β Dark web marketplace Wall Street Market busted by international police β
π Read
via "Naked Security".
It went down in flames, with a rogue admin blackmailing vendors and buyers and leaking login credentials and the IP address.π Read
via "Naked Security".
Naked Security
Dark web marketplace Wall Street Market busted by international police
It went down in flames, with a rogue admin blackmailing vendors and buyers and leaking login credentials and the IP address.
β Firefox add-ons with obfuscated code will be banned by Mozilla β
π Read
via "Naked Security".
The updated Add-on Policy aims to rid Firefox of third-party malicious code that hides what it's really up to.π Read
via "Naked Security".
Naked Security
Firefox add-ons with obfuscated code will be banned by Mozilla
The updated Add-on Policy aims to rid Firefox of third-party malicious code that hides what itβs really up to.
π΄ Russian Nation-State Group Employs Custom Backdoor for Microsoft Exchange Server π΄
π Read
via "Dark Reading: ".
Turla hacking team abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization's messages.π Read
via "Dark Reading: ".
Darkreading
Russian Nation-State Group Employs Custom Backdoor for Microsoft Exchange Server
Turla hacking team abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization's messages.
π΄ Better Behavior, Better Biometrics? π΄
π Read
via "Dark Reading: ".
Behavioral biometrics is a building block to be used in conjunction with other security measures, but it shows promise.π Read
via "Dark Reading: ".
Darkreading
Better Behavior, Better Biometrics?
Behavioral biometrics is a building block to be used in conjunction with other security measures, but it shows promise.
β MegaCortex ransomware distracts victims with Matrix film references β
π Read
via "Naked Security".
One moment, the defendersβ network looked secure but the next, as if out of nowhere, the ransom note pops up.π Read
via "Naked Security".
Naked Security
MegaCortex ransomware distracts victims with Matrix film references
One moment, the defendersβ network looked secure but the next, as if out of nowhere, the ransom note pops up.
β Ukrainian Charged With Launching 100 Million Malicious Ads β
π Read
via "Threatpost".
Oleksii Petrovich Ivanov has been extradited in the U.S. after allegedly launching malvertising campaigns that caused victims to view malicious ads on more than 100 million occasions.π Read
via "Threatpost".
Threat Post
Ukrainian Charged With Launching 100 Million Malicious Ads
Oleksii Petrovich Ivanov has been extradited in the U.S. after allegedly launching malvertising campaigns that caused victims to view malicious ads on more than 100 million occasions.
π 90% of data breaches in US occur in New York and California π
π Read
via "Security on TechRepublic".
Half a billion records have been exposed in total, with over 86 breaches affecting the two states since January, according to Risk Based Security.π Read
via "Security on TechRepublic".
TechRepublic
90% of data breaches in US occur in New York and California
Half a billion records have been exposed in total, with over 86 breaches affecting the two states since January, according to Risk Based Security.
β Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak β
π Read
via "Threatpost".
Forensic analysis shows a Chinese APT using Equation Group hacking tools at least a year before Shadow Brokers dumped its cache in April 2017.π Read
via "Threatpost".
Threat Post
Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak
Forensic analysis shows a Chinese APT using Equation Group hacking tools at least a year before Shadow Brokers dumped its cache in April 2017.
π΄ The Big E-Crime Pivot π΄
π Read
via "Dark Reading: ".
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.π Read
via "Dark Reading: ".
Darkreading
The Big E-Crime Pivot
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.
π Trade Secret Theft Victim Wins $845 Million π
π Read
via "Subscriber Blog RSS Feed ".
While very little money will change hands, the sum is believed to be one of the largest judgments for the theft of trade secrets in U.S. history.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Trade Secret Theft Victim Wins $845 Million
While very little money will change hands, the sum is believed to be one of the largest judgments for the theft of trade secrets in U.S. history.
π΄ The Dark Web is Smaller Than You Think π΄
π Read
via "Dark Reading: ".
The number of live, accessible .onion sites amounts to less than 0.005% of surface web domains, researchers report.π Read
via "Dark Reading: ".
Darkreading
The Dark Web Is Smaller Than You Think
The number of live, accessible .onion sites amounts to less than 0.005% of surface web domains, researchers report.
π΄ US States with the Worst Consumer Cyber-Hygiene π΄
π Read
via "Dark Reading: ".
Ranking based on consumers' cybersecurity practices - or lack thereof.π Read
via "Dark Reading: ".
Dark Reading
US States with the Worst Consumer Cyber-Hygiene
Ranking based on consumers' cybersecurity practices - or lack thereof.
π΄ How a Chinese Nation-State Group Reversed-Engineered NSA Attack Tools π΄
π Read
via "Dark Reading: ".
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.π Read
via "Dark Reading: ".
Darkreading
How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.
π΄ How a Chinese Nation-State Group Reversed-Engineered NSA Attack Tools π΄
π Read
via "Dark Reading: ".
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.π Read
via "Dark Reading: ".
Darkreading
How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.
π How to enable BitLocker on non-TPM Macs π
π Read
via "Security on TechRepublic".
It's easy to add Microsoft's drive encrypting BitLocker protection to your non-TPM enabled Mac computers hosting Windows via Boot Camp or third-party VM.π Read
via "Security on TechRepublic".
ATENTIONβΌ New - CVE-2018-14485
π Read
via "National Vulnerability Database".
BlogEngine.NET 3.3 allows XXE attacks via the POST body to metaweblog.axd.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14478 (coppermine_photo_gallery)
π Read
via "National Vulnerability Database".
ecard.php in Coppermine Photo Gallery (CPG) 1.5.46 has XSS via the sender_name, recipient_email, greetings, or recipient_name parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13994
π Read
via "National Vulnerability Database".
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a denial-of-service attack by making more than 120 connections.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13993
π Read
via "National Vulnerability Database".
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13992
π Read
via "National Vulnerability Database".
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext transmission (HTTP) of user credentials by default.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13991
π Read
via "National Vulnerability Database".
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 leaks private information in firmware images.π Read
via "National Vulnerability Database".