π΄ Modular Malware Brings Stealthy Attacks to Former Soviet States π΄
π Read
via "Dark Reading: ".
A new malware technique is making phishing attacks harder to spot when they succeed.π Read
via "Dark Reading: ".
Darkreading
Modular Malware Brings Stealthy Attacks to Former Soviet States
A new malware technique is making phishing attacks harder to spot when they succeed.
β Update now! Microsoftβs September 2018 Patch Tuesday is here β
π Read
via "Naked Security".
Septemberβs Patch Tuesday is upon Windows users - 61 CVEs, 17 flaws rated as critical, a zero-day and a flaw affecting Adobe Flash Player.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β California bill regulates IoT for first time in US β
π Read
via "Naked Security".
California looks set to regulate IoT devices, becoming the first US state to do so and beating the Federal Government to the post.π Read
via "Naked Security".
Naked Security
California bill regulates IoT for first time in US
California looks set to regulate IoT devices, becoming the first US state to do so and beating the Federal Government to the post.
β Experts Bemoan Shortcomings with IoT Security Bill β
π Read
via "The first stop for security news | Threatpost ".
The infosec community say California's IoT security bill is "nice," but doesn't hit on the important issues.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Experts Bemoan Shortcomings with IoT Security Bill
The infosec community say Californiaβs IoT security bill is βnice,β but doesnβt hit on the important issues.
β Street gang members indicted for stealing POS terminals β
π Read
via "Naked Security".
...and using the credit card terminals to allegedly issue themselves fraudulent returns and to steal taxpayer IDs and bank info.π Read
via "Naked Security".
Naked Security
Street gang members indicted for stealing POS terminals
β¦and using the credit card terminals to allegedly issue themselves fraudulent returns and to steal taxpayer IDs and bank info.
β Veeam leaves MongoDB database wide open, exposes 445m records β
π Read
via "Naked Security".
The data-management firm's customer database held names, email addresses, some IP addresses and more: a wealth of ammo for phishers.π Read
via "Naked Security".
Naked Security
Veeam leaves MongoDB database wide open, exposes 445m records
The data-management firmβs customer database held names, email addresses, some IP addresses and more: a wealth of ammo for phishers.
π΄ The Increasingly Vulnerable Software Supply Chain π΄
π Read
via "Dark Reading: ".
Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.π Read
via "Dark Reading: ".
Darkreading
The Increasingly Vulnerable Software Supply Chain
Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.
π Microsoft Office is more dangerous than you think: Doc deliver 45% of all malware π
π Read
via "Security on TechRepublic".
Malicious Microsoft Office attachments are more common than malicious batch scripts and PowerShell scripts, according to Cofense Intelligence. Here's how to protect your business.π Read
via "Security on TechRepublic".
π΄ Bomgar Buys BeyondTrust π΄
π Read
via "Dark Reading: ".
The companies join forces to broaden their privileged access management portfolio and will take on the BeyondTrust name.π Read
via "Dark Reading: ".
Dark Reading
Bomgar Buys BeyondTrust
The companies join forces to broaden their privileged access management portfolio and will take on the BeyondTrust name.
π΄ Kelihos Botnet Operator Pleads Guilty in Federal Court π΄
π Read
via "Dark Reading: ".
The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.π Read
via "Dark Reading: ".
Darkreading
Kelihos Botnet Operator Pleads Guilty in Federal Court
The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.
π΄ Enterprise Security Needs an Open Data Solution π΄
π Read
via "Dark Reading: ".
What would it look like if more than a tiny fraction of enterprises had access to all the signals hidden in their big data today?π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
β ThreatList: Microsoft Macros Remain Top Vector for Malware Delivery β
π Read
via "The first stop for security news | Threatpost ".
The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Microsoft Macros Remain Top Vector for Malware Delivery
The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution.
β You didnβt buy βyourβ iTunes movies; Apple can delete them anytime β
π Read
via "Naked Security".
It's in the terms of service, as one man found out after Apple removed three movies from his iTunes library.π Read
via "Naked Security".
Naked Security
You didnβt buy βyourβ iTunes movies; Apple can delete them anytime
Itβs in the terms of service, as one man found out after Apple removed three movies from his iTunes library.
β Review that! Fake TripAdvisor review peddler sent to jail β
π Read
via "Naked Security".
Jail time for fake reviews is βa landmark ruling for the Internet,β TripAdvisor said.π Read
via "Naked Security".
Naked Security
Review that! Fake TripAdvisor review peddler sent to jail
Jail time for fake reviews is βa landmark ruling for the Internet,β TripAdvisor said.
π Google reinstates www to URLs in Chrome after user backlash, but only temporarily π
π Read
via "Security on TechRepublic".
Less than a week after Chrome was updated to hide the "www" from users, Google have put the subdomain back into the address bar, but only temporarily.π Read
via "Security on TechRepublic".
TechRepublic
Google reinstates www to URLs in Chrome after user backlash, but only temporarily
Less than a week after Chrome was updated to hide the "www" from users, Google have put the subdomain back into the address bar.
β Review that! Fake TripAdvisor review peddler sent to jail β
π Read
via "Naked Security".
Jail time for fake reviews is βa landmark ruling for the Internet,β TripAdvisor said.π Read
via "Naked Security".
Naked Security
Review that! Fake TripAdvisor review peddler sent to jail
Jail time for fake reviews is βa landmark ruling for the Internet,β TripAdvisor said.
β Major US mobile carriers want to be your password β
π Read
via "Naked Security".
Project Verify from Verizon, AT&T, Sprint and T-Mobile aims to replace your password.π Read
via "Naked Security".
Naked Security
Major US mobile carriers want to be your password
Project Verify from Verizon, AT&T, Sprint and T-Mobile aims to replace your password.
β Blockchain hustler beats the house with smart contract hack β
π Read
via "Naked Security".
A hacker used their own code to tamper with a smart contract run by a betting company, and walked off with $24,000.π Read
via "Naked Security".
Naked Security
Blockchain hustler beats the house with smart contract hack
A hacker used their own code to tamper with a smart contract run by a betting company, and walked off with $24,000.
β Magecart Threat Group Racks Up More Hack Victims β
π Read
via "The first stop for security news | Threatpost ".
The threat group has racked up a list of victims including Feedify, Groopdealz and British Airways.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Magecart Threat Group Racks Up More Hack Victims
The threat group has racked up a list of victims including Feedify, Groopdealz and British Airways.
π Why 31% of data breaches lead to employees getting fired π
π Read
via "Security on TechRepublic".
North America is the region where C-Suite leaders are most likely to be blamed for a breach.π Read
via "Security on TechRepublic".
TechRepublic
Why 31% of data breaches lead to employees getting fired
North America is the region where C-Suite leaders are most likely to be blamed for a breach.
π German manufacturers lose $50B to cyber attacks, SMBs at greatest risk π
π Read
via "Security on TechRepublic".
A quarter of German manufacturing companies reported losing sensitive mobile phone data, according to a Bitkom survey.π Read
via "Security on TechRepublic".
TechRepublic
German manufacturers lose $50B to cyber attacks, SMBs at greatest risk
A quarter of German manufacturing companies reported losing sensitive mobile phone data, according to a Bitkom survey.