π Hackers take aim at Fortune 500 companies on the Dark Web π
π Read
via "Security on TechRepublic".
Dark Web listings with the potential to harm the enterprise are up 20% since 2016, according to Bromium.π Read
via "Security on TechRepublic".
TechRepublic
Hackers take aim at Fortune 500 companies on the Dark Web
Dark Web listings with the potential to harm the enterprise are up 20% since 2016, according to Bromium.
π Windows 10 passwords won't expire: Why Microsoft says this will make your account safer π
π Read
via "Security on TechRepublic".
Changing passwords frequently is not only a pain, but also unsafe, according to Microsoft. Here's why the company's decision to remove password expirations is a good one.π Read
via "Security on TechRepublic".
π΄ Inside the Criminal Businesses Built to Target Enterprises π΄
π Read
via "Dark Reading: ".
Researchers witness an increase in buying and selling targeted hacking services, custom malware, and corporate network access on the Dark Web.π Read
via "Dark Reading: ".
Darkreading
Inside the Criminal Businesses Built to Target Enterprises
Researchers witness an increase in buying and selling targeted hacking services, custom malware, and corporate network access on the Dark Web.
β High-Severity Bug in Cisco Industrial Enterprise Tool Allows RCE β
π Read
via "Threatpost".
Bug allows for a remote attacker to execute arbitrary code on industrial, enterprise tools.π Read
via "Threatpost".
Threat Post
High-Severity Bug in Cisco Industrial Enterprise Tool Allows RCE
Bug allows for a remote attacker to execute arbitrary code on industrial, enterprise tools.
π΄ Cyber Talent Gap? Don't Think Like Tinder! π΄
π Read
via "Dark Reading: ".
If your company truly is a great place to work, make sure your help-wanted ads steer clear of these common job-listing cliches.π Read
via "Dark Reading: ".
Dark Reading
Cyber Talent Gap? Don't Think Like Tinder!
If your company truly is a great place to work, make sure your help-wanted ads steer clear of these common job-listing cliches.
π΄ 6 Security Scams Set to Sweep This Summer π΄
π Read
via "Dark Reading: ".
Experts share the cybersecurity threats to watch for and advice to stay protected.π Read
via "Dark Reading: ".
Darkreading
6 Security Scams Set to Sweep This Summer
Experts share the cybersecurity threats to watch for and advice to stay protected.
β AMCA Healthcare Hack Widens Again, Reaching 20.1M Victims β
π Read
via "Threatpost".
OPKO subsidiary BioReference joins Quest and LabCorp in the supply-chain incident.π Read
via "Threatpost".
Threat Post
AMCA Healthcare Hack Widens Again, Reaching 20.1M Victims
OPKO subsidiary BioReference joins Quest and LabCorp in the supply-chain incident.
ATENTIONβΌ New - CVE-2018-9839
π Read
via "National Vulnerability Database".
An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the 'm_id' parameter), any user with REPORTER access or above is able to view any private issue's details (summary, description, steps to reproduce, additional information) when cloning it. By checking the 'Copy issue notes' and 'Copy attachments' checkboxes and completing the clone operation, this data also becomes public (except private notes).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-8047
π Read
via "National Vulnerability Database".
vtiger CRM 7.0.1 is affected by one reflected Cross-Site Scripting (XSS) vulnerability affecting version 7.0.1 and probably prior versions. This vulnerability could allow remote unauthenticated attackers to inject arbitrary web script or HTML via index.php?module=Contacts&view=List (app parameter).π Read
via "National Vulnerability Database".
π΄ ADT Teams Up with SonicWall for SMB Security Services π΄
π Read
via "Dark Reading: ".
More than half of all SMBs plan to rely on third party providers for their security tools and services, according to IDC.π Read
via "Dark Reading: ".
Dark Reading
ADT Teams Up with SonicWall for SMB Security Services
More than half of all SMBs plan to rely on third party providers for their security tools and services, according to IDC.
π΄ Senior Executives More Involved with SOC Operations, Report Finds π΄
π Read
via "Dark Reading: ".
But they are still subject to the same alert fatigue and false-positive issues their junior employees face.π Read
via "Dark Reading: ".
