β New CISA Director Confirmed, White House Gains Cyber-Director β
π Read
via "Threat Post".
Jen Easterly, former NSA official and Morgan Stanley vet, will take up the lead at CISA as the ransomware scourge rages on.π Read
via "Threat Post".
Threat Post
New CISA Director Confirmed, White House Gains Cyber-Director
Jen Easterly, former NSA official and Morgan Stanley vet, will take up the lead at CISA as the ransomware scourge rages on.
β Is Remote Desktop Protocol Secure? It Can Be β
π Read
via "Threat Post".
Matt Dunn, associate managing director in Kroll's Cyber Risk practice, discusses options for securing RDP, which differ significantly in terms of effectiveness.π Read
via "Threat Post".
Threat Post
Is Remote Desktop Protocol Secure? It Can Be
Matt Dunn, associate managing director in Kroll's Cyber Risk practice, discusses options for securing RDP, which differ significantly in terms of effectiveness.
π΄ Can Government Effectively Help Businesses Fight Cybercrime? π΄
π Read
via "Dark Reading".
From the Biden administration's pledge to take action to INTERPOL's focus on ransomware as a global threat, governments are looking to help businesses cope with cyberattacks. But can it really work?π Read
via "Dark Reading".
Dark Reading
Can Government Effectively Help Businesses Fight Cybercrime?
From the Biden administration's pledge to take action to INTERPOL's focus on ransomware as a global threat, governments are looking to help businesses cope with cyberattacks. But can it really work?
π Global Socket 1.4.33 π
π Read
via "Packet Storm Security".
Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.π Read
via "Packet Storm Security".
Packetstormsecurity
Global Socket 1.4.33 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Donβt get tricked by this crashtastic iPhone Wi-Fi hack! β
π Read
via "Naked Security".
Learn how the trick works so that you can avoid it in case someone thinks it's a joke to catch you out.π Read
via "Naked Security".
Naked Security
Donβt get tricked by this crashtastic iPhone Wi-Fi hack!
Learn how the trick works so that you can avoid it in case someone thinks itβs a joke to catch you out.
π΄ Enterprises Altering Their Supply Chain Defenses on Heels of Latest Breaches π΄
π Read
via "Dark Reading".
More than half of enterprises surveyed for Dark Reading's State of Malware Threats report indicate they are making at least a few changes to their supply chain security defenses following recent attacks on software vendors such as SolarWinds.π Read
via "Dark Reading".
Dark Reading
Enterprises Altering Their Supply Chain Defenses on Heels of Latest Breaches
More than half of enterprises surveyed for Dark Reading's State of Malware Threats report indicate they are making at least a few changes to their supply chain security defenses following recent attacks on software vendors such as SolarWinds.
βΌ CVE-2021-36123 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Echo ShareCare 8.15.5. The TextReader feature in General/TextReader/TextReader.cfm is susceptible to a local file inclusion vulnerability when processing remote input in the textFile parameter from an authenticated user, leading to the ability to read arbitrary files on the server filesystems as well any files accessible via Universal Naming Convention (UNC) paths.π Read
via "National Vulnerability Database".
βΌ CVE-2020-22875 βΌ
π Read
via "National Vulnerability Database".
Integer overflow vulnerability in function Jsi_ObjSetLength in jsish before 3.0.6, allows remote attackers to execute arbitrary code.π Read
via "National Vulnerability Database".
β βCharming Kittenβ APT Siphons Intel From Mid-East Scholars β
π Read
via "Threat Post".
Professors, journalists and think-tank personnel, beware strangers bearing webinars: Itβs the focus of a particularly sophisticated, and chatty, phishing campaign.π Read
via "Threat Post".
Threat Post
βCharming Kittenβ APT Siphons Intel From Mid-East Scholars
Professors, journalists and think-tank personnel, beware strangers bearing webinars: Itβs the focus of a particularly sophisticated, and chatty, phishing campaign.
π΄ Why We Need to Raise the Red Flag Against FragAttacks π΄
π Read
via "Dark Reading".
