ATENTIONβΌ New - CVE-2017-15825
π Read
via "National Vulnerability Database".
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing a gpt update, an out of bounds memory access may potentially occur.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-15818
π Read
via "National Vulnerability Database".
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while loading a user application in qseecom, an integer overflow could potentially occur if the application partition size is rounded up to page_size.π Read
via "National Vulnerability Database".
π΄ The Security Costs of Cloud-Native Applications π΄
π Read
via "Dark Reading: ".
More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?π Read
via "Dark Reading: ".
Darkreading
The Security Costs of Cloud-Native Applications
More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?
π΄ Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack π΄
π Read
via "Dark Reading: ".
Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.π Read
via "Dark Reading: ".
Darkreading
Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack
Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.
ATENTIONβΌ New - CVE-2017-6913
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.3-rev28 allows remote attackers to inject arbitrary web script or HTML via the event attribute in a time tag.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-3912
π Read
via "National Vulnerability Database".
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.π Read
via "National Vulnerability Database".
β How Facebook wants to protect political campaigners from hacking β
π Read
via "Naked Security".
The social network is trying to protect candidates, elected officials and their staff from "hackers and foreign adversaries".π Read
via "Naked Security".
Naked Security
How Facebook wants to protect political campaigners from hacking
The social network is trying to protect candidates, elected officials and their staff from βhackers and foreign adversariesβ.
π The 5 biggest blockchain myths, debunked π
π Read
via "Security on TechRepublic".
Blockchain stands to revolutionize many industries, but many people are still unsure of how the distributed ledger technology underpinning Bitcoin works.π Read
via "Security on TechRepublic".
TechRepublic
The 5 biggest blockchain myths, debunked
Blockchain stands to revolutionize many industries, but many people are still unsure of how the distributed ledger technology underpinning Bitcoin works.
β Years on, third party apps still exposing Grindr usersβ locations β
π Read
via "Naked Security".
A third party app can use Grindrβs distance data to pinpoint a users location down to a room within a house.π Read
via "Naked Security".
Naked Security
Years on, third party apps still exposing Grindr usersβ locations
A third party app can use Grindrβs distance data to pinpoint a users location down to a room within a house.
β Here we Mongo again! Millions of records exposed by insecure database β
π Read
via "Naked Security".
Another day, another poorly configured MongoDB database.π Read
via "Naked Security".
Naked Security
Here we Mongo again! Millions of records exposed by insecure database
Another day, another poorly configured MongoDB database.
β iOS 12 is here: these are the security features you need to know about β
π Read
via "Naked Security".
One year to the day after iOS 11 appeared, Apple yesterday released its replacement, iOS 12.π Read
via "Naked Security".
Naked Security
iOS 12 is here: these are the security features you need to know about
One year to the day after iOS 11 appeared, Apple yesterday released its replacement, iOS 12.
β XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins β
π Read
via "The first stop for security news | Threatpost ".
A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining.π Read
via "The first stop for security news | Threatpost ".
Threat Post
XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins
A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining.
β A Hybrid Solution to Taming SOC Alert Overload β
π Read
via "The first stop for security news | Threatpost ".
Technology can free analysts from the burden of manual and tedious tasks so they can operate at the highest level of their abilities.π Read
via "The first stop for security news | Threatpost ".
Threat Post
A Hybrid Solution to Taming SOC Alert Overload
Technology can free analysts from the burden of manual and tedious tasks so they can operate at the highest level of their abilities.
π΄ 8 Keys to a Successful Penetration Test π΄
π Read
via "Dark Reading: ".
Pen tests are expensive, but there are key factors that can make them worth the investment.π Read
via "Dark Reading: ".
Darkreading
8 Keys to a Successful Penetration Test
Pen tests are expensive, but there are key factors that can make them worth the investment.
β URL spoofing β what it is and what to do about it [VIDEO] β
π Read
via "Naked Security".
What happens if your browser doesn't tell you the truth about the identity of the website you're looking at?π Read
via "Naked Security".
Naked Security
URL spoofing β what it is and what to do about it [VIDEO]
What happens if your browser doesnβt tell you the truth about the identity of the website youβre looking at?
π΄ 5 Steps to Success for New CISOs π΄
π Read
via "Dark Reading: ".
You've been hired to make an impact. These tips can help set you up for continued success.π Read
via "Dark Reading: ".
Darkreading
5 Steps to Success for New CISOs
You've been hired to make an impact. These tips can help set you up for continued success.
π΄ FBI: Phishing Attacks Aim to Swap Payroll Information π΄
π Read
via "Dark Reading: ".
Social engineering scams target employees' payroll credentials so attackers can access and change their bank account data.π Read
via "Dark Reading: ".
Darkreading
FBI: Phishing Attacks Aim to Swap Payroll Information
Social engineering scams target employees' payroll credentials so attackers can access and change their bank account data.
π How credential stuffing contributed to 8.3B malicious botnet logins in early 2018 π
π Read
via "Security on TechRepublic".
Malicious login attempts from bots increased by by almost 2 billion from April to May 2018. Here's who is at risk.π Read
via "Security on TechRepublic".
TechRepublic
How credential stuffing contributed to 8.3B malicious botnet logins in early 2018
Malicious login attempts from bots increased by by almost 2 billion from April to May 2018. Here's who is at risk.
ATENTIONβΌ New - CVE-2017-1794
π Read
via "National Vulnerability Database".
IBM Tivoli Monitoring 6.2.3 through 6.2.3.5 and 6.3.0 through 6.3.0.7 are vulnerable to both TEPS user privilege escalation and possible denial of service due to unconstrained memory growth. IBM X-Force ID: 137039.π Read
via "National Vulnerability Database".
π΄ The Risk Management Struggle π΄
π Read
via "Dark Reading: ".
The majority of organizations are struggling to implement a risk-based approach to security - even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!π Read
via "Dark Reading: ".
β Critical Out-of-Band Patch Issued for Adobe Acrobat Reader β
π Read
via "The first stop for security news | Threatpost ".
Overall seven flaws were patched - including one critical vulnerability that could lead to arbitrary code execution.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Critical Out-of-Band Patch Issued for Adobe Acrobat Reader
Overall seven flaws were patched - including one critical vulnerability that could lead to arbitrary code execution.