β REvil Ransomware Code Ripped Off by Rivals β
π Read
via "Threat Post".
The LV ransomware operators likely used a hex editor to repurpose a REvil binary almost wholesale, for their own nefarious purposes.π Read
via "Threat Post".
Threat Post
REvil Ransomware Code Ripped Off by Rivals
The LV ransomware operators likely used a hex editor to repurpose a REvil binary almost wholesale, for their own nefarious purposes.
π¦Ώ Employees are valuable assets: Why you need to safeguard them π¦Ώ
π Read
via "Tech Republic".
Two experts suggest calling employees "insider threats" is counterproductive; employees are assets needing protection.π Read
via "Tech Republic".
TechRepublic
Employees are valuable assets: Why you need to safeguard them
Two experts suggest calling employees "insider threats" is counterproductive; employees are assets needing protection.
β Critical Palo Alto Cyber-Defense Bug Allows Remote βWar Roomβ Access β
π Read
via "Threat Post".
Remote, unauthenticated cyberattackers can infiltrate and take over the Cortex XSOAR platform, which anchors unified threat intelligence and incident responses.π Read
via "Threat Post".
Threat Post
Critical Palo Alto Cyber-Defense Bug Allows Remote βWar Roomβ Access
Remote, unauthenticated cyberattackers can infiltrate the Cortex XSOAR platform, which anchors unified threat intelligence and incident responses, and take command.
βΌ CVE-2021-25950 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2020-20391 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in GetSimpleCMS 3.4.0a in admin/snippets.php via (1) Add Snippet and (2) Save snippets.π Read
via "National Vulnerability Database".
βΌ CVE-2011-1955 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
π An Interview with Ben McGraw, Cybersecurity Manager at Digital Guardian Part I π
π Read
via "".
In part one of our Q&A with Ben McGraw, we discuss his journey to Digital Guardian, insight from DG's Analytics & Reporting Cloud, and what makes a good threat hunter.π Read
via "".
Digital Guardian
An Interview with Ben McGraw, Cybersecurity Manager at Digital Guardian Part I
In part one of our Q&A with Ben McGraw, we discuss his journey to Digital Guardian, insight from DG's Analytics & Reporting Cloud, and what makes a good threat hunter.
π¦Ώ Cybersecurity practices must be applied to vehicles, too π¦Ώ
π Read
via "Tech Republic".
Manufacturers want to pack cars and trucks full of technology, but they need to remember the dangers to those who drive or ride in them.π Read
via "Tech Republic".
TechRepublic
Cybersecurity practices must be applied to vehicles, too
Manufacturers want to pack cars and trucks full of technology, but they need to remember the dangers to those who drive or ride in them.
π΄ When Will Cybersecurity Operations Adopt the Peter Parker Principle? π΄
π Read
via "Dark Reading".
Having a prevention mindset means setting our prevention capabilities to "prevent" instead of relying on detection and response.π Read
via "Dark Reading".
β Pandemic-Bored Attackers Pummeled Gaming Industry β
π Read
via "Threat Post".
Akamai's 2020 gaming report shows that cyberattacks on the video game industry skyrocketed, shooting up 340 percent in 2020.π Read
via "Threat Post".
Threat Post
Pandemic-Bored Attackers Pummeled Gaming Industry
Akamai's 2020 gaming report shows that cyberattacks on the video game industry skyrocketed, shooting up 340 percent in 2020.
βΌ CVE-2021-3526 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33624 βΌ
π Read
via "National Vulnerability Database".
In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.π Read
via "National Vulnerability Database".
β Iran Media Websites Seized by U.S. in Disinformation Campaign β
π Read
via "Threat Post".
DoJ uses sanctions laws to shut down an alleged Iranian government malign influence campaign.π Read
via "Threat Post".
Threat Post
Iran Media Websites Seized by U.S. in Disinformation Campaign
DoJ uses sanctions laws to shut down an alleged Iranian government malign influence campaign.
π΄ Survey Seeks to Learn How 2020 Changed Security π΄
π Read
via "Dark Reading".
Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.π Read
via "Dark Reading".
π΄ New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies π΄
π Read
via "Dark Reading".
Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak sensitive information on corporate and government customers, with one simple registration step.π Read
via "Dark Reading".
Dark Reading
New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies
Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak sensitive information on corporate and government customers, with one simple registration step.
βΌ CVE-2020-18657 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.π Read
via "National Vulnerability Database".
π΄ Microsoft Tracks New BazaCall Malware Campaign π΄
π Read
via "Dark Reading".
Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file.π Read
via "Dark Reading".
βΌ CVE-2020-18660 βΌ
π Read
via "National Vulnerability Database".
GetSimpleCMS <=3.3.15 has an open redirect in admin/changedata.php via the redirect function to the url parameter.π Read
via "National Vulnerability Database".
π΄ VMs Help Ransomware Attackers Evade Detection, But It's Uncommon π΄
π Read
via "Dark Reading".
Some ransomware attackers use virtual machines to bypass security detection, but adoption is slow for the complicated technique.π Read
via "Dark Reading".
Dark Reading
VMs Help Ransomware Attackers Evade Detection, But It's Uncommon
Some ransomware attackers use virtual machines to bypass security detection, but adoption is slow for the complicated technique.
π΄ 79% of Third-Party Libraries in Apps Are Never Updated π΄
π Read
via "Dark Reading".
A lack of contextual information and concerns over application disruption among contributing factors.π Read
via "Dark Reading".
Dark Reading
79% of Third-Party Libraries in Apps Are Never Updated
A lack of contextual information and concerns over application disruption among contributing factors.
βΌ CVE-2021-21809 βΌ
π Read
via "National Vulnerability Database".
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.π Read
via "National Vulnerability Database".