π How companies can diversify their cybersecurity teams π
π Read
via "Security on TechRepublic".
At RSA 2019, Elena Elkina of Women in Security and Privacy discussed how businesses can seek out female and minority candidates for cybersecurity jobs.π Read
via "Security on TechRepublic".
TechRepublic
How companies can diversify their cybersecurity teams
At RSA 2019, Elena Elkina of Women in Security and Privacy discussed how businesses can seek out female and minority candidates for cybersecurity jobs.
β RSA Conference 2019: Operational Technology Widens Supply Chain Attack Surfaces β
π Read
via "Threatpost".
Between operational technology and open source, the supply chain is rapidly expanding - and companies that can't keep up will be the next security targets, said experts at RSA Conference 2019.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: Operational Technology Widens Supply Chain Attack Surfaces
Between operational technology and open source, the supply chain is rapidly expanding - and companies that can't keep up will be the next security targets, said experts at RSA Conference 2019.
π΄ Citrix Hacked by 'International Cybercriminals' π΄
π Read
via "Dark Reading: ".
FBI informed Citrix this week of a data breach that appears to have begun with a 'password spraying' attack to steal weak credentials to access the company's network.π Read
via "Dark Reading: ".
Darkreading
Citrix Hacked by 'International Cybercriminals'
FBI informed Citrix this week of a data breach that appears to have begun with a 'password spraying' attack to steal weak credentials to access the company's network.
π΄ Shifting Attacks Put Increasing ID Fraud Burden on Consumers π΄
π Read
via "Dark Reading: ".
Card-present fraud is down, but attackers continue to find new strategies, and consumers are paying the price.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Tina Fey, RSAC, and Parallels Between Improv and Cyber π΄
π Read
via "Dark Reading: ".
This year's RSA Conference concluded with actress Tina Fey and program chair Hugh Thompson chatting about teambuilding, diversity, and improv.π Read
via "Dark Reading: ".
Dark Reading
Tina Fey, RSAC, and Parallels Between Improv and Cyber
This year's RSA Conference concluded with actress Tina Fey and program chair Hugh Thompson chatting about teambuilding, diversity, and improv.
ATENTIONβΌ New - CVE-2017-3164
π Read
via "National Vulnerability Database".
Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.π Read
via "National Vulnerability Database".
π Will we see a federal privacy law in the US? π
π Read
via "Security on TechRepublic".
At RSA 2019, Dana Simberkoff of AvePoint discussed how companies can reevaluate privacy policies.π Read
via "Security on TechRepublic".
TechRepublic
Will we see a federal privacy law in the US?
At RSA 2019, Dana Simberkoff of AvePoint discussed how companies can reevaluate privacy policies.
β RSA Conference 2019: The Expanding Automation Platform Attack Surface β
π Read
via "Threatpost".
Hacking into smart homes is becoming increasingly easy and a great way to steal victims' personal information, Trend Micro said at RSA 2019.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: The Expanding Automation Platform Attack Surface
Hacking into smart homes is becoming increasingly easy and a great way to steal victims' personal information, Trend Micro said at RSA 2019.
π Do bug bounties help open source security? π
π Read
via "Security on TechRepublic".
The biggest problem of targeting open source software to find security issues relates to IT.π Read
via "Security on TechRepublic".
TechRepublic
Do bug bounties help open source security?
The biggest problem of targeting open source software to find security issues relates to IT.
π How to protect your small business from the dark web π
π Read
via "Security on TechRepublic".
Education, monitoring and response tools, and training about the dark web are essential to protecting your small business from cybercriminals.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your small business from the dark web
Education, monitoring and response tools, and training about the dark web are essential to protecting your small business from cybercriminals.
π Unintended inferences: The biggest threat to data privacy and cybersecurity π
π Read
via "Security on TechRepublic".
Find out why data privacy breaches and scandals (think Facebook, Marriott, and Yahoo), artificial intelligence, and analytics have implications for how your business manages cybersecurity.π Read
via "Security on TechRepublic".
TechRepublic
Unintended inferences: The biggest threat to data privacy and cybersecurity
Find out why data privacy breaches and scandals (think Facebook, Marriott, and Yahoo), artificial intelligence, and analytics have implications for how your business manages cybersecurity.
