π΄ Microsoft Takes Down 99 Hacker-Controlled Websites π΄
π Read
via "Dark Reading: ".
A judge granted Microsoft the injunction allowing them to disrupt a network of sites operated by an Iranian-linked group of hackers.π Read
via "Dark Reading: ".
Darkreading
Microsoft Takes Down 99 Hacker-Controlled Websites
A judge granted Microsoft the injunction allowing them to disrupt a network of sites operated by an Iranian-linked group of hackers.
β Companies will stop storing data in Australia, Microsoft warns β
π Read
via "Naked Security".
Australia's controversial anti-encryption laws came under independent scrutiny this week as tech leaders criticized the proposed rules.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β FTC slams the phone down on quartet of robocallers β
π Read
via "Naked Security".
Wrist slaps and paltry fines may not be what most of us were hoping for in retribution for billions of robocalls and countless scams.π Read
via "Naked Security".
Naked Security
FTC slams the phone down on quartet of robocallers
Wrist slaps and paltry fines may not be what most of us were hoping for in retribution for billions of robocalls and countless scams.
β Grindr up for sale amid US fears for Chinese-owned data β
π Read
via "Naked Security".
A US national security panel told Kunlun, that its ownership of Grindr constitutes a national security risk.π Read
via "Naked Security".
Naked Security
Grindr up for sale amid US fears for Chinese-owned data
A US national security panel told Kunlun, that its ownership of Grindr constitutes a national security risk.
π΄ UK Watchdog Criticizes Huawei for Lax Software Security, Development π΄
π Read
via "Dark Reading: ".
Calling the company's software development practices chaotic and unsustainable, a UK government oversight group calls on the company to make measurable progress toward more secure and sustainable code.π Read
via "Dark Reading: ".
Dark Reading
UK Watchdog Criticizes Huawei for Lax Software Security, Development
Calling the company's software development practices chaotic and unsustainable, a UK government oversight group calls on the company to make measurable progress toward more secure and sustainable code.
π Dell encryption console breaks after installing March 2019 Windows Update π
π Read
via "Security on TechRepublic".
Following the latest round of updates from Microsoft, the Dell Encryption Console used for securing data on enterprise-deployed laptops stops working, but data remains secure.π Read
via "Security on TechRepublic".
β As drones fill the skies, cybercriminals wonβt be far behind β
π Read
via "Naked Security".
Putting these toys back in the box after a decade of hype isnβt going to be easy, but these researchers are exploring the options.π Read
via "Naked Security".
Naked Security
As drones fill the skies, cybercriminals wonβt be far behind
Putting these toys back in the box after a decade of hype isnβt going to be easy, but these researchers are exploring the options.
π 90% of large tech companies vulnerable to email spoofing π
π Read
via "Security on TechRepublic".
Most companies have not implemented standards for authenticating emails and preventing hackers from successful phishing attacks, according to Valimail.π Read
via "Security on TechRepublic".
TechRepublic
90% of large tech companies vulnerable to email spoofing
Most companies have not implemented standards for authenticating emails and preventing hackers from successful phishing attacks, according to Valimail.
β Critical Rockwell Automation Bug in Drive Component Puts IIoT Plants at Risk β
π Read
via "Threatpost".
A critical Rockwell Automation flaw could be exploited to manipulate an industrial driveβs physical process and or even stop it.π Read
via "Threatpost".
Threat Post
Critical Rockwell Automation Bug in Drive Component Puts IIoT Plants at Risk
A critical Rockwell Automation flaw could be exploited to manipulate an industrial driveβs physical process and or even stop it.
π΄ 20 Years of STRIDE: Looking Back, Looking Forward π΄
π Read
via "Dark Reading: ".
The invention of STRIDE was the key inflection point in the development of threat modeling from art to engineering practice.π Read
via "Dark Reading: ".
Dark Reading
20 Years of STRIDE: Looking Back, Looking Forward - Dark Reading
The invention of STRIDE was the key inflection point in the development of threat modeling from art to engineering practice.
β Zero-Day Bug Lays Open TP-Link Smart Home Router β
π Read
via "Threatpost".
However, an attacker would need to already be on the local network to be successful.π Read
via "Threatpost".
Threat Post
Zero-Day Bug Lays Open TP-Link Smart Home Router
An exploit would allow an attacker to establish a persistent backdoor for ongoing remote access.
ATENTIONβΌ New - CVE-2017-18110
π Read
via "National Vulnerability Database".
The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18109
π Read
via "National Vulnerability Database".
The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18108
π Read
via "National Vulnerability Database".
The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remote attackers with administration rights to execute arbitrary code via a JNDI injection.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18106
π Read
via "National Vulnerability Database".
The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user's session provided they can make their identifier hash collide with another user's session identifier hash.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18105
π Read
via "National Vulnerability Database".
The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user's JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability.π Read
via "National Vulnerability Database".
β Magento Patches Critical SQL Injection and RCE Vulnerabilities β
π Read
via "Threatpost".
Magento patched 37 flaws Thursday, including a stored cross-site scripting (XSS) vulnerability that could have let an attacker take over a site.π Read
via "Threatpost".
Threat Post
Magento Patches Critical SQL Injection and RCE Vulnerabilities
Magento patched 37 flaws Thursday, including a stored cross-site scripting (XSS) vulnerability that could have let an attacker take over a site.
π΄ 7 Malware Families Ready to Ruin Your IoT's Day π΄
π Read
via "Dark Reading: ".
This latest list of Internet of Things miscreants doesn't limit itself to botnets, like Mirai.π Read
via "Dark Reading: ".
Dark Reading
7 Malware Families Ready to Ruin Your IoT's Day
This latest list of Internet of Things miscreants doesn't limit itself to botnets, like Mirai.
π΄ Toyota Customer Information Exposed in Data Breach π΄
π Read
via "Dark Reading: ".
The attackers hit dealer sales systems in Japan, according to the automaker.π Read
via "Dark Reading: ".
Darkreading
Toyota Customer Information Exposed in Data Breach
The attackers hit dealer sales systems in Japan, according to the automaker.
π΄ NDSU Offers Nation's First Ph.D. in Cybersecurity Education π΄
π Read
via "Dark Reading: ".
The new program focuses on training university-level educators in cybersecurity.π Read
via "Dark Reading: ".
Dark Reading
NDSU Offers Nation's First Ph.D. in Cybersecurity Education
The new program focuses on training university-level educators in cybersecurity.
β Critical Bug in Cisco WebEx Browser Extensions Allows Remote Code-Execution β
π Read
via "Threatpost".
Users of the conferencing platform should update immediately.π Read
via "Threatpost".
Threat Post
Critical RCE Bug in Cisco WebEx Browser Extensions Faces βOngoing Exploitationβ
Users of the conferencing platform should update immediately.