β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From the Momo Challenge to Mozilla's potential insider threats from Aussie staff, and everything in between - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
From the Momo Challenge to Mozillaβs potential insider threats from Aussie staff, and everything in between β itβs weekly roundup time.
β Visitor Kiosk Access Systems Riddled with Bugs β
π Read
via "Threatpost".
Student researchers working with IBM X-Force Red team find security holes in five leading visitor management systems.π Read
via "Threatpost".
Threat Post
Visitor Kiosk Access Systems Riddled with Bugs
Student researchers working with IBM X-Force Red team find security holes in five leading visitor management systems.
β RSAC 2019: An Antidote for Tech Gone Wrong β
π Read
via "Threatpost".
As many ponder the big ethical questions around cyber, some are proposing public interest technologist as a solution.π Read
via "Threatpost".
Threat Post
RSAC 2019: An Antidote for Tech Gone Wrong
As many ponder the big ethical questions around cyber, some are proposing public interest technologist as a solution.
β Anomaly in pen-test tool made malware servers visible β
π Read
via "Naked Security".
A security company was able to track command and control traffic generated by hacking groups thanks to an anomaly in a pen-testing tool.π Read
via "Naked Security".
Naked Security
Anomaly in pen-test tool made malware servers visible
A security company was able to track command and control traffic generated by hacking groups thanks to an anomaly in a pen-testing tool.
β Is a Facebookcoin in the works? β
π Read
via "Naked Security".
Facebook, Signal and Telegram are all planning cryptocurrencies. But why these companies, why now, and will they be successful?π Read
via "Naked Security".
Naked Security
Is a Facebookcoin in the works?
Facebook, Signal and Telegram are all planning cryptocurrencies. But why these companies, why now, and will they be successful?
β TikTok to pay record fine for collecting childrenβs data β
π Read
via "Naked Security".
It's been a predator's playground, where children's photos have been public by default and trolling adults could message them.π Read
via "Naked Security".
Naked Security
TikTok to pay record fine for collecting childrenβs data
Itβs been a predatorβs playground, where childrenβs photos have been public by default and trolling adults could message them.
β YouTube disables comments on millions of videos of children β
π Read
via "Naked Security".
After big brands pulled ads, YouTube banned millions of comments, closed hundreds of accounts, and sped up development of a predator filter.π Read
via "Naked Security".
Naked Security
YouTube disables comments on millions of videos of children
After big brands pulled ads, YouTube banned millions of comments, closed hundreds of accounts, and sped up development of a predator filter.
β Container Escape Hack Targets Vulnerable Linux Kernel β
π Read
via "Threatpost".
A proof-of-concept hack allows adversaries to tweak old exploits, have code jump containers and attack underlying infrastructure.π Read
via "Threatpost".
Threat Post
RSAC 2019: Container Escape Hack Targets Vulnerable Linux Kernel
A proof-of-concept hack allows adversaries to tweak old exploits, have code jump containers and attack underlying infrastructure.
β RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions β
π Read
via "Threatpost".
The workforce and skills gap in cybersecurity continues to plague organizations.π Read
via "Threatpost".
Threat Post
RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions
The workforce and skills gap in cybersecurity continues to plague organizations.
π Top 3 reasons cybersecurity pros are changing jobs π
π Read
via "Security on TechRepublic".
Training and certification offerings are becoming less effective in helping organizations retain security employees, according to an ISACA report.π Read
via "Security on TechRepublic".
TechRepublic
Top 3 reasons cybersecurity pros are changing jobs
Training and certification offerings are becoming less effective in helping organizations retain security employees, according to an ISACA report.
π΄ Here's What Happened When a SOC Embraced Automation π΄
π Read
via "Dark Reading: ".
Despite initial apprehension, security pros immediately began to notice some benefits.π Read
via "Dark Reading: ".
Dark Reading
Here's What Happened When a SOC Embraced Automation
Despite initial apprehension, security pros immediately began to notice some benefits.
π 3 reasons businesses are still failing at strong cybersecurity π
π Read
via "Security on TechRepublic".
Prioritizing risk under a deluge of vulnerabilities is stretching IT security professionals too thin, while the C-suite fails to provide adequate support, according to a Deloitte report.π Read
via "Security on TechRepublic".
