β Ukrainian Charged With Launching 100 Million Malicious Ads β
π Read
via "Threatpost".
Oleksii Petrovich Ivanov has been extradited in the U.S. after allegedly launching malvertising campaigns that caused victims to view malicious ads on more than 100 million occasions.π Read
via "Threatpost".
Threat Post
Ukrainian Charged With Launching 100 Million Malicious Ads
Oleksii Petrovich Ivanov has been extradited in the U.S. after allegedly launching malvertising campaigns that caused victims to view malicious ads on more than 100 million occasions.
π 90% of data breaches in US occur in New York and California π
π Read
via "Security on TechRepublic".
Half a billion records have been exposed in total, with over 86 breaches affecting the two states since January, according to Risk Based Security.π Read
via "Security on TechRepublic".
TechRepublic
90% of data breaches in US occur in New York and California
Half a billion records have been exposed in total, with over 86 breaches affecting the two states since January, according to Risk Based Security.
β Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak β
π Read
via "Threatpost".
Forensic analysis shows a Chinese APT using Equation Group hacking tools at least a year before Shadow Brokers dumped its cache in April 2017.π Read
via "Threatpost".
Threat Post
Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak
Forensic analysis shows a Chinese APT using Equation Group hacking tools at least a year before Shadow Brokers dumped its cache in April 2017.
π΄ The Big E-Crime Pivot π΄
π Read
via "Dark Reading: ".
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.π Read
via "Dark Reading: ".
Darkreading
The Big E-Crime Pivot
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.
π Trade Secret Theft Victim Wins $845 Million π
π Read
via "Subscriber Blog RSS Feed ".
While very little money will change hands, the sum is believed to be one of the largest judgments for the theft of trade secrets in U.S. history.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Trade Secret Theft Victim Wins $845 Million
While very little money will change hands, the sum is believed to be one of the largest judgments for the theft of trade secrets in U.S. history.
π΄ The Dark Web is Smaller Than You Think π΄
π Read
via "Dark Reading: ".
The number of live, accessible .onion sites amounts to less than 0.005% of surface web domains, researchers report.π Read
via "Dark Reading: ".
Darkreading
The Dark Web Is Smaller Than You Think
The number of live, accessible .onion sites amounts to less than 0.005% of surface web domains, researchers report.
π΄ US States with the Worst Consumer Cyber-Hygiene π΄
π Read
via "Dark Reading: ".
Ranking based on consumers' cybersecurity practices - or lack thereof.π Read
via "Dark Reading: ".
Dark Reading
US States with the Worst Consumer Cyber-Hygiene
Ranking based on consumers' cybersecurity practices - or lack thereof.
π΄ How a Chinese Nation-State Group Reversed-Engineered NSA Attack Tools π΄
π Read
via "Dark Reading: ".
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.π Read
via "Dark Reading: ".
Darkreading
How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.
π΄ How a Chinese Nation-State Group Reversed-Engineered NSA Attack Tools π΄
π Read
via "Dark Reading: ".
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.π Read
via "Dark Reading: ".
Darkreading
How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.
π How to enable BitLocker on non-TPM Macs π
π Read
via "Security on TechRepublic".
It's easy to add Microsoft's drive encrypting BitLocker protection to your non-TPM enabled Mac computers hosting Windows via Boot Camp or third-party VM.π Read
via "Security on TechRepublic".
ATENTIONβΌ New - CVE-2018-14485
π Read
via "National Vulnerability Database".
BlogEngine.NET 3.3 allows XXE attacks via the POST body to metaweblog.axd.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14478 (coppermine_photo_gallery)
π Read
via "National Vulnerability Database".
ecard.php in Coppermine Photo Gallery (CPG) 1.5.46 has XSS via the sender_name, recipient_email, greetings, or recipient_name parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13994
π Read
via "National Vulnerability Database".
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a denial-of-service attack by making more than 120 connections.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13993
π Read
via "National Vulnerability Database".
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13992
π Read
via "National Vulnerability Database".
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext transmission (HTTP) of user credentials by default.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13991
π Read
via "National Vulnerability Database".
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 leaks private information in firmware images.π Read
via "National Vulnerability Database".
π΄ Orgs Are Quicker to Disclose Breaches Reported to Them Via External Sources π΄
π Read
via "Dark Reading: ".
Companies that find a breach on their own take substantially longer to report a breach, a new analysis shows.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover β
π Read
via "Threatpost".
Cisco has patched a critical flaw in its virtualized function automation tool, Cisco Elastic Services Controller.π Read
via "Threatpost".
Threat Post
Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover
Cisco has patched a critical flaw in its virtualized function automation tool, Cisco Elastic Services Controller.
π΄ Baltimore City Network Struck with Ransomware Attack π΄
π Read
via "Dark Reading: ".
Government employees are working to determine the source and severity of a cyberattack that forced most city servers offline.π Read
via "Dark Reading: ".
Darkreading
Baltimore City Network Struck with Ransomware Attack
Government employees are working to determine the source and severity of a cyberattack that forced most city servers offline.
β Researchersβ Evil Clippy cloaks malicious Office macros β
π Read
via "Naked Security".
A team of security researchers has exploited Microsoftβs patchy macro documentation to hide malicious code inside innocent-looking macros.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β School lunch company exec arrested for skewering rivalβs site β
π Read
via "Naked Security".
The Choicelunch CFO is accused of hacking student data out of The LunchMaster's site and anonymously ratting it out for bad security.π Read
via "Naked Security".
Naked Security
School lunch company exec arrested for skewering rivalβs site
The Choicelunch CFO is accused of hacking student data out of The LunchMasterβs site and anonymously ratting it out for bad security.