π΄ 3 Lessons Security Leaders Can Learn from Theranos π΄
π Read
via "Dark Reading: ".
Theranos flamed out in spectacular fashion, but you can still learn from the company's "worst practices."π Read
via "Dark Reading: ".
Dark Reading
3 Lessons Security Leaders Can Learn from Theranos
Theranos flamed out in spectacular fashion, but you can still learn from the company's worst practices.
π Collaboration, Actionable Governance Needed to Secure Healthcare Sector π
π Read
via "Subscriber Blog RSS Feed ".
Organizations recently responded to a senator who's hoping to develop a strategy for reducing cybersecurity vulnerabilities in the healthcare sector.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Collaboration, Actionable Governance Needed to Secure Healthcare Sector
Organizations recently responded to a senator who's hoping to develop a strategy for reducing cybersecurity vulnerabilities in the healthcare sector.
π΄ Patched Apache Vulnerability Could Still Cause Problems π΄
π Read
via "Dark Reading: ".
More than 2 million Apache HTTP servers remain at risk for a critical privilege escalation vulnerability.π Read
via "Dark Reading: ".
Dark Reading
Patched Apache Vulnerability Could Still Cause Problems
More than 2 million Apache HTTP servers remain at risk for a critical privilege escalation vulnerability.
π΄ New, Improved BEC Campaigns Target HR and Finance π΄
π Read
via "Dark Reading: ".
Spearphishing campaigns from new and established business email compromise (BEC) gangs are stealing from companies using multiple tactics.π Read
via "Dark Reading: ".
Darkreading
New, Improved BEC Campaigns Target HR and Finance
Spearphishing campaigns from new and established business email compromise (BEC) gangs are stealing from companies using multiple tactics.
π΄ Third Parties in Spotlight as More Facebook Data Leaks π΄
π Read
via "Dark Reading: ".
Two third-party services left Facebook user data exposed online -- in one case, 540 million records of user comments -- highlighting the ease with which third-party developers can access data and the risk of lax security.π Read
via "Dark Reading: ".
Darkreading
Third Parties in Spotlight as More Facebook Data Leaks
Two third-party services left Facebook user data exposed online -- in one case, 540 million records of user comments -- highlighting the ease with which third-party developers can access data and the risk of lax security.
π΄ Threat Group Employs Amazon-Style Fulfillment Model to Distribute Malware π΄
π Read
via "Dark Reading: ".
The operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ Python-Based Bot Scanner Gorging on Recon Intel π΄
π Read
via "Dark Reading: ".
Discovered by AT&T AlienLabs, new malware Xwo seeking default creds and misconfigurations in MySQL and MongoDB, among other servicesπ Read
via "Dark Reading: ".
Darkreading
Python-Based Bot Scanner Gorging on Recon Intel
Discovered by AT&T Alien Labs, new malware Xwo seeking default creds and misconfigurations in MySQL and MongoDB, among other services
β New law will punish social media companies for usersβ violent content β
π Read
via "Naked Security".
Australian law makers have responded very quickly to the Christchurch shootings.π Read
via "Naked Security".
Naked Security
New law will punish social media companies for usersβ violent content
Australian law makers have responded very quickly to the Christchurch shootings.
β Nvidia patches severe bugs in edge computing modules β
π Read
via "Naked Security".
Nvidia has released 13 patches targeting two low-end embedded computing boards.π Read
via "Naked Security".
Naked Security
Nvidia patches severe bugs in edge computing modules
Nvidia has released 13 patches targeting two low-end embedded computing boards.
β Hoax! Nope, hackers arenβt posting invisible sexual videos on your wall β
π Read
via "Naked Security".
A Facebook hoax from 2011 is doing the rounds again. Don't fall for it, do something useful instead.π Read
via "Naked Security".
Naked Security
Hoax! Nope, hackers arenβt posting invisible sexual videos on your wall
A Facebook hoax from 2011 is doing the rounds again. Donβt fall for it, do something useful instead.
π How to enable two-factor authentication for SSH in Fedora Linux π
π Read
via "Security on TechRepublic".