π Everything you need to know about Windows updates π
π Read
via "Security on TechRepublic".
Beyond Patch Tuesday: understanding the different monthly security and quality updates for Windows, and how they're getting more efficient.π Read
via "Security on TechRepublic".
TechRepublic
Everything you need to know about Windows updates
Beyond Patch Tuesday: understanding the different monthly security and quality updates for Windows, and how they're getting more efficient.
β Monday review β the hot 25 stories of the week β
π Read
via "Naked Security".
From a serious Chrome zero-day to Comcast's security nightmare, and everything in between - it's weekly roundup time.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β FTC says taxpayer voice phishing scams are up nearly 20x β
π Read
via "Naked Security".
The real Social Security people will never call to threaten your benefits or tell you to wire money, send cash, or put money on gift cards.π Read
via "Naked Security".
Naked Security
FTC says taxpayer voice phishing scams are up nearly 20x
The real Social Security people will never call to threaten your benefits or tell you to wire money, send cash, or put money on gift cards.
β Booking a restaurant? Let Googleβs Duplex AI make the call for you β
π Read
via "Naked Security".
Bon appΓ©tit, Dave. Google's table-booking Duplex AI needs to pass the creepy test.π Read
via "Naked Security".
Naked Security
Booking a restaurant? Let Googleβs Duplex AI make the call for you
Bon appΓ©tit, Dave. Googleβs table-booking Duplex AI needs to pass the creepy test.
β US Army clarifies its killer robot plans β
π Read
via "Naked Security".
The US Army has been forced to clarify its intentions for killer robots after unveiling a new program to build AI-powered targeting systems last month.π Read
via "Naked Security".
Naked Security
US Army clarifies its killer robot plans
The US Army has been forced to clarify its intentions for killer robots after unveiling a new program to build AI-powered targeting systems last month.
π Vulnerabilities in industrial Ethernet switches allow for credential theft, denial-of-service attacks π
π Read
via "Security on TechRepublic".
Industrial Ethernet switches from Moxa were found to lack basic security measures, making it possible to brute-force access to the switch management console, according to Positive Technologies.π Read
via "Security on TechRepublic".
TechRepublic
Vulnerabilities in industrial Ethernet switches allow for credential theft, denial-of-service attacks
Industrial Ethernet switches from Moxa were found to lack basic security measures, making it possible to brute-force access to the switch management console, according to Positive Technologies.
π΄ IT Security Administrators Aren't Invincible π΄
π Read
via "Dark Reading: ".
IT security administrators and their teams are responsible for evaluating an organization's security tools and technologies, but are they armed with the proper tools, considerations, and budget to do so? Fourth in a six-part series.π Read
via "Dark Reading: ".
Dark Reading
IT Security Administrators Aren't Invincible
IT security administrators and their teams are responsible for evaluating an organization's security tools and technologies, but are they armed with the proper tools, considerations, and budget to do so? Fourth in a six-part series.
β Facebook Alleges Two Ukrainians Scraped Data From 63K Profiles β
π Read
via "Threatpost".
Facebook is suing two Ukrainian men who were able to scrape data from 63,000 users' profiles by enticing users to download a malicious browser extension.π Read
via "Threatpost".
Threat Post
Facebook Alleges Two Ukrainians Scraped Data From 63K Profiles
Facebook is suing two Ukrainian men who were able to scrape data from 63,000 users' profiles by enticing users to download a malicious browser extension.
π΄ Georgia's Jackson County Pays $400K to Ransomware Attackers π΄
π Read
via "Dark Reading: ".
The ransomware campaign started March 1 and shut down most of Jackson County's IT systems.π Read
via "Dark Reading: ".
Dark Reading
Georgia's Jackson County Pays $400K to Ransomware Attackers
The ransomware campaign started March 1 and shut down most of Jackson County's IT systems.
π 10 popular malware campaigns your business should avoid π
π Read
via "Security on TechRepublic".
Coinhive is at the top of the global threat index for the 15th consecutive month, according to a Check Point report.π Read
via "Security on TechRepublic".
TechRepublic
10 popular malware campaigns your business should avoid
Coinhive is at the top of the global threat index for the 15th consecutive month, according to a Check Point report.