β High-Severity Flaws in Cisco Secure Internet Gateway Service Patched β
π Read
via "The first stop for security news | Threatpost ".
The two bugs were disclosed Wednesday in Cisco Umbrella, the tech giant's cloud-based security service.π Read
via "The first stop for security news | Threatpost ".
Threat Post
High-Severity Flaws in Cisco Secure Internet Gateway Service Patched
The two bugs were disclosed Wednesday in Cisco Umbrella, the tech giantβs cloud-based security service.
β Social Security numbers exposed on US government transparency site β
π Read
via "Naked Security".
The US government exposed dozens of people'sβ personal details, including social security numbers, due to an online mishap on a public transparency portal.π Read
via "Naked Security".
Naked Security
Social Security numbers exposed on US government transparency site
The US government exposed dozens of peopleβsβ personal details, including social security numbers, due to an online mishap on a public transparency portal.
β Mobile spyware maker mSpy leaks millions of records β AGAIN β
π Read
via "Naked Security".
The irony: Parents put it on kids' phones to protect them, but this breach exposed sensitive data including Whatsapp and Facebook messages.π Read
via "Naked Security".
Naked Security
Mobile spyware maker mSpy leaks millions of records β AGAIN
The irony: Parents put it on kidsβ phones to protect them, but this breach exposed sensitive data including Whatsapp and Facebook messages.
ATENTIONβΌ New - CVE-2017-1000600
π Read
via "National Vulnerability Database".
WordPress version <4.9 contains a CWE-20 Input Validation vulnerability in thumbnail processing that can result in remote code execution. This attack appears to be exploitable via thumbnail upload by an authenticated user and may require additional plugins in order to be exploited however this has not been confirmed at this time. This issue appears to have been partially, but not completely fixed in WordPress 4.9π Read
via "National Vulnerability Database".
β Mozillaβs Release of Firefox 62 Packs Nine Fixes β
π Read
via "The first stop for security news | Threatpost ".
The slew of fixes address a critical vulnerability that could enable memory corruption.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Mozilla Patches Critical Code Execution Bug in Firefox 62
The update includes nine security patches overall.
π΄ Understanding & Solving the Information-Sharing Challenge π΄
π Read
via "Dark Reading: ".
Why cybersecurity threat feeds from intel-sharing groups diminish in value and become just another source of noise. (And what to do about it.)π Read
via "Dark Reading: ".
Darkreading
Understanding & Solving the Information-Sharing Challenge
Why cybersecurity threat feeds from intel-sharing groups diminish in value and become just another source of noise. (And what to do about it.)
π΄ US to Charge North Korea for Sony Breach, WannaCry π΄
π Read
via "Dark Reading: ".
The DoJ plans to charge North Korean threat actors for their involvement in two major cyberattacks, US officials report.π Read
via "Dark Reading: ".
Darkreading
US to Charge North Korea for Sony Breach, WannaCry
The DoJ plans to charge North Korean threat actors for their involvement in two major cyberattacks, US officials report.
β Active Spy Campaign Exploits Unpatched Windows Zero-Day β
π Read
via "The first stop for security news | Threatpost ".
The PowerPool gang launched its attack just two days after the zero-day in the Windows Task Scheduler was disclosed.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Active Spy Campaign Exploits Unpatched Windows Zero-Day
The PowerPool gang launched its attack just two days after the zero-day in the Windows Task Scheduler was disclosed.
π΄ The SOC Gets a Makeover π΄
π Read
via "Dark Reading: ".
Today's security operations center is all about reducing the number of alerts with emerging technologies - and enhancing old-school human collaboration. Here's how some real-world SOCs are evolving.π Read
via "Dark Reading: ".
Dark Reading
The SOC Gets a Makeover
Today's security operations center is all about reducing the number of alerts with emerging technologies - and enhancing old-school human collaboration. Here's how some real-world SOCs are evolving.
π΄ Why a Healthy Data Diet Is the Secret to Healthy Security π΄
π Read
via "Dark Reading: ".