Any machine that allows SSH login would benefit from the addition of two-factor authentication.π Read
via "Security on TechRepublic".
TechRepublic
How to enable two-factor authentication for SSH in Fedora Linux
Any machine that allows SSH login would benefit from the addition of two-factor authentication.
π How to avoid document-based malware attacks π
π Read
via "Security on TechRepublic".
Some 59% of all malicious files detected in the first quarter of 2019 were documents, according to a Barracuda Networks report. Here's how to protect yourself against this growing threat.π Read
via "Security on TechRepublic".
TechRepublic
How to avoid document-based malware attacks
Some 59% of all malicious files detected in the first quarter of 2019 were documents, according to a Barracuda Networks report. Here's how to protect yourself against this growing threat.
π Half of online banks allow hackers to steal your money π
π Read
via "Security on TechRepublic".
All online banks risk giving attackers unauthorized access to personal data, funds, and sensitive information, according to Positive Technologies.π Read
via "Security on TechRepublic".
TechRepublic
Half of online banks allow hackers to steal your money
All online banks risk giving attackers unauthorized access to personal data, funds, and sensitive information, according to Positive Technologies.
β Patch now! Magento e-commerce sites targeted by SQLi attacks β
π Read
via "Naked Security".
If you're a Magento admin, stop what youβre doing and patch now.π Read
via "Naked Security".
Naked Security
Patch now! Magento e-commerce sites targeted by SQLi attacks
If youβre a Magento admin, stop what youβre doing and patch now.
β LokiBot Trojan Spotted Hitching a Ride Inside .PNG Files β
π Read
via "Threatpost".
Spam campaign features obfuscated .zipx archive that unpacks LokiBot attack.π Read
via "Threatpost".
Threat Post
LokiBot Trojan Spotted Hitching a Ride Inside .PNG Files
Spam campaign features obfuscated .zipx archive that unpacks LokiBot attack.
β Hackers Abuse Google Cloud Platform to Attack D-Link Routers β
π Read
via "Threatpost".
Three waves of DNS hijacking attacks against consumer routers have been linked back to Google Cloud Platform abuse.π Read
via "Threatpost".
Threat Post
Hackers Abuse Google Cloud Platform to Attack D-Link Routers
Three waves of DNS hijacking attacks against consumer routers have been linked back to Google Cloud Platform abuse.
π΄ The Matrix at 20: A Metaphor for Today's Cybersecurity Challenges π΄
π Read
via "Dark Reading: ".
The Matrix ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too familiar to security pros.π Read
via "Dark Reading: ".
Darkreading
The Matrix at 20: A Metaphor for Today's Cybersecurity Challenges
<i>The Matrix</i> ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too familiar to security pros.
β Serious Security: GPS week rollover and the other sort of βzero dayβ β
π Read
via "Naked Security".
Tomorrow night, the GPS "earth clock" has a Y2K event - but here's why you should be OK.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Facebook Boots 74 Cybercrime Groups From Platform β
π Read
via "Threatpost".
The 74 cybercrime groups were offering illicit services - from email spamming tools to stolen credentials - right on Facebook's platform.π Read
via "Threatpost".
Threat Post
Facebook Boots 74 Cybercrime Groups From Platform
The 74 cybercrime groups were offering illicit services - from email spamming tools to stolen credentials - right on Facebook's platform.
π Friday Five: 4/5 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Employee theft at SMBs, fighting stalkerware, and a "hacker-proof" new cryptographic library - catch up on the week's infosec news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 4/5 Edition
Employee theft at SMBs, fighting stalkerware, and a "hacker-proof" new cryptographic library - catch up on the week's infosec news with this roundup!
π΄ Advanced Persistent Threat: Dark Reading Caption Contest Winners π΄
π Read
via "Dark Reading: ".
From sushi and phishing to robots, passwords and ninjas -- and the winners are ...π Read
via "Dark Reading: ".
Darkreading
Advanced Persistent Threat: Dark Reading Caption Contest Winners
From sushi and phishing to robots, passwords and ninjas -- and the winners are ...