ATENTIONβΌ New - CVE-2018-10946
π Read
via "National Vulnerability Database".
An issue was discovered in versions earlier than 1.3.0-66872 for Polycom RealPresence Debut that allows attackers to arbitrarily read the admin user's password via the admin web UI.π Read
via "National Vulnerability Database".
π΄ Cyberattack Hits Aircraft Parts Manufacturer π΄
π Read
via "Dark Reading: ".
Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.π Read
via "Dark Reading: ".
Darkreading
Cyberattack Hits Aircraft Parts Manufacturer
Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.
π΄ DNS Firewalls Could Save Companies Billions π΄
π Read
via "Dark Reading: ".
New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.π Read
via "Dark Reading: ".
Darkreading
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.
β Cop arrested following explicit chat with bogus 16yo girl β
π Read
via "Naked Security".
A male college student Snapchat-filtered himself into a young girl and went out to catch a predator. The first one he caught was a Californian cop.π Read
via "Naked Security".
Naked Security
Cop arrested following explicit chat with bogus 16yo girl
A male college student Snapchat-filtered himself into a young girl and went out to catch a predator. The first one he caught was a Californian cop.
β Facebook got 187,000 usersβ data with snoopy VPN app β
π Read
via "Naked Security".
According to a letter it sent to Sen. Richard Blumenthal, that's 31,000 US users, with the rest in India.π Read
via "Naked Security".
Naked Security
Facebook got 187,000 usersβ data with snoopy VPN app
According to a letter it sent to Sen. Richard Blumenthal, thatβs 31,000 US users, with the rest in India.
β Android phones can now be security keys for iOS devices β
π Read
via "Naked Security".
Hey, iOS users. Got a spare Android phone lying around? Now, you can use it as a secure access key for online services.π Read
via "Naked Security".
Naked Security
Android phones can now be security keys for iOS devices
Hey, iOS users. Got a spare Android phone lying around? Now, you can use it as a secure access key for online services.
π΄ DNS Firewalls Could Save Companies Billions π΄
π Read
via "Dark Reading: ".
New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.π Read
via "Dark Reading: ".
Darkreading
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.
β Critical flaw found in Evernote Web Clipper for Chrome β
π Read
via "Naked Security".
Anyone using it in its unpatched state is at risk not only of a compromise of their Evernote account but, potentially, of third-party accounts too.π Read
via "Naked Security".
Naked Security
Critical flaw found in Evernote Web Clipper for Chrome
Anyone using it in its unpatched state is at risk not only of a compromise of their Evernote account but, potentially, of third-party accounts too.
β Hackers Favor Weekdays for Attacks, Share Resources Often β
π Read
via "Threatpost".
Traffic analysis sheds light on weekday habits of attackers such as the most likely day for attacks and how malicious infrastructure is shared.π Read
via "Threatpost".
Threat Post
Hackers Favor Weekdays for Attacks, Share Resources Often
Traffic analysis sheds light on weekday habits of attackers such as the most likely day for attacks and how malicious infrastructure is shared.
π΄ BlueKeep RDP Vulnerability a Ticking Time Bomb π΄
π Read
via "Dark Reading: ".
One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing.π Read
via "Dark Reading: ".
Darkreading
BlueKeep RDP Vulnerability a Ticking Time Bomb
One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing.
π΄ Triton Attackers Seen Scanning US Power Grid Networks π΄
π Read
via "Dark Reading: ".
The development follows speculation and concern among security experts that the attack group would expand its scope to the power grid.π Read
via "Dark Reading: ".
Darkreading
Triton Attackers Seen Scanning US Power Grid Networks
The development follows speculation and concern among security experts that the attack group would expand its scope to the power grid.
π Privacy improvements in Chrome 76 will make it easier to bypass paywalls π
π Read
via "Security on TechRepublic".
Future improvements to Chrome will fix a gap in Incognito Mode, preventing publishers from blocking users from using incognito mode to jump over soft paywalls.π Read
via "Security on TechRepublic".
TechRepublic
Privacy improvements in Chrome 76 will make it easier to bypass paywalls
Future improvements to Chrome will fix a gap in Incognito Mode, preventing publishers from blocking users from using incognito mode to jump over soft paywalls.
β Millions of Linux Servers Under Worm Attack Via Exim Flaw β
π Read
via "Threatpost".
Attackers are exploiting a Linux Exim critical flaw to execute remote commands, download crypto miners and sniff out other vulnerable servers.π Read
via "Threatpost".
Threat Post
Millions of Linux Servers Under Worm Attack Via Exim Flaw
Attackers are exploiting a Linux Exim critical flaw to execute remote commands, download crypto miners and sniff out other vulnerable servers.
π Why your business should consider paying a ransom to hackers π
π Read
via "Security on TechRepublic".
Ransomware attacks can disrupt business and lead to massive costs, according to Forrester. Here's why you should consider paying along with other incident response plans.π Read
via "Security on TechRepublic".
TechRepublic
Why your business should consider paying a ransom to hackers
Ransomware attacks can disrupt business and lead to massive costs, according to Forrester. Here's why you should consider paying along with other incident response plans.
π΄ Sensory Overload: Filtering Out Cybersecurity's Noise π΄
π Read
via "Dark Reading: ".
No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.π Read
via "Dark Reading: ".
Dark Reading
Sensory Overload: Filtering Out Cybersecurity's Noise
No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.
π Friday Five: 6/14 Edition π
π Read
via "Subscriber Blog RSS Feed ".
A food bank hit by ransomware, advice on cybersecurity training, and a university data breach - catch up on the week's news with this recap!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 6/14 Edition
A food bank hit by ransomware, advice on cybersecurity training, and a university data breach - catch up on the week's news with this recap!
β Amazon Alexa Secretly Records Children, Lawsuits Allege β
π Read
via "Threatpost".
Two lawsuits are seeking class-action status, alleging that Amazon records children and stores their voiceprints indefinitely.π Read
via "Threatpost".
Threat Post
Amazon Alexa Secretly Records Children, Lawsuits Allege
Two lawsuits are seeking class-action status, alleging that Amazon records children and stores their voiceprints indefinitely.
β TRISIS Group, Known for Physical Destruction, Targets U.S. Electric Companies β
π Read
via "Threatpost".
XENOTIME, a destructive APT linked to Russia, has broadened its target set beyond Middle East oil and gas.π Read
via "Threatpost".
Threat Post
TRISIS Group, Known for Physical Destruction, Targets U.S. Electric Companies
XENOTIME, a destructive APT linked to Russia, has broadened its target set beyond Middle East oil and gas.
π΄ Better Cybersecurity Research Requires More Data Sharing π΄
π Read
via "Dark Reading: ".
Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.π Read
via "Dark Reading: ".
Dark Reading
Better Cybersecurity Research Requires More Data Sharing
Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.
β News Wrap: Amazon Privacy and Telegram DDoS Attack β
π Read
via "Threatpost".
Threatpost editors Tara Seals and Lindsey O'Donnell discuss a recent lawsuit against Amazon for its privacy policies, a Telegram DDoS attack and more.π Read
via "Threatpost".
Threat Post
News Wrap: Amazon Privacy and Telegram DDoS Attack
Threatpost editors Tara Seals and Lindsey O'Donnell discuss a recent lawsuit against Amazon for its privacy policies, a Telegram DDoS attack and more.
ATENTIONβΌ New - CVE-2017-8252
π Read
via "National Vulnerability Database".
Kernel can inject faults in computations during the execution of TrustZone leading to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SM7150, Snapdragon_High_Med_2016, SXR1130π Read
via "National Vulnerability Database".