Proliferation of wireless devices increases the risk that corporate networks will be attacked with this newly discovered breed of Wi-Fi-based cyber assault.π Read
via "Dark Reading".
Dark Reading
Why We Need to Raise the Red Flag Against FragAttacks
Proliferation of wireless devices increases the risk that corporate networks will be attacked with this newly discovered breed of Wi-Fi-based cyber assault.
π¦Ώ Bad actor offers up for sale data from 600 million LinkedIn members scraped from the site π¦Ώ
π Read
via "Tech Republic".
Cyber News reports that this is the third time in four months that member information has shown up on a hacker forum.π Read
via "Tech Republic".
TechRepublic
600 million LinkedIn members scraped, data offered up for sale on hacker forum
CyberNews reports that this is the third time in four months that member information has shown up on a hacker forum.
βΌ CVE-2021-20362 βΌ
π Read
via "National Vulnerability Database".
IBM Cloud Pak for Applications 4.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 195033.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20366 βΌ
π Read
via "National Vulnerability Database".
IBM Cloud Pak for Applications 4.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 195037.π Read
via "National Vulnerability Database".
π΄ DoD-Validated Data Security Startup Emerges From Stealth π΄
π Read
via "Dark Reading".
The Code-X platform has been tested by the US Department of Defense and members of the intelligence community.π Read
via "Dark Reading".
β Adobe Patches 11 Critical Bugs in Popular Acrobat PDF Reader β
π Read
via "Threat Post".
Adobe July patch roundup includes fixes for its ubiquitous and free PDF reader Acrobat 2020 and other software such as Illustrator and Bridge.π Read
via "Threat Post".
Threat Post
Adobe Patches 11 Critical Bugs in Popular Acrobat PDF Reader
Adobe July patch roundup includes fixes for its ubiquitous and free PDF reader Acrobat 2020 and other software such as Illustrator and Bridge.
β Unpatched Critical RCE Bug Allows Industrial, Utility Takeovers β
π Read
via "Threat Post".
The 'ModiPwn' bug lays open production lines, sensors, conveyor belts, elevators, HVACs and more that use Schneider Electric PLCs.π Read
via "Threat Post".
Threat Post
Unpatched Critical RCE Bug Allows Industrial, Utility Takeovers
The 'ModiPwn' bug lays open production lines, sensors, conveyor belts, elevators, HVACs and more that use Schneider Electric PLCs.
βΌ CVE-2021-31217 βΌ
π Read
via "National Vulnerability Database".
In SolarWinds DameWare Mini Remote Control Server 12.0.1.200, insecure file permissions allow file deletion as SYSTEM.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36214 βΌ
π Read
via "National Vulnerability Database".
LINE client for iOS before 10.16.3 allows cross site script with specific header in WebView.π Read
via "National Vulnerability Database".
β Guess Fashion Brand Deals With Data Loss After Ransomware Attack β
π Read
via "Threat Post".
An attack on Guess compromised the personal and banking data of 1,300 victims.π Read
via "Threat Post".
Threat Post
Guess Fashion Brand Deals With Data Loss After Ransomware Attack
An attack on Guess compromised the personal and banking data of 1,300 victims.
β Ransomware Giant REvilβs Sites Disappear β
π Read
via "Threat Post".
Just days after President Biden demanded that Russian President Putin shut down ransomware groups, the servers of one of the biggest groups mysteriously went dark.π Read
via "Threat Post".
Threat Post
Ransomware Giant REvilβs Sites Disappear
Just days after President Biden demanded that Putin shut down ransomware groups, the servers of one of the biggest groups mysteriously went dark.
β Microsoft Crushes 116 Bugs, Three Actively Exploited β
π Read
via "Threat Post".
Microsoft tackles 12 critical bugs, part of its July 2021 Patch Tuesday roundup, capping a βPrintNightmareβ month of headaches for system admins.π Read
via "Threat Post".
Threat Post
Microsoft Crushes 116 Bugs, Three Actively Exploited
Microsoft tackles 12 critical bugs, part of its July 2021 Patch Tuesday roundup, capping a βPrintNightmareβ month of headaches for system admins.