π΄ Security Experts, Not Users, Are the Weakest Link π΄
π Read
via "Dark Reading: ".
CISOs: Stop abdicating responsibility for problems with users - it's part of your job.π Read
via "Dark Reading: ".
Darkreading
Security Experts, Not Users, Are the Weakest Link
CISOs: Stop abdicating responsibility for problems with users, it's part of your job.
β Necurs Botnet Evolves to Hide in the Shadows, with New Payloads β
π Read
via "Threatpost".
Using an on-again, off-again strategy of C2 communication helps it hide from researchers.π Read
via "Threatpost".
Threat Post
Necurs Botnet Evolves to Hide in the Shadows, with New Payloads
Using an on-again, off-again strategy of C2 communication helps it hide from researchers.
β The Momo Challenge urban legend β what on earth is going on? β
π Read
via "Naked Security".
Why you shouldn't worry about the Momo Challenge, and what we can learn from it.π Read
via "Naked Security".
Naked Security
The Momo Challenge urban legend β what on earth is going on?
Why you shouldnβt worry about the Momo Challenge, and what we can learn from it.
π΄ Dow Jones Leak Exposes Watchlist Database π΄
π Read
via "Dark Reading: ".
The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.π Read
via "Dark Reading: ".
Dark Reading
Data Leak Exposes Dow Jones Watchlist Database
The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.
π Friday Five: 3/1 Edition π
π Read
via "Subscriber Blog RSS Feed ".
News on a new data privacy bill, the FTC's latest $5.7M fine, and hacking Instagram profiles - catch up on the week's infosec news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 3/1 Edition
News on a new data privacy bill, the FTC's latest $5.7M fine, and hacking Instagram profiles - catch up on the week's infosec news with this roundup!
β Podcast: RSA Conference 2019 Preview β
π Read
via "Threatpost".
The Threatpost team talks about the biggest cybersecurity stories, trends and research we'll see at RSA this year.π Read
via "Threatpost".
Threat Post
Podcast: RSA Conference 2019 Preview
The Threatpost team talks about the biggest cybersecurity stories, trends and research weβll see at RSA this year.
β Adobe Patches Critical ColdFusion Vulnerability With Active Exploit β
π Read
via "Threatpost".
Adobe has hurried out a patch for a critical arbitrary code execution vulnerability in its ColdFusion product.π Read
via "Threatpost".
Threat Post
Adobe Patches Critical ColdFusion Vulnerability With Active Exploit
Adobe has hurried out a patch for a critical arbitrary code execution vulnerability in its ColdFusion product.
β How the Dark Web Data Bazaar Fuels Enterprise Attacks β
π Read
via "Threatpost".
What does the age of near-ubiquitous data breaches, deep fakes, and fallible biometric authentication mean for enterprise security?π Read
via "Threatpost".
Threat Post
How the Dark Web Data Bazaar Fuels Enterprise Attacks
What does the age of near-ubiquitous data breaches, deep fakes, and fallible biometric authentication mean for enterprise security?
β RSAC 2019: New Operation Sharpshooter Data Reveals Higher Complexity, Scope β
π Read
via "Threatpost".
New look at server data behind a previously-identified espionage campaign shows that it has exceeded researchers' expectations in complexity, scope and breadth.π Read
via "Threatpost".
Threat Post
RSAC 2019: New Operation Sharpshooter Data Reveals Higher Complexity, Scope
New look at server data behind a previously-identified espionage campaign shows that it has exceeded researchersβ expectations in complexity, scope and breadth.
β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From the Momo Challenge to Mozilla's potential insider threats from Aussie staff, and everything in between - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
From the Momo Challenge to Mozillaβs potential insider threats from Aussie staff, and everything in between β itβs weekly roundup time.
β Visitor Kiosk Access Systems Riddled with Bugs β
π Read
via "Threatpost".
Student researchers working with IBM X-Force Red team find security holes in five leading visitor management systems.π Read
via "Threatpost".
