π΄ Former Kaspersky Lab Expert Sentenced in Russia for Treason π΄
π Read
via "Dark Reading: ".
Ruslan Stoyanov gets 14 years in Russian prison.π Read
via "Dark Reading: ".
Dark Reading
Former Kaspersky Lab Expert Sentenced in Russia for Treason
Ruslan Stoyanov gets 14 years in Russian prison.
π΄ Researchers Build Framework for Browser-Based Botnets π΄
π Read
via "Dark Reading: ".
HTML5 used to build persistent malware on victims' computers.π Read
via "Dark Reading: ".
Darkreading
Researchers Build Framework for Browser-Based Botnets
HTML5 used to build persistent malware on victims' computers.
π Senator Asks Healthcare Industry What It's Doing to Prevent Cyberattacks π
π Read
via "Subscriber Blog RSS Feed ".
With insight from stakeholders, the politician hopes to develop a strategy to improve the healthcare industry's cybersecurity posture.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Senator Asks Healthcare Industry What It's Doing to Prevent Cyberattacks
With insight from stakeholders, the politician hopes to develop a strategy to improve the healthcare industry's cybersecurity posture.
β Millions of utilities customersβ passwords stored in plain text β
π Read
via "Naked Security".
Plain-text, unencrypted passwords were sent instead of having users reset them. There was no breach, the firm claims, but how would it know?π Read
via "Naked Security".
Naked Security
Millions of utilities customersβ passwords stored in plain text
Plain-text, unencrypted passwords were sent instead of having users reset them. There was no breach, the firm claims, but how would it know?
β Police bust their own radio shop manager for dodgy software updates β
π Read
via "Naked Security".
Police allege that he updated radios with fraudulent software from a radio enthusiast who allegedly hacked encrypted radios for drug cartels.π Read
via "Naked Security".
Naked Security
Police bust their own radio shop manager for dodgy software updates
Police allege that he updated radios with fraudulent software from a radio enthusiast who allegedly hacked encrypted radios for drug cartels.
β Researchers break e-signatures in 22 common PDF viewers β
π Read
via "Naked Security".
Researchers have discovered a flaw in some PDF document viewers that allows new content to be added to documents without breaking the electronic signatures.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Nvidia patches eight security flaws in graphics products β
π Read
via "Naked Security".
Chip maker Nvidia has released a security update, fixing eight CVE flaws in its Windows and Linux graphics display drivers.π Read
via "Naked Security".
Naked Security
Nvidia patches eight security flaws in graphics products
Chip maker Nvidia has released a security update, fixing eight CVE flaws in its Windows and Linux graphics display drivers.
β Bronze Union APT Updates Remote Access Trojans in Fresh Wave of Attacks β
π Read
via "Threatpost | The first stop for security news".
The China-linked threat group has returned in 2018 using updated RATs to launch its attacks, including ZxShell, Gh0st RAT, and SysUpdate malware.π Read
via "Threatpost | The first stop for security news".
Threat Post
RSAC 2019: Bronze Union APT Updates Remote Access Trojans in Fresh Wave of Attacks
The China-linked threat group has returned in 2018 using updated RATs to launch its attacks, including ZxShell, Gh0st RAT, and SysUpdate malware.
π Why businesses fear cyberattacks from ex-employees more than nation states π
π Read
via "Security on TechRepublic".
A major data breach would likely shut down half of SMBs permanently, according to an AppRiver report.π Read
via "Security on TechRepublic".
TechRepublic
Why businesses fear cyberattacks from ex-employees more than nation states
A major data breach would likely shut down half of SMBs permanently, according to an AppRiver report.
β Ep.021 β Leaked calls, a social media virus and passwords exposed [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - enjoy!π Read
via "Naked Security".
Naked Security
Ep.021 β Leaked calls, a social media virus and passwords exposed [PODCAST]
Hereβs the latest Naked Security podcast β enjoy!
π΄ Embracing DevSecOps: 5 Processes to Improve DevOps Security π΄
π Read
via "Dark Reading: ".
In the cyber threat climate of the 21st century, sticking with DevOps is no longer an option.π Read
via "Dark Reading: ".
Darkreading
Embracing DevSecOps: 5 Processes to Improve DevOps Security
In the cyber threat climate of the 21st century, sticking with DevOps is no longer an option.
β Thunderclap Flaws Shatter Peripheral Security β
π Read
via "Threatpost | The first stop for security news".
