β Google researcher discovers new type of Windows security weakness β
π Read
via "Naked Security".
Microsoft will patch a new Windows security bug discovered by Google Project Zero - despite finding no evidence that it poses a threat.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Why 91% of IT and security pros fear insider threats π
π Read
via "Security on TechRepublic".
Insider threats are a larger concern for most organizations than cybercriminals or hacktivists, according to a BetterCloud report.π Read
via "Security on TechRepublic".
TechRepublic
Why 91% of IT and security pros fear insider threats
Insider threats are a larger concern for most organizations than cybercriminals or hacktivists, according to a BetterCloud report.
π Vulnerability in SoftNAS Cloud allows attackers to bypass authentication π
π Read
via "Security on TechRepublic".
The vulnerability allows attackers to run arbitrary commands as root, which clearly undermines the security of the SoftNAS Cloud platform and data stored on it.π Read
via "Security on TechRepublic".
TechRepublic
Vulnerability in SoftNAS Cloud allows attackers to bypass authentication
The vulnerability allows attackers to run arbitrary commands as root, which clearly undermines the security of the SoftNAS Cloud platform and data stored on it.
β Ep. 024 β Sextortion, malicious adverts and randomness [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - listen now!π Read
via "Naked Security".
Naked Security
Ep. 024 β Sextortion, malicious adverts and randomness [PODCAST]
Hereβs the latest Naked Security podcast β listen now!
π΄ TLS 1.3: A Good News/Bad News Scenario π΄
π Read
via "Dark Reading: ".
Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic.π Read
via "Dark Reading: ".
Darkreading
TLS 1.3: A Good News/Bad News Scenario
Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic.
π΄ What the Transition to Smart Cards Can Teach the US Healthcare Industry π΄
π Read
via "Dark Reading: ".
Healthcare information security suffers from the inherent weakness of using passwords to guard information. Chip-based smart cards could change that.π Read
via "Dark Reading: ".
Darkreading
What the Transition to Smart Cards Can Teach the US Healthcare Industry
Healthcare information security suffers from the inherent weakness of using passwords to guard information. Chip-based smart cards could change that.
β Uber Deployed βSurfcamβ Spyware in Australia to Crush the Competition β
π Read
via "Threatpost".
Until a report this week, Uber's Surfcam's use was thought to be limited to incidents uncovered in Singapore in 2017.π Read
via "Threatpost".
Threat Post
Uber Deployed βSurfcam Spywareβ in Australia to Crush the Competition β Report
Until a report this week, Uber's Surfcam's use was thought to be limited to incidents uncovered in Singapore in 2017.
π΄ 'Critical' Denial-of-Service Bug Patched in Facebook Fizz π΄
π Read
via "Dark Reading: ".
Researchers report a now-patched DoS vulnerability in Facebook Fizz, its open source implementation of the TLS protocol.π Read
via "Dark Reading: ".
Darkreading
'Critical' Denial-of-Service Bug Patched in Facebook Fizz
Researchers report a now-patched DoS vulnerability in Facebook Fizz, its open source implementation of the TLS protocol.
β Fin7 Ramps Up Campaigns With Two Fresh Malware Samples β
π Read
via "Threatpost".
Despite the 2018 crackdown on Fin7, the cybercrime group has been ramping up its efforts with two new malware samples and an attack panel.π Read
via "Threatpost".
Threat Post
Fin7 Ramps Up Campaigns With Two Fresh Malware Samples
Despite the 2018 crackdown on Fin7, the cybercrime group has been ramping up its efforts with two new malware samples and an attack panel.
π΄ Less Than 3% of Recycled Computing Devices Properly Wiped π΄
π Read
via "Dark Reading: ".
Researchers find that companies that refurbish or accept old equipment as donations don't necessarily clean them of data as promised.π Read
via "Dark Reading: ".
Dark Reading
Less Than 3% of Recycled Computing Devices Properly Wiped
Researchers find that companies that refurbish or accept old equipment as donations don't necessarily clean them of data as promised.
π΄ The Insider Threat: It's More Common Than You Think π΄
π Read
via "Dark Reading: ".
