π΄ Attackers Aren't Invincible & We Must Use That to Our Advantage π΄
π Read
via "Dark Reading: ".
The bad guys only seem infallible. Use their weaknesses to beat them.π Read
via "Dark Reading: ".
Darkreading
Attackers Aren't Invincible & We Must Use That to Our Advantage
The bad guys only seem infallible. Use their weaknesses to beat them.
π How to build trust in cybersecurity among your employees π
π Read
via "Security on TechRepublic".
Malicious insiders and a lack of training create a big trust gap among employees and employers, according to ObserveIT.π Read
via "Security on TechRepublic".
TechRepublic
How to build trust in cybersecurity among your employees
Malicious insiders and a lack of training create a big trust gap among employees and employers, according to ObserveIT.
β Poll: Are You Creeped Out by Facial Recognition? β
π Read
via "Threatpost".
How concerned are you about the privacy implications of facial recognition? Weigh in with our poll.π Read
via "Threatpost".
Threat Post
Poll: Are You Creeped Out by Facial Recognition?
How concerned are you about the privacy implications of facial recognition? Weigh in with our poll.
β Point Blank Gamers Targeted with Backdoor Malware β
π Read
via "Threatpost".
The malware hides in the legitimate game downloads, signed with a real certificate; connections to ShadowHammer have been found.π Read
via "Threatpost".
Threat Post
Point Blank Gamers Targeted with Backdoor Malware
The malware hides in the legitimate game downloads, signed with a real certificate; connections to ShadowHammer have been found.
ATENTIONβΌ New - CVE-2018-13443
π Read
via "National Vulnerability Database".
EOS.IO jit-wasm 4.1 has a heap-based buffer overflow via a crafted wast file.π Read
via "National Vulnerability Database".
π΄ Two Charged with Economic Espionage, GE Trade Secret Theft π΄
π Read
via "Dark Reading: ".
A US national and Chinese national have been charged with conspiring to steal General Electric's trade secrets surrounding turbine technologies.π Read
via "Dark Reading: ".
Dark Reading
Two Charged with Economic Espionage, GE Trade Secret Theft
A US national and Chinese national have been charged with conspiring to steal General Electric's trade secrets surrounding turbine technologies.
π Digital Guardian Secures $30 Million in New Funding π
π Read
via "Subscriber Blog RSS Feed ".
We've got some exciting news to share! We've secured $30 million in new funding, an investment that will allow us to help satisfy a growing demand for data protection worldwide.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Digital Guardian Secures $30 Million in New Funding
We've got some exciting news to share! We've secured $30 million in new funding, an investment that will allow us to help satisfy a growing demand for data protection worldwide.
β Adware-Ridden Apps in Google Play Infect 30 Million Android Users β
π Read
via "Threatpost".
Google Play has removed up to 50 apps that once downloaded plagued systems with full-screen ads.π Read
via "Threatpost".
Threat Post
Adware-Ridden Apps in Google Play Infect 30 Million Android Users
Google Play has removed up to 50 apps that once downloaded plagued systems with full-screen ads.
π΄ Survey Shows a Security Conundrum π΄
π Read
via "Dark Reading: ".
A new report examines and quantifies the conflicts and challenges faced by business security leaders.π Read
via "Dark Reading: ".
Dark Reading
Survey Shows a Security Conundrum
A new report examines and quantifies the conflicts and challenges faced by business security leaders.
ATENTIONβΌ New - CVE-2018-10055
π Read
via "National Vulnerability Database".
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.π Read
via "National Vulnerability Database".
π΄ 5 Security Challenges to API Protection π΄
π Read
via "Dark Reading: ".
Today's application programming interfaces are no longer simple or front-facing, creating new risks for both security and DevOps.π Read
via "Dark Reading: ".
Dark Reading
5 Security Challenges to API Protection - Dark Reading
Today's application programming interfaces are no longer simple or front-facing, creating new risks for both security and DevOps.