Many machines, including almost all Apple laptops and desktops produced since 2011, are vulnerable to data exfiltration via weaponized peripherals.π Read
via "Threatpost | The first stop for security news".
Threat Post
Thunderclap Flaws Shatter Peripheral Security
Many machines, including almost all Apple laptops and desktops produced since 2011, are vulnerable to data exfiltration via weaponized peripherals.
π New detection method identifies cryptomining and other fileless malware attacks π
π Read
via "Security on TechRepublic".
SentinelOne and Intel announced a new method to detect cryptomining and cryptojacking attacks using hardware-based detection technology.π Read
via "Security on TechRepublic".
TechRepublic
New detection method identifies cryptomining and other fileless malware attacks
SentinelOne and Intel announced a new method to detect cryptomining and cryptojacking attacks using hardware-based detection technology.
β Cisco Patches High-Severity Webex Vulnerability For Third Time β
π Read
via "Threatpost | The first stop for security news".
Third time's hopefully a charm for Cisco, which has patched a high-severity flaw once again in its Webex video conferencing platform.π Read
via "Threatpost | The first stop for security news".
Threat Post
Cisco Patches High-Severity Webex Vulnerability For Third Time
Third time's hopefully a charm for Cisco as it patches a high-severity Webex flaw once again.
β Ring Doorbell Flaw Opens Door to Spying β
π Read
via "Threatpost | The first stop for security news".
Researchers are urging Ring users to update to the latest version of the smart doorbell after a serious flaw triggered privacy concerns.π Read
via "Threatpost | The first stop for security news".
Threat Post
Ring Doorbell Flaw Opens Door to Spying
Researchers are urging Ring users to update to the latest version of the smart doorbell after a serious flaw triggered privacy concerns.
β Card-Skimming Scripts Hide Behind Google Analytics, Angular β
π Read
via "Threatpost | The first stop for security news".
The campaign is marked by a significant level of customization, with an βindividualized yet very consistent approach to every compromise.π Read
via "Threatpost | The first stop for security news".
Threat Post
Card-Skimming Scripts Hide Behind Google Analytics, Angular
The campaign is marked by a significant level of customization, with an βindividualized yet very consistent approach to every compromise
π΄ Whose Line Is It? When Voice Phishing Attacks Get Sneaky π΄
π Read
via "Dark Reading: ".
Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.π Read
via "Dark Reading: ".
Darkreading
Whose Line Is It? When Voice Phishing Attacks Get Sneaky
Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.
π What is GLBA Compliance? Understanding the Data Protection Requirements of the Gramm-Leach-Bliley Act in 2019 π
π Read
via "Subscriber Blog RSS Feed ".
Learn about what GLBA means for data protection and how to achieve GLBA compliance in Data Protection 101, our series on the fundamentals of information security.π Read
via "Subscriber Blog RSS Feed ".
Digitalguardian
What is GLBA Compliance? (Understand Requirements)
Learn about what GLBA means for data protection and how to achieve GLBA compliance in Data Protection 101, our series on the fundamentals of information security.
π Software vulnerabilities are becoming more numerous, less understood π
π Read
via "Security on TechRepublic".
Operating a database of software vulnerabilities is a challenging undertaking, according to private vulnerability database operator Risk Based Security.π Read
via "Security on TechRepublic".
TechRepublic
Software vulnerabilities are becoming more numerous, less understood
Operating a database of software vulnerabilities is a challenging undertaking, according to private vulnerability database operator Risk Based Security.
π΄ Stay Ahead of the Curve by Using AI in Compliance π΄
π Read
via "Dark Reading: ".
Although human oversight is required, advanced technologies built on AI will become pivotal in building safer financial markets and a safer world.π Read
via "Dark Reading: ".
Dark Reading
Stay Ahead of the Curve by Using AI in Compliance
Although human oversight is required, advanced technologies built on AI will become pivotal in building safer financial markets and a safer world.
π΄ Former Albany College Student Charged with Computer Damage π΄
π Read
via "Dark Reading: ".
Vishwanath Akuthota has been accused of using a 'USB killer device' to destroy dozens of computers, officials report.π Read
via "Dark Reading: ".
Darkreading
Former Albany College Student Charged with Computer Damage
Vishwanath Akuthota has been accused of using a 'USB killer device' to destroy dozens of computers, officials report.