π Why tech was key to the KGB being good at espionage π
π Read
via "Security on TechRepublic".
The KGB Espionage Museum's Agne Urbaityte explains various technologies and methods of eavesdropping used by the intelligence service, including Deadly Kiss and cameras in rings.π Read
via "Security on TechRepublic".
TechRepublic
Why tech was key to the KGB being good at espionage
The KGB Espionage Museum's Agne Urbaityte explains various technologies and methods of eavesdropping used by the intelligence service, including Deadly Kiss and cameras in rings.
β Tor Browser Issues Update for Critical System Takeover Flaw β
π Read
via "Threatpost".
The update patches critical flaw (CVE-2019-11707), a type confusion vulnerability in the Mozilla Firefox code that Tor uses.π Read
via "Threatpost".
Threat Post
Tor Browser Issues Update for Critical System Takeover Flaw
The update patches critical flaw (CVE-2019-11707), a type confusion vulnerability in the Mozilla Firefox code that Tor uses.
π΄ 7 2019 Security Venture Fund Deals You Should Know π΄
π Read
via "Dark Reading: ".
2019 has, so far, been a busy year for venture capitalists in the security industry. Here are 7 funding rounds important because of the technologies or market trends they represent.π Read
via "Dark Reading: ".
Dark Reading
7 2019 Security Venture Fund Deals You Should Know
2019 has, so far, been a busy year for venture capitalists in the security industry. Here are 7 funding rounds important because of the technologies or market trends they represent.
π΄ Machine Learning Boosts Defenses, But Security Pros Worry Over Attack Potential π΄
π Read
via "Dark Reading: ".
As defenders increasingly use machine learning to remove spam, catch fraud, and block malware, concerns persist that attackers will find ways to use AI technology to their advantage.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2017-17944
π Read
via "National Vulnerability Database".
The ASUS Vivobaby application before 1.1.09 for Android has Missing SSL Certificate Validation.π Read
via "National Vulnerability Database".
π΄ Small Businesses May Not Be Security's Weak Link π΄
π Read
via "Dark Reading: ".
Organizations with 250 or fewer employees often employ a higher percentage of security pros than their larger counterparts.π Read
via "Dark Reading: ".
Dark Reading
Small Businesses May Not Be Security's Weak Link
Organizations with 250 or fewer employees often employ a higher percentage of security pros than their larger counterparts.
β DanaBot Adds Ransomware to its Arsenal β
π Read
via "Threatpost".
Malware adds ransomware to its malicious bag of tricks.π Read
via "Threatpost".
Threat Post
DanaBot Adds Ransomware to its Arsenal
Malware adds ransomware to its malicious bag of tricks.
π΄ 'Democratizing' Machine Learning for Fraud Prevention & Payments Intelligence π΄
π Read
via "Dark Reading: ".
How fraud experts can fight cybercrime by 'downloading' their knowledge and experience into computer models.π Read
via "Dark Reading: ".
Dark Reading
Perimeter recent news | Dark Reading
Explore the latest news and expert commentary on Perimeter, brought to you by the editors of Dark Reading
π Firefox Users Urged to Patch Zero Day Following Attack π
π Read
via "Subscriber Blog RSS Feed ".
The zero day - which was actually two zero days chained together - was used in attacks against a popular cryptocurrency exchange on Monday.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Firefox Users Urged to Patch Zero Day Following Attack
The zero day - which was actually two zero days chained together - was used in attacks against a popular cryptocurrency exchange on Monday.
π How KGB agents were invisible spies π
π Read
via "Security on TechRepublic".
Dan Patterson interviews the KGB Espionage Museum's Agne Urbaityte about how agents in the field would blend in with their environment in order to spy.π Read
via "Security on TechRepublic".
TechRepublic
How KGB agents were invisible spies
Dan Patterson interviews the KGB Espionage Museum's Agne Urbaityte about how agents in the field would blend in with their environment in order to spy.
π΄ Florida City Ransom Payment Could Open Door to More Attacks π΄
π Read
via "Dark Reading: ".
Riviera Beach's decision to pay ransom to criminals might get files back, but it almost guarantees greater attacks against other governments.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ Florida Town Pays $600K to Ransomware Operators π΄
π Read
via "Dark Reading: ".
