❌ 2 Million IoT Devices Vulnerable to Complete Takeover ❌
📖 Read
via "Threatpost".
Millions of security cameras, baby monitors and "smart" doorbells are open to hijack - and no solution is currently available.📖 Read
via "Threatpost".
Threat Post
2 Million IoT Devices Vulnerable to Complete Takeover
Millions of security cameras, baby monitors and "smart" doorbells are open to hijack - and no solution is currently available.
🔏 BEC Scams Responsible for $1.2B in Losses in 2018 🔏
📖 Read
via "Subscriber Blog RSS Feed ".
It sounds like business email compromise attacks, attacks that rely on tricking recipients, usually executives, into conducting wire transfers, aren't going away anytime soon.📖 Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
BEC Scams Responsible for $1.2B in Losses in 2018
It sounds like business email compromise attacks, attacks that rely on tricking recipients, usually executives, into conducting wire transfers, aren't going away anytime soon.
❌ Docker Hub Hack Affects 190K Accounts ❌
📖 Read
via "Threatpost".
Github and Bitbucket tokens for Docker autobuilds are also impacted.📖 Read
via "Threatpost".
Threat Post
Docker Hub Hack Affects 190K Accounts, with Concerning Consequences
Github and Bitbucket tokens for Docker autobuilds are also impacted.
🕴 A Rear-View Look at GDPR: Compliance Has No Brakes 🕴
📖 Read
via "Dark Reading: ".
With a year of Europe's General Data Protection Regulation under our belt, what have we learned?📖 Read
via "Dark Reading: ".
Darkreading
A Rear-View Look at GDPR: Compliance Has No Brakes
With a year of Europe's General Data Protection Regulation under our belt, what have we learned?
🔐 Why marketing teams are critical to successful cybersecurity efforts 🔐
📖 Read
via "Security on TechRepublic".
Marketers often focus on cybersecurity best practices after there is an incident, though experts say that needs to change to improve a company's chances of surviving a cyberattack.📖 Read
via "Security on TechRepublic".
TechRepublic
Why marketing teams are critical to successful cybersecurity efforts
Marketers often focus on cybersecurity best practices after there is an incident, though experts say that needs to change to improve a company's chances of surviving a cyberattack.
🔐 Can password managers protect you from hackers? 🔐
📖 Read
via "Security on TechRepublic".
Microsoft Identity Division's corporate vice president of program management Alex Simons sat down with Dan Patterson to discuss the different threats facing the enterprise today.📖 Read
via "Security on TechRepublic".
🔐 Can password managers protect you from hackers? 🔐
📖 Read
via "Security on TechRepublic".
Microsoft Identity Division's corporate vice president of program management Alex Simons sat down with Dan Patterson to discuss the different threats facing the enterprise today.📖 Read
via "Security on TechRepublic".
ATENTION‼ New - CVE-2018-12384
📖 Read
via "National Vulnerability Database".
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2016-10749
📖 Read
via "National Vulnerability Database".
parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2015-9285
📖 Read
via "National Vulnerability Database".
esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ URI.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2015-1343 (ubuntu_linux)
📖 Read
via "National Vulnerability Database".
All versions of unity-scope-gdrive logs search terms to syslog.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2015-1341 (apport, ubuntu_linux)
📖 Read
via "National Vulnerability Database".
Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Appoprt before 2.19.2 function _python_module_path.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2015-1340 (lxd)
📖 Read
via "National Vulnerability Database".
LXD before version 0.19-0ubuntu5 doUidshiftIntoContainer() has an unsafe Chmod() call that races against the stat in the Filepath.Walk() function. A symbolic link created in that window could cause any file on the system to have any mode of the attacker's choice.📖 Read
via "National Vulnerability Database".
🔐 How the cloud is evolving to improve enterprise security 🔐
📖 Read
via "Security on TechRepublic".
Microsoft's executive vice president Jason Zander sat down with Dan Patterson to discuss cloud migration and how it benefits security in the enterprise.📖 Read
via "Security on TechRepublic".
🔐 Why real-estate businesses need to defend against these cybersecurity threats 🔐
📖 Read
via "Security on TechRepublic".
BEC scams, ransomware, and malware are some of the cybersecurity threats that cybercriminals use against real-estate agencies. Here's security advice, including scam prevention tips from the FBI.📖 Read
via "Security on TechRepublic".
TechRepublic
Why real-estate businesses need to defend against these cybersecurity threats
BEC scams, ransomware, and malware are some of the cybersecurity threats that cybercriminals use against real-estate agencies. Here's security advice, including scam prevention tips from the FBI.
🔐 How the cloud is evolving to improve enterprise security 🔐
📖 Read
via "Security on TechRepublic".
Microsoft's executive vice president Jason Zander sat down with Dan Patterson to discuss cloud migration and how it benefits security in the enterprise.📖 Read
via "Security on TechRepublic".
🕴 Unknown, Unprotected Database Exposes Info on 80 Million US Households 🕴
📖 Read
via "Dark Reading: ".
A database with no login required has been found to contain names, addresses, age, and more for over 80 million U.S. households.📖 Read
via "Dark Reading: ".
Darkreading
Unknown, Unprotected Database Exposes Info on 80 Million US Households
A database with no login required has been found to contain names, addresses, age, and more for over 80 million U.S. households.
❌ Apple Defends Parental Control App Removal Amid Backlash ❌
📖 Read
via "Threatpost".
After facing criticism for removing or restricting several parental control apps over the past year, Apple cited security and privacy reasons.📖 Read
via "Threatpost".
Threat Post
Apple Defends Parental Control App Removal Amid Backlash
After facing criticism for removing or restricting several parental control apps over the past year, Apple cited security and privacy reasons.
❌ MuddyWater APT Hones an Arsenal of Custom Tools ❌
📖 Read
via "Threatpost".
The attack group shows a moderate level of sophistication, but the stage is set for MuddyWater to take things to the next level.📖 Read
via "Threatpost".
Threat Post
MuddyWater APT Hones an Arsenal of Custom Tools
The attack group shows a moderate level of sophistication, but the stage is set for MuddyWater to take things to the next level.
❌ Malware Infests Popular Pirate Streaming Hardware ❌
📖 Read
via "Threatpost".
Hardware that supports pirated video streaming content comes packed with malware.📖 Read
via "Threatpost".
Threat Post
Malware Infests Popular Pirate Streaming Hardware
Hardware that supports pirated video streaming content comes packed with malware.
🕴 7 Types of Experiences Every Security Pro Should Have 🕴
📖 Read
via "Dark Reading: ".
As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.📖 Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.