Dark Reading
Senior Executives More Involved with SOC Operations, Report Finds
But they are still subject to the same alert fatigue and false-positive issues their junior employees face.
π΄ Feds Make New Arrest in Darkode Case π΄
π Read
via "Dark Reading: ".
Another American was arrested and charged alongside three international suspects who remain at large, according to newly unsealed indictment.π Read
via "Dark Reading: ".
Darkreading
Feds Make New Arrest in Darkode Case
Another American was arrested and charged alongside three international suspects who remain at large, according to newly unsealed indictment.
π΄ Cisco Buys Sentryo π΄
π Read
via "Dark Reading: ".
Cisco is adding the French company's network visibility products to its IoT network lineup.π Read
via "Dark Reading: ".
Dark Reading
Cisco Buys Sentryo
Cisco is adding the French company's network visibility products to its IoT network lineup.
β The FBI is sitting on more than 641m photos of peopleβs faces β
π Read
via "Naked Security".
Its already massive facial recognition databases have ballooned, and government watchdog GAO found that the FBI isn't checking accuracy.π Read
via "Naked Security".
Naked Security
The FBI is sitting on more than 641m photos of peopleβs faces
Its already massive facial recognition databases have ballooned, and government watchdog GAO found that the FBI isnβt checking accuracy.
β Researchers eavesdrop on smartphone finger taps β
π Read
via "Naked Security".
Researchers have been experimenting with a novel way to eavesdrop on what you're typing on your smartphone - by listening to the taps of your fingers.π Read
via "Naked Security".
Naked Security
Researchers eavesdrop on smartphone finger taps
Researchers have been experimenting with a novel way to eavesdrop on what youβre typing on your smartphone β by listening to the taps of your fingers.
π΄ The Minefield of Corporate Email π΄
π Read
via "Dark Reading: ".
Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.π Read
via "Dark Reading: ".
Darkreading
The Minefield of Corporate Email
Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.
β Whatβs the best approach to patching vulnerabilities? β
π Read
via "Naked Security".
Researchers ask: with only 1 in 20 vulnerabilities exploited, what's the best approach to patching?π Read
via "Naked Security".
Naked Security
Whatβs the best approach to patching vulnerabilities?
Researchers ask: with only 1 in 20 vulnerabilities exploited, whatβs the best approach to patching?
β Action required! Exim mail servers need urgent patching β
π Read
via "Naked Security".
Researchers have discovered another dangerous security hole hiding in recent, unpatched versions of the internetβs most popular mail server, Exim.π Read
via "Naked Security".
Naked Security
Action required! Exim mail servers need urgent patching
Researchers have discovered another dangerous security hole hiding in recent, unpatched versions of the internetβs most popular mail server, Exim.
π Friday Five: 6/7 Edition π
π Read
via "Subscriber Blog RSS Feed ".
The latest trade secret case, a more strict privacy bill for New York State, and the European Data Protection Supervisor's warning - catch up on the week's news with this recap!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 6/7 Edition
The latest trade secret case, a more strict privacy bill for New York State, and the European Data Protection Supervisor's warning - catch up on the week's news with this recap!
π΄ Learn the Latest Hacking Techniques at Black Hat Trainings Virginia π΄
π Read
via "Dark Reading: ".
At Black Hat's upcoming Trainings-only October event you'll have opportunities to get up to speed on the newest hacking tricks for operating systems and cloud providers.π Read
via "Dark Reading: ".
Dark Reading
Learn the Latest Hacking Techniques at Black Hat Trainings Virginia
At Black Hat's upcoming Trainings-only October event you'll have opportunities to get up to speed on the newest hacking tricks for operating systems and cloud providers.
β Troy Hunt: βMessyβ Password Problem Isnβt Getting Better β
π Read
via "Threatpost".
Poor password hygiene continues to plague the security industry, Troy Hunt said during Infosecurity Europe.π Read
via "Threatpost".
Threat Post
Troy Hunt: βMessyβ Password Problem Isnβt Getting Better
Poor password hygiene continues to plague the security industry, Troy Hunt said during Infosecurity Europe.