π The top 11 phishing email subject lines SMBs should look out for π
π Read
via "Security on TechRepublic".
Phishing is the biggest threat facing SMBs, according to the 2018 Webroot SMB Pulse Report.π Read
via "Security on TechRepublic".
TechRepublic
The top 11 phishing email subject lines SMBs should look out for
Phishing is the biggest threat facing SMBs, according to the 2018 Webroot SMB Pulse Report.
π΄ The Top 5 Security Threats & Mitigations for Industrial Networks π΄
π Read
via "Dark Reading: ".
While vastly different than their IT counterparts, operational technology environments share common risks and best practices.π Read
via "Dark Reading: ".
Dark Reading
The Top 5 Security Threats & Mitigations for Industrial Networks
While vastly different than their IT counterparts, operational technology environments share common risks and best practices.
π΄ IoT Threats Triple Since 2017 π΄
π Read
via "Dark Reading: ".
Rapidly evolving malware is posing an ever-greater threat to the IoT - and business users of the Internet.π Read
via "Dark Reading: ".
Darkreading
IoT Threats Triple Since 2017
Rapidly evolving malware is posing an ever-greater threat to the IoT β and business users of the Internet.
β Intel releases firmware update for ME flaw β
π Read
via "Naked Security".
Itβs only September and yet 2018 is well on its way to being remembered as the year of fixing flaws we didnβt realise were possible in hardware weβd never heard of.π Read
via "Naked Security".
Naked Security
Intel releases firmware update for ME flaw
Itβs only September and yet 2018 is well on its way to being remembered as the year of fixing flaws we didnβt realise were possible in hardware weβd never heard of.
β ThreatList: Malware Samples Targeting IoT More Than Double in 2018 β
π Read
via "The first stop for security news | Threatpost ".
A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices β from Mikrotik routers to dishwashers.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Malware Samples Targeting IoT More Than Double in 2018
A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices β from Mikrotik routers to dishwashers.
π΄ Websites Attack Attempts Rose in Q2 π΄
π Read
via "Dark Reading: ".
New data shows hackers hit websites, on average, every 25 minutes.π Read
via "Dark Reading: ".
Dark Reading
Websites Attack Attempts Rose in Q2
New data shows hackers hit websites, on average, every 25 minutes.
ATENTIONβΌ New - CVE-2017-15844
π Read
via "National Vulnerability Database".
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing the function for writing device values into flash, uninitialized memory can be written to flash.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-15828
π Read
via "National Vulnerability Database".
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while accessing the keystore in LK, an integer overflow vulnerability exists which may potentially lead to a buffer overflow.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-15825
π Read
via "National Vulnerability Database".
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing a gpt update, an out of bounds memory access may potentially occur.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-15818
π Read
via "National Vulnerability Database".
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while loading a user application in qseecom, an integer overflow could potentially occur if the application partition size is rounded up to page_size.π Read
via "National Vulnerability Database".
π΄ The Security Costs of Cloud-Native Applications π΄
π Read
via "Dark Reading: ".
More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?π Read
via "Dark Reading: ".
Darkreading
The Security Costs of Cloud-Native Applications
More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?
π΄ Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack π΄
π Read
via "Dark Reading: ".
Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.π Read
via "Dark Reading: ".
Darkreading
Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack
Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.
ATENTIONβΌ New - CVE-2017-6913
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.3-rev28 allows remote attackers to inject arbitrary web script or HTML via the event attribute in a time tag.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-3912
π Read
via "National Vulnerability Database".
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.π Read
via "National Vulnerability Database".
β How Facebook wants to protect political campaigners from hacking β
π Read
via "Naked Security".
The social network is trying to protect candidates, elected officials and their staff from "hackers and foreign adversaries".π Read
via "Naked Security".
Naked Security
How Facebook wants to protect political campaigners from hacking
The social network is trying to protect candidates, elected officials and their staff from βhackers and foreign adversariesβ.
π The 5 biggest blockchain myths, debunked π
π Read
via "Security on TechRepublic".
Blockchain stands to revolutionize many industries, but many people are still unsure of how the distributed ledger technology underpinning Bitcoin works.π Read
via "Security on TechRepublic".
TechRepublic
The 5 biggest blockchain myths, debunked
Blockchain stands to revolutionize many industries, but many people are still unsure of how the distributed ledger technology underpinning Bitcoin works.
β Years on, third party apps still exposing Grindr usersβ locations β
π Read
via "Naked Security".
A third party app can use Grindrβs distance data to pinpoint a users location down to a room within a house.π Read
via "Naked Security".
Naked Security
Years on, third party apps still exposing Grindr usersβ locations
A third party app can use Grindrβs distance data to pinpoint a users location down to a room within a house.
β Here we Mongo again! Millions of records exposed by insecure database β
π Read
via "Naked Security".
Another day, another poorly configured MongoDB database.π Read
via "Naked Security".
Naked Security
Here we Mongo again! Millions of records exposed by insecure database
Another day, another poorly configured MongoDB database.
β iOS 12 is here: these are the security features you need to know about β
π Read
via "Naked Security".
One year to the day after iOS 11 appeared, Apple yesterday released its replacement, iOS 12.π Read
via "Naked Security".
Naked Security
iOS 12 is here: these are the security features you need to know about
One year to the day after iOS 11 appeared, Apple yesterday released its replacement, iOS 12.
β XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins β
π Read
via "The first stop for security news | Threatpost ".
A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining.π Read
via "The first stop for security news | Threatpost ".
Threat Post
XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins
A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining.
β A Hybrid Solution to Taming SOC Alert Overload β
π Read
via "The first stop for security news | Threatpost ".
Technology can free analysts from the burden of manual and tedious tasks so they can operate at the highest level of their abilities.π Read
via "The first stop for security news | Threatpost ".
Threat Post
A Hybrid Solution to Taming SOC Alert Overload
Technology can free analysts from the burden of manual and tedious tasks so they can operate at the highest level of their abilities.