TechRepublic
3 reasons businesses are still failing at strong cybersecurity
Prioritizing risk under a deluge of vulnerabilities is stretching IT security professionals too thin, while the C-suite fails to provide adequate support, according to a Deloitte report.
β Project Zero Discloses High-Severity Apple macOS Flaw β
π Read
via "Threatpost".
Google Project Zero researchers detailed a new high-severity macOS flaw after Apple failed to patch it by the 90-day disclosure deadline.π Read
via "Threatpost".
Threat Post
Project Zero Discloses High-Severity Apple macOS Flaw
Google Project Zero researchers detailed a new high-severity macOS flaw after Apple failed to patch it by the 90-day disclosure deadline.
π 3 ways geopolitical attacks could impact your business this year π
π Read
via "Security on TechRepublic".
Nearly 75% of CEOs say their companies are affected by geopolitical cyber attacks, but only 15% feel resilient, according to a PwC report.π Read
via "Security on TechRepublic".
TechRepublic
3 ways geopolitical attacks could impact your business this year
Nearly 75% of CEOs say their companies are affected by geopolitical cyber attacks, but only 15% feel resilient, according to a PwC report.
β Smart Ski Helmet Headphone Flaws Leak Personal, GPS Data β
π Read
via "Threatpost".
A rash of security flaws in the Outdoor Tech CHIPS smart headphones, which fit in ski helmets, allow bad actors to collect data like emails, passwords, GPS location - and even listen to conversations in real time.π Read
via "Threatpost".
Threat Post
Smart Ski Helmet Headphone Flaws Leak Personal, GPS Data
A rash of security flaws in the Outdoor Tech CHIPS smart headphones, which fit in ski helmets, allow bad actors to collect data like emails, passwords, GPS location - and even listen to conversations in real time.
ATENTIONβΌ New - CVE-2017-15515
π Read
via "National Vulnerability Database".
NetApp SnapCenter Server prior to 4.0 is susceptible to cross site scripting vulnerability that could allow a privileged user to inject arbitrary scripts into the custom secondary policy label field.π Read
via "National Vulnerability Database".
β Teen Becomes First to Earn $1M in Bug Bounties with HackerOne β
π Read
via "Threatpost".
He is also the all-time top-ranked hacker on HackerOneβs leaderboard, out of more than 330,000 hackers competing for the top spot.π Read
via "Threatpost".
Threat Post
Teen Becomes First to Earn $1M in Bug Bounties with HackerOne
He is also the all-time top-ranked hacker on HackerOneβs leaderboard, out of more than 330,000 hackers competing for the top spot.
π΄ Startup Armor Scientific Launches Multifactor Identity System π΄
π Read
via "Dark Reading: ".
Company aims to replace usernames and passwords by combining GPS location, biometrics, and keys issued through a blockchain-based network.π Read
via "Dark Reading: ".
Dark Reading
Startup Armor Scientific Launches Multifactor Identity System
Company aims to replace usernames and passwords by combining GPS location, biometrics, and keys issued through a blockchain-based network.
π΄ CrowdStrike Debuts Mobile Threat Detection System at RSA Conference π΄
π Read
via "Dark Reading: ".
Falcon for Mobile offers detection and response capabilities for mobile platforms.π Read
via "Dark Reading: ".
Dark Reading
CrowdStrike Debuts Mobile Threat Detection System at RSA Conference
Falcon for Mobile offers detection and response capabilities for mobile platforms.
π΄ Fixing Fragmentation Can Yield Tangible Benefits π΄
π Read
via "Dark Reading: ".
Consolidating technology and breaking down functional silos can bring solid financial results, a new study finds.π Read
via "Dark Reading: ".
Dark Reading
Fixing Fragmentation Can Yield Tangible Benefits
Consolidating technology and breaking down functional silos can bring solid financial results, a new study finds.
π΄ Bounty Hunters Find 100K+ Bugs Under HackerOne Program in 2018 π΄
π Read
via "Dark Reading: ".
Organizations signed up with the vulnerability disclosure platform shelled out a record $19 million for bug discoveries in their systems.π Read
via "Dark Reading: ".
Dark Reading
Bounty Hunters Find 100K+ Bugs Under HackerOne Program in 2018
Organizations signed up with the vulnerability disclosure platform shelled out a record $19 million for bug discoveries in their systems.