π΄ New Phishing Campaign Hits With Triple Threat π΄
π Read
via "Dark Reading: ".
Attack threatens victims with three "deadly malware" infestations if they don't give up critical email account credentials.π Read
via "Dark Reading: ".
Dark Reading
New Phishing Campaign Hits With Triple Threat
Attack threatens victims with three deadly malware infestations if they don't give up critical email account credentials.
π΄ New Phishing Campaign Packs Triple Threat π΄
π Read
via "Dark Reading: ".
Attack threatens victims with three "deadly malware" infestations if they don't give up critical email account credentials.π Read
via "Dark Reading: ".
Dark Reading
New Phishing Campaign Packs Triple Threat
Attack threatens victims with three deadly malware infestations if they don't give up critical email account credentials.
π How to integrate SSH key authentication into KeePassXC π
π Read
via "Security on TechRepublic".
Make using SSH key authentication a snap with the new ssh-agent feature found in KeePassXC.π Read
via "Security on TechRepublic".
TechRepublic
How to integrate SSH key authentication into KeePassXC
Make using SSH key authentication a snap with the new ssh-agent feature found in KeePassXC.
π΄ Collateral Damage: When Cyberwarfare Targets Civilian Data π΄
π Read
via "Dark Reading: ".
You can call it collateral damage. You can call it trickledown cyberwarfare. Either way, foreign hacker armies are targeting civilian enterprises - as a means of attacking rival government targets.π Read
via "Dark Reading: ".
Darkreading
Collateral Damage: When Cyberwarfare Targets Civilian Data
You can call it collateral damage. You can call it trickledown cyberwarfare. Either way, foreign hacker armies are targeting civilian enterprises β as a means of attacking rival government targets.
π΄ Database of 24 Million Mortgage, Loan Records Left Exposed Online π΄
π Read
via "Dark Reading: ".
Breach latest example of how misconfigurations, human errors undermine security in a big way, experts say.π Read
via "Dark Reading: ".
Darkreading
Database of 24 Million Mortgage, Loan Records Left Exposed Online
Breach latest example of how misconfigurations, human errors undermine security in a big way, experts say.
π΄ Cyberattackers Bait Financial Firms with Google Cloud Platform π΄
π Read
via "Dark Reading: ".
A new wave of attacks abuses the Google Cloud Platform URL redirection in PDF decoys, sending users to a malicious link.π Read
via "Dark Reading: ".
Darkreading
Cyberattackers Bait Financial Firms with Google Cloud Platform
A new wave of attacks abuses the Google Cloud Platform URL redirection in PDF decoys, sending users to a malicious link.
β Fighting Fire with Fire: API Automation Risks β
π Read
via "Threatpost | The first stop for security news".
A look at API attack trends such as the current (and failing) architectural designs for addressing security of these API transactions.π Read
via "Threatpost | The first stop for security news".
Threat Post
Fighting Fire with Fire: API Automation Risks
A look at API attack trends such as the current (and failing) architectural designs for addressing security of these API transactions.
π΄ Cisco Study Finds Fewer Data Breaches at GDPR-Ready Firms π΄
π Read
via "Dark Reading: ".
Many organizations find that getting their data privacy house in order is paying off.π Read
via "Dark Reading: ".
Darkreading
Cisco Study Finds Fewer Data Breaches at GDPR-Ready Firms
Many organizations find that getting their data privacy house in order is paying off.
ATENTIONβΌ New - CVE-2017-18359
π Read
via "National Vulnerability Database".
PostGIS 2.x before 2.3.3, as used with PostgreSQL, allows remote attackers to cause a denial of service via crafted ST_AsX3D function input, as demonstrated by an abnormal server termination for "SELECT ST_AsX3D('LINESTRING EMPTY');" because empty geometries are mishandled.π Read
via "National Vulnerability Database".
β Facebook debuts scam ads reporting tool β
π Read
via "Naked Security".
Adverts on Facebook featuring fake celebrity endorsements scam people out of their savings, and Facebook is now doing something about it.π Read
via "Naked Security".
Naked Security
Facebook debuts scam ads reporting tool
Adverts on Facebook featuring fake celebrity endorsements scam people out of their savings, and Facebook is now doing something about it.
