π΄ 3 Drivers Behind the Increasing Frequency of DDoS Attacks π΄
π Read
via "Dark Reading: ".
What's causing the uptick? Motivation, opportunity, and new capabilities.π Read
via "Dark Reading: ".
Darkreading
3 Drivers Behind the Increasing Frequency of DDoS Attacks
What's causing the uptick? Motivation, opportunity, and new capabilities.
β Warning issued as Netflix subscribers hit by phishing attack β
π Read
via "Naked Security".
Netflix phishing scammers are at it again, sending emails that try to steal sensitive details from subscribers.π Read
via "Naked Security".
Naked Security
Warning issued as Netflix subscribers hit by phishing attack
Netflix phishing scammers are at it again, sending emails that try to steal sensitive details from subscribers.
β Bitcoin flaw could have allowed dreaded 51% takeover β
π Read
via "Naked Security".
The scenario was always hypothetical but the fact such a thing was even possible until this week has left some in the Bitcoin community feeling alarmed.π Read
via "Naked Security".
Naked Security
Bitcoin flaw could have allowed dreaded 51% takeover
The scenario was always hypothetical but the fact such a thing was even possible until this week has left some in the Bitcoin community feeling alarmed.
π΄ Executive Branch Makes Significant Progress As DMARC Deadline Nears π΄
π Read
via "Dark Reading: ".
The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.π Read
via "Dark Reading: ".
Dark Reading
Executive Branch Makes Significant Progress As DMARC Deadline Nears
The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.
π You can now trade oil and wheat on the blockchain, as commodities hit the platform π
π Read
via "Security on TechRepublic".
In an effort to increase transparency and prevent fraud, blockchain may be the next platform for trading goods.π Read
via "Security on TechRepublic".
TechRepublic
You can now trade oil and wheat on the blockchain, as commodities hit the platform
In an effort to increase transparency and prevent fraud, blockchain may be the next platform for trading goods.
π΄ Data Manipulation: How Security Pros Can Respond to an Emerging Threat π΄
π Read
via "Dark Reading: ".
Industry leaders are scrambling to address the issue, which will take new thinking to overcome.π Read
via "Dark Reading: ".
Darkreading
Data Manipulation: How Security Pros Can Respond to an Emerging Threat
Industry leaders are scrambling to address the issue, which will take new thinking to overcome.
β Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution β
π Read
via "The first stop for security news | Threatpost ".
Microsoft said that it's working on a fix for a zero-day flaw in its JET Database Engine.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution
Microsoft said that itβs working on a fix for a zero-day flaw in its JET Database Engine.
π΄ US Approves Cyber Weapons Against Foreign Enemies π΄
π Read
via "Dark Reading: ".
The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ 6 Security Training Hacks to Increase Cyber IQ Org-Wide π΄
π Read
via "Dark Reading: ".
Move beyond generic, annual security awareness training with these important tips.π Read
via "Dark Reading: ".
Darkreading
6 Security Training Hacks to Increase Cyber IQ Org-Wide
Move beyond generic, annual security awareness training with these important tips.
ATENTIONβΌ New - CVE-2013-7203
π Read
via "National Vulnerability Database".
gitolite before commit fa06a34 might allow local users to read arbitrary files in repositories via vectors related to the user umask when running gitolite setup.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4451
π Read
via "National Vulnerability Database".
gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.π Read
via "National Vulnerability Database".
π΄ Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware π΄
π Read
via "Dark Reading: ".
Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.π Read
via "Dark Reading: ".
Darkreading
Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware
Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.
β Delphi Packer Looks for Human Behavior Before Deploying Payload β
π Read
via "The first stop for security news | Threatpost ".
Many different threat actors are using this crypting service/tool for their operations, possibly buying it from the developer itself.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Delphi Packer Looks for Human Behavior Before Deploying Payload
Many different threat actors are using this crypting service/tool for their operations, possibly buying it from the developer itself.
β Twitter Flaw Exposed Direct Messages To External Developers β
π Read
via "The first stop for security news | Threatpost ".
The company said it has issued a patch for the issue, which has been ongoing since May 2017.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Twitter Flaw Exposed Direct Messages To External Developers
The company said it has issued a patch for the issue, which has been ongoing since May 2017.
π 10 signs you aren't cut out to be a cybersecurity specialist π
π Read
via "Security on TechRepublic".
A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?π Read
via "Security on TechRepublic".
TechRepublic
10 signs you may not be cut out for a cybersecurity job
A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?
π 10 signs you aren't cut out to be a cybersecurity specialist π
π Read
via "Security on TechRepublic".
A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?π Read
via "Security on TechRepublic".
TechRepublic
10 signs you may not be cut out for a cybersecurity job
A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?
π΄ The 'Opsec Fail' That Helped Unmask a North Korean State Hacker π΄
π Read
via "Dark Reading: ".
How Park Jin Hyok - charged by the US government for alleged computer crimes for the Sony, Bank of Bangladesh, WannaCry cyberattacks - inadvertently blew his cover via email accounts.π Read
via "Dark Reading: ".
Dark Reading
The 'Opsec Fail' That Helped Unmask a North Korean State Hacker
How Park Jin Hyok - charged by the US government for alleged computer crimes for the Sony, Bank of Bangladesh, WannaCry cyberattacks - inadvertently blew his cover via email accounts.
β Critical Vulnerability Found in Cisco Video Surveillance Manager β
π Read
via "The first stop for security news | Threatpost ".
Cisco has patched vulnerability in its video surveillance manager software that could give an unauthenticated, remote attacker the ability to execute arbitrary commands on targeted systems.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Critical Vulnerability Found in Cisco Video Surveillance Manager
Cisco has patched vulnerability in its video surveillance manager software that could give an unauthenticated, remote attacker the ability to execute arbitrary commands on targeted systems.
π ProTip: Automate setting a firmware password on Apple computers π
π Read
via "Security on TechRepublic".
Securing Mac computers means more than just protecting the data. Limiting the ways a user can gain access to a device--including bypassing the existing OS or resetting account passwords is easily enabled with a simple command.π Read
via "Security on TechRepublic".
TechRepublic
How to automate setting a firmware password on Apple computers
Securing Mac computers means more than just protecting the data--limiting how a user can gain access to a device is easy to enable with a simple command.
β Podcast: Two Billion IoT Devices Still Vulnerable to BlueBorne Bug β
π Read
via "The first stop for security news | Threatpost ".
Up to two billion devices are still vulnerable to the BlueBorne IoT attack - and may not ever get a patch.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Podcast: Two Billion IoT Devices Still Vulnerable to BlueBorne Bug
Up to two billion devices are still vulnerable to the BlueBorne IoT attack - and may not ever get a patch.
β Monday review β the hot 19 stories of the week β
π Read
via "Naked Security".
From iOS security updates to Netflix phishing attacks, catch up with everything we've written in the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 19 stories of the week
From iOS security updates to Netflix phishing attacks, catch up with everything weβve written in the last seven days β itβs weekly roundup time.