🕴 Google's Origin & the Danger of Link Sharing 🕴
📖 Read
via "Dark Reading: ".
How the act of sharing links to files stored in a public cloud puts organizations at risk, and what security teams can do to safeguard data and PII.📖 Read
via "Dark Reading: ".
Darkreading
Google's Origin & the Danger of Link Sharing
How the act of sharing links to files stored in a public cloud puts organizations at risk, and what security teams can do to safeguard data and PII.
🕴 Mobile Exploit Fingerprints Devices with Sensor Calibration Data 🕴
📖 Read
via "Dark Reading: ".
Data from routines intended to calibrate motion sensors can identify individual iOS and Android devices in a newly released exploit.📖 Read
via "Dark Reading: ".
Dark Reading
Mobile Exploit Fingerprints Devices with Sensor Calibration Data
Data from routines intended to calibrate motion sensors can identify individual iOS and Android devices in a newly released exploit.
❌ Calibration Attack Drills Down on iPhone, Pixel Users ❌
📖 Read
via "Threatpost".
A new way of tracking mobile users creates a globally unique device fingerprint that browsers and other protections can't stop.📖 Read
via "Threatpost".
Threat Post
Calibration Attack Drills Down on iPhone, Pixel Users
A new way of tracking mobile users creates a globally unique device fingerprint that browsers and other protections can't stop.
❌ Shade Ransomware Expands to U.S. Targets ❌
📖 Read
via "Threatpost".
Coming to America: The Shade ransomware, which has historically targeted Russian victims, was recently spotted expanding its sights.📖 Read
via "Threatpost".
Threat Post
Shade Ransomware Expands to U.S. Targets
The Shade ransomware, which has historically targeted Russian victims, was recently spotted expanding into the U.S. and Japan.
🕴 FEC Gives Green Light for Free Cybersecurity Help in Federal Elections 🕴
📖 Read
via "Dark Reading: ".
Official opinion issued by the Federal Election Commission to nonprofit Defending Digital Campaigns is good news for free and reduced-cost security offerings to political candidates and committees.📖 Read
via "Dark Reading: ".
Dark Reading
Application Security recent news | Dark Reading
Explore the latest news and expert commentary on Application Security, brought to you by the editors of Dark Reading
❌ Goodbye Passwords: Hello Identity Management ❌
📖 Read
via "Threatpost".
As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack.📖 Read
via "Threatpost".
Threat Post
Goodbye Passwords: Hello Identity Management
As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack.
ATENTION‼ New - CVE-2017-13667
📖 Read
via "National Vulnerability Database".
OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2017-11560
📖 Read
via "National Vulnerability Database".
An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2017-11559
📖 Read
via "National Vulnerability Database".
An issue was discovered in ZOHO ManageEngine OpManager 12.2. The 'apiKey' parameter of "/api/json/admin/getmailserversettings" and "/api/json/dashboard/gotoverviewlist" is vulnerable to a Blind SQL Injection attack.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2017-11557
📖 Read
via "National Vulnerability Database".
An issue was discovered in ZOHO ManageEngine Applications Manager 12.3. It is possible for an unauthenticated user to view the list of domain names and usernames used in a company's network environment via a userconfiguration.do?method=editUser request.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2017-11365
📖 Read
via "National Vulnerability Database".
Certain Symfony products are affected by: Incorrect Access Control. This affects Symfony 2.7.30 and Symfony 2.8.23 and Symfony 3.2.10 and Symfony 3.3.3. The type of exploitation is: remote. The component is: Password validator.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2016-9969
📖 Read
via "National Vulnerability Database".
In libwebp 0.5.1, there is a double free bug in libwebpmux.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2016-8901
📖 Read
via "National Vulnerability Database".
b2evolution 6.7.6 suffer from an Object Injection vulnerability in /htsrv/call_plugin.php.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2016-8899
📖 Read
via "National Vulnerability Database".
Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expCatController.php related to change_cats.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2016-8897
📖 Read
via "National Vulnerability Database".
Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/help/controllers/helpController.php.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2016-7550
📖 Read
via "National Vulnerability Database".
asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote).📖 Read
via "National Vulnerability Database".
🕴 Moody's Downgrade of Equifax: A Wakeup Call to Boards 🕴
📖 Read
via "Dark Reading: ".
The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.📖 Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
🕴 To Manage Security Risk, Manage Data First 🕴
📖 Read
via "Dark Reading: ".
At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.📖 Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
🕴 Moody's Downgrade of Equifax: A Wake-up Call to Boards 🕴
📖 Read
via "Dark Reading: ".
The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.📖 Read
via "Dark Reading: ".
Darkreading
Moody's Outlook Downgrade of Equifax: A Wake-up Call to Boards
The move provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.
🕴 Researcher Publishes Four Zero-Day Exploits in Three Days 🕴
📖 Read
via "Dark Reading: ".
The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues.📖 Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
🔐 GDPR: A cheat sheet 🔐
📖 Read
via "Security on TechRepublic".
Enforcement of the EU General Data Protection Regulation (GDPR) applies to any company that transacts with European Union citizens. Here's your GDPR go-to guide.📖 Read
via "Security on TechRepublic".
TechRepublic
GDPR: A cheat sheet
Enforcement of the EU General Data Protection Regulation (GDPR) applies to any company that transacts with European Union citizens. Here's your GDPR go-to guide.