Threat Post
Visitor Kiosk Access Systems Riddled with Bugs
Student researchers working with IBM X-Force Red team find security holes in five leading visitor management systems.
β RSAC 2019: An Antidote for Tech Gone Wrong β
π Read
via "Threatpost".
As many ponder the big ethical questions around cyber, some are proposing public interest technologist as a solution.π Read
via "Threatpost".
Threat Post
RSAC 2019: An Antidote for Tech Gone Wrong
As many ponder the big ethical questions around cyber, some are proposing public interest technologist as a solution.
β Anomaly in pen-test tool made malware servers visible β
π Read
via "Naked Security".
A security company was able to track command and control traffic generated by hacking groups thanks to an anomaly in a pen-testing tool.π Read
via "Naked Security".
Naked Security
Anomaly in pen-test tool made malware servers visible
A security company was able to track command and control traffic generated by hacking groups thanks to an anomaly in a pen-testing tool.
β Is a Facebookcoin in the works? β
π Read
via "Naked Security".
Facebook, Signal and Telegram are all planning cryptocurrencies. But why these companies, why now, and will they be successful?π Read
via "Naked Security".
Naked Security
Is a Facebookcoin in the works?
Facebook, Signal and Telegram are all planning cryptocurrencies. But why these companies, why now, and will they be successful?
β TikTok to pay record fine for collecting childrenβs data β
π Read
via "Naked Security".
It's been a predator's playground, where children's photos have been public by default and trolling adults could message them.π Read
via "Naked Security".
Naked Security
TikTok to pay record fine for collecting childrenβs data
Itβs been a predatorβs playground, where childrenβs photos have been public by default and trolling adults could message them.
β YouTube disables comments on millions of videos of children β
π Read
via "Naked Security".
After big brands pulled ads, YouTube banned millions of comments, closed hundreds of accounts, and sped up development of a predator filter.π Read
via "Naked Security".
Naked Security
YouTube disables comments on millions of videos of children
After big brands pulled ads, YouTube banned millions of comments, closed hundreds of accounts, and sped up development of a predator filter.
β Container Escape Hack Targets Vulnerable Linux Kernel β
π Read
via "Threatpost".
A proof-of-concept hack allows adversaries to tweak old exploits, have code jump containers and attack underlying infrastructure.π Read
via "Threatpost".
Threat Post
RSAC 2019: Container Escape Hack Targets Vulnerable Linux Kernel
A proof-of-concept hack allows adversaries to tweak old exploits, have code jump containers and attack underlying infrastructure.
β RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions β
π Read
via "Threatpost".
The workforce and skills gap in cybersecurity continues to plague organizations.π Read
via "Threatpost".
Threat Post
RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions
The workforce and skills gap in cybersecurity continues to plague organizations.
π Top 3 reasons cybersecurity pros are changing jobs π
π Read
via "Security on TechRepublic".
Training and certification offerings are becoming less effective in helping organizations retain security employees, according to an ISACA report.π Read
via "Security on TechRepublic".
TechRepublic
Top 3 reasons cybersecurity pros are changing jobs
Training and certification offerings are becoming less effective in helping organizations retain security employees, according to an ISACA report.
π΄ Here's What Happened When a SOC Embraced Automation π΄
π Read
via "Dark Reading: ".
Despite initial apprehension, security pros immediately began to notice some benefits.π Read
via "Dark Reading: ".
Dark Reading
Here's What Happened When a SOC Embraced Automation
Despite initial apprehension, security pros immediately began to notice some benefits.
π 3 reasons businesses are still failing at strong cybersecurity π
π Read
via "Security on TechRepublic".
Prioritizing risk under a deluge of vulnerabilities is stretching IT security professionals too thin, while the C-suite fails to provide adequate support, according to a Deloitte report.π Read
via "Security on TechRepublic".
TechRepublic
3 reasons businesses are still failing at strong cybersecurity
Prioritizing risk under a deluge of vulnerabilities is stretching IT security professionals too thin, while the C-suite fails to provide adequate support, according to a Deloitte report.