β Facebook May Face $5 Billion FTC Fine for Data Misuse β
π Read
via "Threatpost".
Facebook may be fined as much as $5 million by the FTC for data issues related to the Cambridge Analytica incident.π Read
via "Threatpost".
Threat Post
Facebook May Face $5 Billion FTC Fine for Data Misuse
Facebook may be fined as much as $5 billion by the FTC for data issues related to the Cambridge Analytica incident.
ATENTIONβΌ New - CVE-2017-18367
π Read
via "National Vulnerability Database".
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.π Read
via "National Vulnerability Database".
π΄ TA505 Abusing Legit Remote Admin Tool in String of Attacks π΄
π Read
via "Dark Reading: ".
Russian-speaking threat group has been targeting retailers and financial institutions in the US and abroad via a spear-phishing campaign.π Read
via "Dark Reading: ".
Darkreading
TA505 Abusing Legit Remote Admin Tool in String of Attacks
Russian-speaking threat group has been targeting retailers and financial institutions in the US and abroad via a spear-phishing campaign.
β Teen sues Apple for $1 billion over Apple storesβ facial recognition β
π Read
via "Naked Security".
He claims that Apple allegedly uses the technology to spot shoplifters and that it falsely linked him to a series of Apple store thefts.π Read
via "Naked Security".
Naked Security
Teen sues Apple for $1 billion over Apple storesβ facial recognition
He claims that Apple allegedly uses the technology to spot shoplifters and that it falsely linked him to a series of Apple store thefts.
β Atlanta Hawks fall prey to Magecart credit card skimming group β
π Read
via "Naked Security".
The Atlanta Hawks basketball team is recovering after a sophisticated cybercrime group hacked its ecommerce site and planted credit card skimming code on it.π Read
via "Naked Security".
Naked Security
Atlanta Hawks fall prey to Magecart credit card skimming group
The Atlanta Hawks basketball team is recovering after a sophisticated cybercrime group hacked its ecommerce site and planted credit card skimming code on it.
π Microsoft wants to kill Windows password expiration policy π
π Read
via "Security on TechRepublic".
The proposal means that users at organizations with Group Policy would no longer be required to change their Windows passwords on a regular basis.π Read
via "Security on TechRepublic".
β Blochainbandit stole $54 million of Ethereum by guessing weak keys β
π Read
via "Naked Security".
Someone has been quietly pilfering Ethereum (ETH) cryptocurrency worth millions of dollars without anyone noticing or, apparently, caring.π Read
via "Naked Security".
Naked Security
Blockchain Bandit stole $54 million of Ethereum by guessing weak keys
Someone has been quietly pilfering Ethereum (ETH) cryptocurrency worth millions of dollars without anyone noticing or, apparently, caring.
π Businesses hit with 235% more cyberthreats this year π
π Read
via "Security on TechRepublic".
Trojans and ransomware top the list of threats with corporate targets in Q1 2019, according to a Malwarebytes report.π Read
via "Security on TechRepublic".
TechRepublic
Businesses hit with 235% more cyberthreats this year
Trojans and ransomware top the list of threats with corporate targets in Q1 2019, according to a Malwarebytes report.
π The 10 highest-paying cybersecurity jobs π
π Read
via "Security on TechRepublic".
Demand for cybersecurity roles jumped over 7% in the last year, leading to increasing salaries, according to Indeed.π Read
via "Security on TechRepublic".
TechRepublic
The 10 highest-paying cybersecurity jobs
Demand for cybersecurity roles jumped over 7% in the last year, leading to increasing salaries, according to Indeed.
π Top 50 InfoSec Networking Groups to Join π
π Read
via "Subscriber Blog RSS Feed ".
Looking to stay ahead of the curve on all things infosec? We've gathered a list of 50 valuable associations, LinkedIn networking groups, and meetups for security professionals.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Top 50 InfoSec Networking Groups to Join
Looking to stay ahead of the curve on all things infosec? We've gathered a list of 50 valuable associations, LinkedIn networking groups, and meetups for security professionals.