A new study shows why security teams must look holistically across cybersecurity, compliance, technology, and human resources to truly address the business effects of workforce risk.π Read
via "Dark Reading: ".
Darkreading
The Insider Threat: It's More Common Than You Think
A new study shows why security teams must look holistically across cybersecurity, compliance, technology, and human resources to truly address the business effects of workforce risk.
π΄ Google Photos Bug Let Criminals Query Friends, Location π΄
π Read
via "Dark Reading: ".
The vulnerability, now patched, let attackers query where, when, and with whom victims' photos were taken.π Read
via "Dark Reading: ".
Dark Reading
Application Security recent news | Dark Reading
Explore the latest news and expert commentary on Application Security, brought to you by the editors of Dark Reading
π Global Aluminum Manufacturer Still Recovering From Ransomware Attack π
π Read
via "Subscriber Blog RSS Feed ".
Norway's Norsk Hydro, the company ensnared in one of the week's biggest stories β a ransomware attack that crippled its systems β is still in the process of recovering.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Global Aluminum Manufacturer Still Recovering From Ransomware Attack
Norway's Norsk Hydro, the company ensnared in one of the week's biggest stories β a ransomware attack that crippled its systems β is still in the process of recovering.
π΄ BEC Scammer Pleads Guilty π΄
π Read
via "Dark Reading: ".
Business email compromise (BEC) operation resulted in $100 million in losses to a multinational technology company and a social media firm, according to the US Attorney's Office.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β Years-Long Phishing Campaign Targets Saudi Gov Agencies β
π Read
via "Threatpost".
The campaign, codenamed βBad Tidings,β has sought out victimsβ credentials with clever fake landing pages pretending to be the Saudi Arabian Ministry of Interiorβs e-Service portal.π Read
via "Threatpost".
Threat Post
Years-Long Phishing Campaign Targets Saudi Gov Agencies
The campaign, codenamed βBad Tidings,β has sought out victimsβ credentials with clever fake landing pages pretending to be the Saudi Arabian Ministry of Interiorβs e-Service portal.
β Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats β
π Read
via "Threatpost".
Experts from Gartner, Lookout and Google talk enterprise mobile security in this webinar replay.π Read
via "Threatpost".
Threat Post
Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats
Experts from Gartner, Lookout and Google talk enterprise mobile security in this webinar replay.
β Mac-Focused Malvertising Campaign Abuses Google Firebase DBs β
π Read
via "Threatpost".
Researchers said 1 million user sessions could have been exposed to the campaign, which downloads the Shlayer trojan.π Read
via "Threatpost".
Threat Post
Mac-Focused Malvertising Campaign Abuses Google Firebase DBs
Researchers said 1 million user sessions could have been exposed to the campaign, which downloads the Shlayer trojan.
π΄ Researchers Seek Out Ways to Search IPv6 Space π΄
π Read
via "Dark Reading: ".
Security researchers regularly search IPv4 address space looking for servers with ports exposing vulnerable software. With the massive number of IPv6 addresses, however, they have lost that ability. Can tricks and workarounds save the day?π Read
via "Dark Reading: ".
Dark Reading
Researchers Seek Out Ways to Search IPv6 Space - Dark Reading
Security researchers regularly search IPv4 address space looking for servers with ports exposing vulnerable software. With the massive number of IPv6 addresses, however, they have lost that ability. Can tricks and workarounds save the day?
β FBI crackdown on DDoS-for-hire sites led to 85% slash in attack sizes β
π Read
via "Naked Security".
According to a new report, average and maximum DDoS attack sizes decreased by 85.36% and 23.91%.π Read
via "Naked Security".
Naked Security
FBI crackdown on DDoS-for-hire sites led to 85% slash in attack sizes
According to a new report, average and maximum DDoS attack sizes decreased by 85.36% and 23.91%.
β Opera brings back free VPN service to its Android browser β
π Read
via "Naked Security".
Opera lost its Android browser's VPN after it was sold to a Chinese consortium, but now it's back.π Read
via "Naked Security".
Sophos
Opera brings back free VPN service to its Android browser β Naked Security
Opera lost its Android browser's VPN after it was sold to a Chinese consortium, but now it's back.