β Epic in hot water over Steam-scraping code β
π Read
via "Naked Security".
Players noticed that Epic Games was gathering and storing data from Steam accounts without their permission.π Read
via "Naked Security".
Naked Security
Epic in hot water over Steam-scraping code
Players noticed that Epic Games was gathering and storing data from Steam accounts without their permission.
β Court: Embarrassing leaks of internal Facebook emails are fishy β
π Read
via "Naked Security".
The leaks point to a plot, a Calif. court said, ordering pikini app maker Six4Three to hand over its lawyers' chats with the ICO.π Read
via "Naked Security".
Naked Security
Court: Embarrassing leaks of internal Facebook emails are fishy
The leaks point to a plot, a Calif. court said, ordering pikini app maker Six4Three to hand over its lawyersβ chats with the ICO.
β ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown β
π Read
via "Threatpost".
The FBI's crackdown on 15 DDoS-for-hire sites appears to have had an impact on DDoS attacks, the average size for which dropped 85 percent in the fourth quarter of 2018, a new report found.π Read
via "Threatpost".
Threat Post
ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown
The FBI's crackdown on 15 DDoS-for-hire sites appears to have had an impact on DDoS attacks, the average size for which dropped 85 percent in the fourth quarter of 2018, a new report found.
β Gargantuan Gnosticplayers breach swells to 863 million records β
π Read
via "Naked Security".
Another 26m records stolen from another six online companies brings this hacker's total number of records to 863m from 38 websites.π Read
via "Naked Security".
Naked Security
Gargantuan Gnosticplayers breach swells to 863 million records
Another 26m records stolen from another six online companies brings this hackerβs total number of records to 863m from 38 websites.
π΄ New Mirai Version Targets Business IoT Devices π΄
π Read
via "Dark Reading: ".
The notorious Internet of Things botnet is evolving to attack more types of devices - including those found in enterprises.π Read
via "Dark Reading: ".
Dark Reading
New Mirai Version Targets Business IoT Devices
The notorious Internet of Things botnet is evolving to attack more types of devices - including those found in enterprises.
π The 3 least secure programming languages π
π Read
via "Security on TechRepublic".
These coding languages have the most open source vulnerabilities, according to a WhiteSource report.π Read
via "Security on TechRepublic".
TechRepublic
The 3 least secure programming languages
These coding languages have the most open source vulnerabilities, according to a WhiteSource report.
π Businesses failing to meet California Consumer Privacy Act compliance goals π
π Read
via "Security on TechRepublic".
Set to go into effect on January 1, 2020, the CCPA will affect lots of companies doing business in California, but 86% have yet to meet compliance goals.π Read
via "Security on TechRepublic".
TechRepublic
Businesses failing to meet California Consumer Privacy Act compliance goals
Set to go into effect on January 1, 2020, the CCPA will affect lots of companies doing business in California, but 86% have yet to meet compliance goals.
π΄ Crowdsourced vs. Traditional Pen Testing π΄
π Read
via "Dark Reading: ".
A side-by-side comparison of key test features and when best to apply them based on the constraints within your budget and environment.π Read
via "Dark Reading: ".
Darkreading
Crowdsourced vs. Traditional Pen Testing
A side-by-side comparison of key test features and when best to apply them based on the constraints within your budget and environment.
β Norsk Hydro Calls Ransomware Attack βSevereβ β
π Read
via "Threatpost".
When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.π Read
via "Threatpost".
Threat Post
Norsk Hydro Calls Ransomware Attack βSevereβ
When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.
β Microsoft wonβt patch Windows registry warning problem β
π Read
via "Naked Security".
A security researcher has found a way to tinker with Windowsβ core settings while persuading users to accept the changes.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Stealing Corporate Funds Still Top Goal of Messaging Attacks π΄
π Read
via "Dark Reading: ".
Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile.π Read
via "Dark Reading: ".
Darkreading
Stealing Corporate Funds Still Top Goal of Messaging Attacks
Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile.
β Researcher Says NSAβs Ghidra Tool Can Be Used for RCE β
π Read
via "Threatpost".
Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.π Read
via "Threatpost".
Threat Post
Researcher Says NSAβs Ghidra Tool Can Be Used for RCE
Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.
π΄ Norsk Hydro Shuts Plants Amid Ransomware Attack π΄
π Read
via "Dark Reading: ".
The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.π Read
via "Dark Reading: ".
Darkreading
Norsk Hydro Shuts Plants Amid Ransomware Attack
The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.
β New scam accuses you of child abuse, offers to remove evidence β
π Read
via "Naked Security".
This scam is both intimidating and disturbing - the crooks are presenting themselves as corrupt CIA officials who will take a bribe.π Read
via "Naked Security".
Naked Security
New scam accuses you of child abuse, offers to remove evidence
This scam is both intimidating and disturbing β the crooks are presenting themselves as corrupt CIA officials who will take a bribe.
β Old Tech Spills Digital Dirt on Past Owners β
π Read
via "Threatpost".
Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.π Read
via "Threatpost".
Threat Post
Old Tech Spills Digital Dirt on Past Owners
Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.
π΄ The Case of the Missing Data π΄
π Read
via "Dark Reading: ".
The latest twist in the Equifax breach has serious implications for organizations.π Read
via "Dark Reading: ".
Darkreading
The Case of the Missing Data
The latest twist in the Equifax breach has serious implications for organizations.
π Help Needed to Solve AI Data Protection Challenges π
π Read
via "Subscriber Blog RSS Feed ".
The UK's data protection authority is hoping that advances to artificial intelligence incorporate data protection by design and is seeking the public's opinion on how to do so.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Help Needed to Solve AI Data Protection Challenges
The UK's data protection authority is hoping that advances to artificial intelligence incorporate data protection by design and is seeking the public's opinion on how to do so.
π΄ 6 Ways Mature DevOps Teams Are Killing It in Security π΄
π Read
via "Dark Reading: ".
New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.π Read
via "Dark Reading: ".
Dark Reading
6 Ways Mature DevOps Teams Are Killing It in Security
New survey shows where elite DevOps organizations are better able to incorporate security into application security.
β Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack β
π Read
via "Threatpost".
Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.π Read
via "Threatpost".
Threat Post
Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack
Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.
π΄ DDoS Attack Size Drops 85% in Q4 2018 π΄
π Read
via "Dark Reading: ".
The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.π Read
via "Dark Reading: ".
Dark Reading
DDoS Attack Size Drops 85% in Q4 2018
The sharp decline follows an FBI takedown of so-called booter, or DDoS-for-hire, websites in December 2018.
β Host of Flaws Found in CUJO Smart Firewall β
π Read
via "Threatpost".
Some of the flaws would allow remote code-execution.π Read
via "Threatpost".
Threat Post
Host of Flaws Found in CUJO Smart Firewall
Some of the flaws would allow remote code-execution.