Riviera Beach's decision to pay ransom to criminals might get files back, but it almost guarantees greater attacks against other governments.π Read
via "Dark Reading: ".
Dark Reading
Florida Town Pays $600K to Ransomware Operators
Riviera Beach's decision to pay ransom to criminals might get files back, but it almost guarantees greater attacks against other governments.
β LoudMiner Cryptominer Uses Linux Image and Virtual Machines β
π Read
via "Threatpost".
A Tiny Core Linux 9.0 image configured to run XMRig runs on a VM, rather than victim machines hosting the malware locally.π Read
via "Threatpost".
Threat Post
LoudMiner Cryptominer Uses Linux Image and Virtual Machines
A Tiny Core Linux 9.0 image configured to run XMRig runs on a VM, rather than victim machines hosting the malware locally.
β Post-Ransomware Attack, Florida City Pays $600K β
π Read
via "Threatpost".
Riviera Beach, a Florida city, is coughing up $600,000 to hackers after a ransomware attack brought down its computer systems.π Read
via "Threatpost".
Threat Post
Post-Ransomware Attack, Florida City Pays $600K
Riviera Beach, a Florida city, is coughing up $600,000 to hackers after a ransomware attack brought down its computer systems.
β Match, Tinder Swipe Right For Privacy Red Flags, Say Experts β
π Read
via "Threatpost".
Analysts at ProPrivacy say the dating apps collect everything from chat content to financial data on their users -- and then they share it.π Read
via "Threatpost".
Threat Post
Match, Tinder Swipe Right For Privacy Red Flags, Say Experts
Analysts at PrivacyPro say the dating apps' privacy policies should be of concern to users.
π΄ Attackers Exploit MSP's Tools to Distribute Ransomware π΄
π Read
via "Dark Reading: ".
Early information suggests threat actors gained access to the managed service provider's remote monitoring and management tools and used them to attack the firm's clients.π Read
via "Dark Reading: ".
Darkreading
Customers of 3 MSPs Hit in Ransomware Attacks
Early information suggests threat actors gained access to remote monitoring and management tools from Webroot and Kaseya to distribute malware.
β Government is exposing identities of child abuse victims β
π Read
via "Naked Security".
DHS and FBI investigators are using Facebook profile IDs in court records - IDs that are easily used to look up their profile pages.π Read
via "Naked Security".
Naked Security
Government is exposing identities of child abuse victims
DHS and FBI investigators are using Facebook profile IDs in court records β IDs that are easily used to look up their profile pages.
β Florida city will pay over $600,000 to ransomware attackers β
π Read
via "Naked Security".
Riviera Beach, Florida, has agreed to pay attackers over $600,000 three weeks after its systems were crippled by ransomware.π Read
via "Naked Security".
Naked Security
Florida city will pay over $600,000 to ransomware attackers
Riviera Beach, Florida, has agreed to pay attackers over $600,000 three weeks after its systems were crippled by ransomware.
β Millions of Dell PCs Vulnerable to Flaw in Third-Party Component β
π Read
via "Threatpost".
A component in SupportAssist software pre-installed on Dell PCs - and other OEM devices - opens systems up to DLL hijacking attacks.π Read
via "Threatpost".
Threat Post
Millions of Dell PCs Vulnerable to Flaw in Third-Party Component
A component in SupportAssist software pre-installed on Dell PCs - and other OEM devices - opens systems up to DLL hijacking attacks.
π OEM diagnostic software used by Dell and other manufacturers has a serious security flaw π
π Read
via "Security on TechRepublic".
SupportAssist, which comes pre-installed on millions of Dell PCs, is based on a platform called PC-Doctor, and it can be abused to give attackers system-level access to hardware and software.π Read
via "Security on TechRepublic".
TechRepublic
OEM diagnostic software used by Dell and other manufacturers has a serious security flaw
SupportAssist, which comes pre-installed on millions of Dell PCs, is based on a platform called PC-Doctor, and it can be abused to give attackers system-level access to hardware and software.
β Used Nest cams were letting previous owners spy on you β
π Read
via "Naked Security".
Google says it's fixed the issue, but we haven't heard details on how many, and which, products were affected.π Read
via "Naked Security".
Naked Security
Used Nest cams were letting previous owners spy on you
Google says itβs fixed the issue, but we havenβt heard details on how many, and which, products were affected.