β Cops catch $15m crypto-crook β
π Read
via "Naked Security".
A man has been arrested a year after stealing β¬10m ($15m) of the IoT-focused cryptocurrency IOTA using bogus software that tricked users.π Read
via "Naked Security".
Naked Security
Cops catch $15m crypto-crook
A man has been arrested a year after stealing β¬10m ($15m) of the IoT-focused cryptocurrency IOTA using bogus software that tricked users.
β #DeleteFacebook? #DeleteTwitter? #FatLotOfGood that will do you β
π Read
via "Naked Security".
Your likes, interest and personality can be gleaned from as few as 8-9 friends on social media, whether you're on the platform or not.π Read
via "Naked Security".
Naked Security
#DeleteFacebook? #DeleteTwitter? #FatLotOfGood that will do you
Your likes, interest and personality can be gleaned from as few as 8-9 friends on social media, whether youβre on the platform or not.
β US gov declares emergency after wave of domain hijacking attacks β
π Read
via "Naked Security".
The US Department of Homeland Security (DHS) has issued an emergency directive tightening DNS security after a recent wave of domain hijacking attacks targeting government websites.π Read
via "Naked Security".
Naked Security
US gov declares emergency after wave of domain hijacking attacks
The US Department of Homeland Security (DHS) has issued an emergency directive tightening DNS security after a recent wave of domain hijacking attacks targeting government websites.
β Fighting Emotet: lessons from the front line β
π Read
via "Naked Security".
Emotet is moving, shape-shifting target for admins and their security software. Here's what we've learned from dealing with outbreaks.π Read
via "Naked Security".
Naked Security
Fighting Emotet: lessons from the front line
Emotet is moving, shape-shifting target for admins and their security software. Hereβs what weβve learned from dealing with outbreaks.
π 7 bug bounty myths, busted π
π Read
via "Security on TechRepublic".
Interest in bug bounty programs is exploding, as companies look to crowdsourcing to combat hackers. But several misconceptions remain.π Read
via "Security on TechRepublic".
TechRepublic
7 bug bounty myths, busted
Interest in bug bounty programs is exploding, as companies look to crowdsourcing to combat hackers. But several misconceptions remain.
ATENTIONβΌ New - CVE-2017-18332 (mdm9607_firmware, mdm9635m_firmware, mdm9640_firmware, mdm9645_firmware, mdm9650_firmware, mdm9655_firmware, msm8909w_firmware, msm8996au_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_425_firmware, sd_430_firmware, sd_450_firmware, sd_625_firmware, sd_650_firmware, sd_652_firmware, sd_670_firmware, sd_710_firmware, sd_712_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sda660_firmware, sdx20_firmware, sxr1130_firmware)
π Read
via "National Vulnerability Database".
Security keys are logged when any WCDMA call is configured or reconfigured in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDX20, SXR1130π Read
via "National Vulnerability Database".
π΄ The 5 Stages of CISO Success, Past & Future π΄
π Read
via "Dark Reading: ".
In cybersecurity, as in history, security leaders who forget the lessons of the past will be doomed to repeat them.π Read
via "Dark Reading: ".
Darkreading
The 5 Stages of CISO Success, Past & Future
In cybersecurity, as in history, security leaders who forget the lessons of the past will be doomed to repeat them.
π΄ Credential Compromises By the Numbers π΄
π Read
via "Dark Reading: ".
Recent statistics show just how much credential stealing has become a staple in the attacker playbook.π Read
via "Dark Reading: ".
Darkreading
Credential Compromises by the Numbers
Recent statistics show just how much credential stealing has become a staple in the attacker playbook.
β Razy Malware Attacks Browser Extensions to Steal Cryptocurrency β
π Read
via "Threatpost | The first stop for security news".
The malware targets victims in multiple, sneaky ways as they move around the web.π Read
via "Threatpost | The first stop for security news".
Threat Post
Razy Malware Attacks Browser Extensions to Steal Cryptocurrency
The malware targets victims in multiple, sneaky ways as they move around the web.
π΄ Satya Nadella: Privacy Is a Human Right π΄
π Read
via "Dark Reading: ".
In a talk at the World Economic Forum, Microsoft's CEO voiced support for GDPR and expressed hope the United States creates a similar approach to privacy.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading