π¦Ώ Homebrew: How to install post-exploitation tools on macOS π¦Ώ
π Read
via "Tech Republic".
We'll guide you through the process of using Homebrew package manager to install post-exploit security tools on macOS to further assess compromised system vulnerabilities found in your Apple equipment.π Read
via "Tech Republic".
TechRepublic
Homebrew: How to install post-exploitation tools on macOS
Learn how to use the Homebrew package manager to install post-exploit security tools on macOS to further assess compromised system vulnerabilities found in your Apple equipment.
π The Most Read Data Insider Blogs of 2020 π
π Read
via "Digital Guardian".
SOX compliance, preventing social engineering attacks, and data classification. In this blog, we count down the most read blogs of 2020.π Read
via "Digital Guardian".
Digital Guardian
The Most Read Data Insider Blogs of 2020
SOX compliance, preventing social engineering attacks, and data classification. In this blog, we count down the most read blogs of 2020.
π΄ Small Security Teams Have Big Security Fears, CISOs Report π΄
π Read
via "Dark Reading".
Researchers poll security leaders who are tasked with protecting large organizations but have a small presence and budget.π Read
via "Dark Reading".
Dark Reading
Small Security Teams Have Big Security Fears, CISOs Report
Researchers poll security leaders who are tasked with protecting large organizations but have a small presence and budget.
β 2.28M MeetMindful Daters Compromised in Data Breach β
π Read
via "Threat Post".
The ShinyHunters hacking group offer a raft of information, from location and contact info to dating preferences and bodily descriptions, as a free download.π Read
via "Threat Post".
Threat Post
2.28M MeetMindful Daters Compromised in Data Breach
The ShinyHunters hacking group offer a raft of information, from location and contact info to dating preferences and bodily descriptions, as a free download.
π¦Ώ Gartner: The future of AI is not as rosy as some might think π¦Ώ
π Read
via "Tech Republic".
A Gartner report predicts that the second-order consequences of widespread AI will have massive societal impacts, to the point of making us unsure if and when we can trust our own eyes.π Read
via "Tech Republic".
TechRepublic
Gartner: The future of AI is not as rosy as some might think
A Gartner report predicts that the second-order consequences of widespread AI will have massive societal impacts, to the point of making us unsure if and when we can trust our own eyes.
βΌ CVE-2021-21272 βΌ
π Read
via "National Vulnerability Database".
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.π Read
via "National Vulnerability Database".
β Outgoing FCC Chair Issues Final Security Salvo Against China β
π Read
via "Threat Post".
Ajit Pai says Chinese telecom companies βbiggest national security threatβ for regulators in exit interview.π Read
via "Threat Post".
Threat Post
Outgoing FCC Chair Issues Final Security Salvo Against China
Ajit Pai says Chinese telecom companies βbiggest national security threatβ for regulators in exit interview.
π΄ Deloitte & Touche Buys Threat-Hunting Firm π΄
π Read
via "Dark Reading".
Root9B (R9B) offers threat hunting and other managed security services.π Read
via "Dark Reading".
Dark Reading
Deloitte & Touche Buys Threat-Hunting Firm
Root9B (R9B) offers threat hunting and other managed security services.
β Breaking Down Joe Bidenβs $10B Cybersecurity βDown Paymentβ β
π Read
via "Threat Post".
Tom Kellermann, head of cybersecurity strategy for VMware Carbon Black, talks about the top security challenges facing the US government as a new presidential administration steps in.π Read
via "Threat Post".
Threat Post
Breaking Down Joe Bidenβs $10B Cybersecurity βDown Paymentβ
Tom Kellermann, head of cybersecurity strategy for VMware Carbon Black, talks about the top security challenges facing the US government as a new presidential administration steps in.
βΌ CVE-2021-21275 βΌ
π Read
via "National Vulnerability Database".
The MediaWiki "Report" extension has a Cross-Site Request Forgery (CSRF) vulnerability. Before fixed version, there was no protection against CSRF checks on Special:Report, so requests to report a revision could be forged. The problem has been fixed in commit f828dc6 by making use of MediaWiki edit tokens.π Read
via "National Vulnerability Database".
π¦Ώ IT leaders see outsourcing cybersecurity as one solution to increased attacks π¦Ώ
π Read
via "Tech Republic".
A new survey from Syntax found that many decision-makers are not happy with their existing security tools.π Read
via "Tech Republic".
