β Man who shared Deadpool movie on Facebook faces 6 months in jail β
π Read
via "Naked Security".
US government recommended six months behind bars. Thatβs one month for every million people that viewed a part of the pirated movie, apparently.π Read
via "Naked Security".
Naked Security
Man who shared Deadpool movie on Facebook faces 6 months in jail
US government recommended six months behind bars. Thatβs one month for every million people that viewed a part of the pirated movie, apparently.
β Magecart Strikes Again, Siphoning Payment Info from Newegg β
π Read
via "The first stop for security news | Threatpost ".
The data breach, hard on the heels of the British Airways breach, shows that Magecart is quickly evolving and shows no signs of slowing down.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Magecart Strikes Again, Siphoning Payment Info from Newegg
The incident, hard on the heels of the British Airways breach, shows that Magecart is quickly evolving and shows no signs of slowing down.
π΄ Turn the NIST Cybersecurity Framework into Reality: 5 Steps π΄
π Read
via "Dark Reading: ".
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.π Read
via "Dark Reading: ".
Dark Reading
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.
π Account takeover attacks ramping up, leading to explosion of phishing π
π Read
via "Security on TechRepublic".
ATO attacks steal a person's credentials and use them to send emails from their account, according to a recent Barracuda Networks report.π Read
via "Security on TechRepublic".
TechRepublic
Account takeover attacks ramping up, leading to explosion of phishing
ATO attacks steal a person's credentials and use them to send emails from their account, according to a recent Barracuda Networks report.
β Cisco Issues New Warning for 6-Month-Old Critical Bug in IOS XE β
π Read
via "The first stop for security news | Threatpost ".
Vulnerability allowed an unauthenticated remote attacker to log in to a device at the time the system initially boots up.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Cisco Issues New Warning for 6-Month-Old Critical Bug in IOS XE
Vulnerability allowed an unauthenticated remote attacker to log in to a device at the time the system initially boots up.
π΄ Turn the NIST Cybersecurity Framework into Reality: 5 Steps π΄
π Read
via "Dark Reading: ".
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.π Read
via "Dark Reading: ".
Dark Reading
Turn the NIST Cybersecurity Framework into Reality: 4 Steps
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.
π΄ Japanese Cryptocurrency Exchange Hit with $60M Theft π΄
π Read
via "Dark Reading: ".
The incident highlights a broader problem of poor security in cryptocurrency exchanges throughout the country.π Read
via "Dark Reading: ".
Dark Reading
Japanese Cryptocurrency Exchange Hit with $60M Theft
The incident highlights a broader problem of poor security in cryptocurrency exchanges throughout the country.
π΄ 3 Drivers Behind the Increasing Frequency of DDoS Attacks π΄
π Read
via "Dark Reading: ".
What's causing the uptick? Motivation, opportunity, and new capabilities.π Read
via "Dark Reading: ".
Darkreading
3 Drivers Behind the Increasing Frequency of DDoS Attacks
What's causing the uptick? Motivation, opportunity, and new capabilities.
β Warning issued as Netflix subscribers hit by phishing attack β
π Read
via "Naked Security".
Netflix phishing scammers are at it again, sending emails that try to steal sensitive details from subscribers.π Read
via "Naked Security".
Naked Security
Warning issued as Netflix subscribers hit by phishing attack
Netflix phishing scammers are at it again, sending emails that try to steal sensitive details from subscribers.
β Bitcoin flaw could have allowed dreaded 51% takeover β
π Read
via "Naked Security".
The scenario was always hypothetical but the fact such a thing was even possible until this week has left some in the Bitcoin community feeling alarmed.π Read
via "Naked Security".
Naked Security
Bitcoin flaw could have allowed dreaded 51% takeover
The scenario was always hypothetical but the fact such a thing was even possible until this week has left some in the Bitcoin community feeling alarmed.
π΄ Executive Branch Makes Significant Progress As DMARC Deadline Nears π΄
π Read
via "Dark Reading: ".
The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.π Read
via "Dark Reading: ".
Dark Reading
Executive Branch Makes Significant Progress As DMARC Deadline Nears
The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.
π You can now trade oil and wheat on the blockchain, as commodities hit the platform π
π Read
via "Security on TechRepublic".
In an effort to increase transparency and prevent fraud, blockchain may be the next platform for trading goods.π Read
via "Security on TechRepublic".
TechRepublic
You can now trade oil and wheat on the blockchain, as commodities hit the platform
In an effort to increase transparency and prevent fraud, blockchain may be the next platform for trading goods.
π΄ Data Manipulation: How Security Pros Can Respond to an Emerging Threat π΄
π Read
via "Dark Reading: ".
Industry leaders are scrambling to address the issue, which will take new thinking to overcome.π Read
via "Dark Reading: ".
Darkreading
Data Manipulation: How Security Pros Can Respond to an Emerging Threat
Industry leaders are scrambling to address the issue, which will take new thinking to overcome.
β Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution β
π Read
via "The first stop for security news | Threatpost ".
Microsoft said that it's working on a fix for a zero-day flaw in its JET Database Engine.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution
Microsoft said that itβs working on a fix for a zero-day flaw in its JET Database Engine.
π΄ US Approves Cyber Weapons Against Foreign Enemies π΄
π Read
via "Dark Reading: ".
The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ 6 Security Training Hacks to Increase Cyber IQ Org-Wide π΄
π Read
via "Dark Reading: ".
Move beyond generic, annual security awareness training with these important tips.π Read
via "Dark Reading: ".
Darkreading
6 Security Training Hacks to Increase Cyber IQ Org-Wide
Move beyond generic, annual security awareness training with these important tips.
ATENTIONβΌ New - CVE-2013-7203
π Read
via "National Vulnerability Database".
gitolite before commit fa06a34 might allow local users to read arbitrary files in repositories via vectors related to the user umask when running gitolite setup.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4451
π Read
via "National Vulnerability Database".
gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.π Read
via "National Vulnerability Database".
π΄ Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware π΄
π Read
via "Dark Reading: ".
Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.π Read
via "Dark Reading: ".
Darkreading
Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware
Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.
β Delphi Packer Looks for Human Behavior Before Deploying Payload β
π Read
via "The first stop for security news | Threatpost ".
Many different threat actors are using this crypting service/tool for their operations, possibly buying it from the developer itself.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Delphi Packer Looks for Human Behavior Before Deploying Payload
Many different threat actors are using this crypting service/tool for their operations, possibly buying it from the developer itself.
β Twitter Flaw Exposed Direct Messages To External Developers β
π Read
via "The first stop for security news | Threatpost ".
The company said it has issued a patch for the issue, which has been ongoing since May 2017.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Twitter Flaw Exposed Direct Messages To External Developers
The company said it has issued a patch for the issue, which has been ongoing since May 2017.