In the same way that food is fuel to our bodies, data is the fuel on which our security programs run. Here are 10 action items to put on your cybersecurity menu.π Read
via "Dark Reading: ".
Darkreading
Why a Healthy Data Diet Is the Secret to Healthy Security
In the same way that food is fuel to our bodies, data is the fuel on which our security programs run. Here are 10 action items to put on your cybersecurity menu.
π΄ Report: Data Breaches Hit Share Prices, Too π΄
π Read
via "Dark Reading: ".
A data breach has a measurable impact on stock price, according to a report looking at incidents from the past six yearsπ Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2017-14026
π Read
via "National Vulnerability Database".
In Ice Qube Thermal Management Center versions prior to version 4.13, the web application does not properly authenticate users which may allow an attacker to gain access to sensitive information.π Read
via "National Vulnerability Database".
π΄ Take (Industrial) Control: A Look at the 2018 ICS Threat Landscape π΄
π Read
via "Dark Reading: ".
New research sheds light on the biggest threats to strike ICS systems in the first half of 2018, and what's in store for the rest of this year.π Read
via "Dark Reading: ".
Darkreading
Take (Industrial) Control: A Look at the 2018 ICS Threat Landscape
New research sheds light on the biggest threats to strike ICS systems in the first half of 2018, and what's in store for the rest of this year.
β U.S. Ties Lazarus to North Korea and Major Hacking Conspiracy β
π Read
via "The first stop for security news | Threatpost ".
The DoJ said a DPRK spy, Park Jin-hyok, was involved in βa conspiracy to conduct multiple destructive cyberattacks around the world."π Read
via "The first stop for security news | Threatpost ".
Threat Post
U.S. Ties Lazarus to North Korea and Major Hacking Conspiracy
The DoJ said a DPRK spy, Park Jin-hyok, was involved in βa conspiracy to conduct multiple destructive cyberattacks around the world.β
π΄ The Best Way To Secure US Elections? Paper Ballots π΄
π Read
via "Dark Reading: ".
Voting machines that do not provide a paper trail or cannot be independently audited should immediately be removed, concludes a new report from the National Academies of Sciences, Engineering, and Medicine.π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
β ThreatList: Attacks on Industrial Control Systems on the Rise β
π Read
via "The first stop for security news | Threatpost ".
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Attacks on Industrial Control Systems on the Rise
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report.
β Dark web sites could be exposed by routine slip-up β
π Read
via "Naked Security".
A simple misconfiguration could expose the IP addresses of dark web sites.π Read
via "Naked Security".
Naked Security
Dark web sites could be exposed by routine slip-up
A simple misconfiguration could expose the IP addresses of dark web sites.
β Firefox finally casts Windows XP users adrift β
π Read
via "Naked Security".
Mozilla's browser is waving goodbye to millions of XP holdouts.π Read
via "Naked Security".
Naked Security
Firefox finally casts Windows XP users adrift
Mozillaβs browser is waving goodbye to millions of XP holdouts.
β Top MacOS App Exfiltrates Browser Histories Behind Usersβ Backs β
π Read
via "The first stop for security news | Threatpost ".
A macOS App called Adware Doctor blocks ads, but shareβs user browser history with a China-based domain.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Top MacOS App Exfiltrates Browser Histories Behind Usersβ Backs
A macOS App called Adware Doctor blocks ads, but shares user browser history with a China-based domain.
β Teen hacker admits to SWATting schools, airline flight β
π Read
via "Naked Security".
The teenager made bomb threats to schools, and to a flight between the UK and San Francisco while it was in mid-air.π Read
via "Naked Security".
Naked Security
Teen hacker admits to SWATting schools, airline flight
The teenager made bomb threats to schools, and to a flight between the UK and San Francisco while it was in mid-air.
β Threat Actors Eyeing IQY Files To Peddle Malspam β
π Read
via "The first stop for security news | Threatpost ".
The Necurs Botnet, DarkHydrus and other threat actors are turning to the inconspicuous files.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Threat Actors Eyeing IQY Files To Peddle Malspam
The Necurs Botnet, DarkHydrus and other threat actors are turning to the inconspicuous files.