TechRepublic
IT leaders see outsourcing cybersecurity as one solution to increased attacks
A new survey from Syntax found that many decision-makers are not happy with their existing security tools and plan to shift from internal teams to MSPs.
π΄ Startup Offers Free Version of its 'Passwordless' Technology π΄
π Read
via "Dark Reading".
Beyond Identity co-founders hope to move the needle in eliminating the need for passwords, but experts say killing passwords altogether won't be easy.π Read
via "Dark Reading".
Dark Reading
Startup Offers Free Version of its 'Passwordless' Technology
Beyond Identity co-founders hope to move the needle in eliminating the need for passwords, but experts say killing passwords altogether won't be easy.
β North Korea Targets Security Researchers in Elaborate 0-Day Campaign β
π Read
via "Threat Post".
Hackers masquerade as security researchers to befriend analysts and eventually infect fully patched systems at multiple firms with a malicious backdoor.π Read
via "Threat Post".
Threat Post
North Korea Targets Security Researchers in Elaborate 0-Day Campaign
Hackers masquerade as security researchers to befriend analysts and eventually infect fully patched systems at multiple firms with a malicious backdoor.
π΄ Mainframe Security Automation Is Not a Luxury π΄
π Read
via "Dark Reading".
As cyber threats grow, even the most securable platform is vulnerable and requires adaptive autonomous protection.π Read
via "Dark Reading".
Dark Reading
Mainframe Security Automation Is Not a Luxury
As cyber threats grow, even the most securable platform is vulnerable and requires adaptive autonomous protection.
π¦Ώ Veritas Technologies adds Flex Scale to NetBackup9 for scale-out functionality π¦Ώ
π Read
via "Tech Republic".
The data protection company's latest delivers new features on a simplified platform to provide customers with additional choice for deployment across edge, core, and cloud.π Read
via "Tech Republic".
TechRepublic
Veritas Technologies adds Flex Scale to NetBackup9 for scale-out functionality
The data protection company's latest delivers new features on a simplified platform to provide customers with additional choice for deployment across edge, core, and cloud.
π¦Ώ Governors hear about the dangers of a lackluster cybersecurity response, need for FBI coordination π¦Ώ
π Read
via "Tech Republic".
At a national summit, Louisiana Gov. John Bel Edwards said before his state could test a cyberattack plan, five schools were hit with ransomware.π Read
via "Tech Republic".
TechRepublic
Governors hear about the dangers of a lackluster cybersecurity response, need for FBI coordination
At a national summit, Louisiana Gov. John Bel Edwards said before his state could test a cyberattack plan, five schools were hit with ransomware.
π¦Ώ Bad actors launched an unprecedented wave of DDoS attacks in 2020 π¦Ώ
π Read
via "Tech Republic".
Cybersecurity firm Akamai said in a report that COVID-19 and a newfound reliance on digital tools prompted a spike.π Read
via "Tech Republic".
TechRepublic
Bad actors launched an unprecedented wave of DDoS attacks in 2020
Cybersecurity firm Akamai said in a report that COVID-19 and a newfound reliance on digital tools prompted a spike.
π΄ SAML: The Language You Don't Know You're Speaking π΄
π Read
via "Dark Reading".
Security Assertion Markup Language, a protocol most people use daily to log into applications, makes authentication easier for both admins and users.π Read
via "Dark Reading".
Dark Reading
Learn SAML: The Language You Don't Know You're Already Speaking
Security Assertion Markup Language, a protocol most people use daily to log into applications, makes authentication easier for both admins and users. Here's what you need to know about SAML (and what it has to do with GoldenSAML).
π¦Ώ Privacy budgets soared in 2020, doubling to an average of $2.4 million π¦Ώ
π Read
via "Tech Republic".
93% of organizations turned to privacy teams to help navigate the COVID-19 pandemic, a new Cisco report finds.π Read
via "Tech Republic".
TechRepublic
Privacy budgets soared in 2020, doubling to an average of $2.4 million
93% of organizations turned to privacy teams to help navigate the COVID-19 pandemic, a new Cisco report finds.
βΌ CVE-2020-4889 βΌ
π Read
via "National Vulnerability Database".
IBM Spectrum Scale 5.0.0 through 5.0.5.4 and 5.1.0 could allow a local user to poison log files which could impact support and development efforts. IBM X-Force ID: 190971.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4949 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 192025.π Read
via "National Vulnerability Database".