and companies to help defeat anti-money laundering methods for law enforcement and regulators.π Read
via "Dark Reading: ".
Dark Reading
New 'Crypto Dusting' Attack Gives Cash, Takes Reputation
This new form of crypto wallet fraud enlists unwary consumers and companies to help defeat anti-money laundering methods for law enforcement and regulators.
ATENTIONβΌ New - CVE-2016-10735
π Read
via "National Vulnerability Database".
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.π Read
via "National Vulnerability Database".
β Politicians who block social media users are violating First Amendment β
π Read
via "Naked Security".
The difference between a personal vs. an official social media account was at the crux of the case decided on Monday.π Read
via "Naked Security".
Naked Security
Politicians who block social media users are violating First Amendment
The difference between a personal vs. an official social media account was at the crux of the case decided on Monday.
β How to share photos β without using Facebook β
π Read
via "Naked Security".
There are other options for photo sharing that don't hand over every pixel to the Facebook megamind.π Read
via "Naked Security".
Naked Security
How to share photos β without using Facebook
There are other options for photo sharing that donβt hand over every pixel to the Facebook megamind.
β Zerodiumβs waving fatter payouts for zero-day bug hunters β
π Read
via "Naked Security".
Any chance we could appeal to your conscience and integrity and put in a call for ethical disclosure?π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Some Android apps are secretly sharing your data with Facebook β
π Read
via "Naked Security".
Apps have been secretly sharing usage data with Facebook, even when users are logged - or donβt have an account at all.π Read
via "Naked Security".
Naked Security
Some Android apps are secretly sharing your data with Facebook
Apps have been secretly sharing usage data with Facebook, even when users are logged β or donβt have an account at all.
β IoT weaknesses leave hot tub owners in deep water β
π Read
via "Naked Security".
It looks as if at least one hot tub maker has left robust security off the to-do list.π Read
via "Naked Security".
Naked Security
IoT weaknesses leave hot tub owners in deep water
It looks as if at least one hot tub maker has left robust security off the to-do list.
π΄ 6 Ways to Beat Back BEC Attacks π΄
π Read
via "Dark Reading: ".
Don't assume your employees know how to spot business email compromises - they need some strong training and guidance on how to respond in the event of an attack.π Read
via "Dark Reading: ".
Dark Reading
6 Ways to Beat Back BEC Attacks
Don't assume your employees know how to spot business email compromises - they need some strong training and guidance on how to respond in the event of an attack.
π΄ Security at the Speed of DevOps: Maturity, Orchestration, and Detection π΄
π Read
via "Dark Reading: ".
Container and microservices technologies, including the orchestrator Kubernetes, create an extraordinary opportunity to build infrastructure and applications that are secure by design.π Read
via "Dark Reading: ".
Darkreading
Security at the Speed of DevOps: Maturity, Orchestration, and Detection
Container and microservices technologies, including the orchestrator Kubernetes, create an extraordinary opportunity to build infrastructure and applications that are secure by design.
π΄ Magecart Mayhem Continues in OXO Breach π΄
π Read
via "Dark Reading: ".
The home goods company confirmed users' data may have been compromised during multiple time frames over a two-year period.π Read
via "Dark Reading: ".
Darkreading
Magecart Mayhem Continues in OXO Breach
The home goods company confirmed users' data may have been compromised during multiple time frames over a two-year period.