π΄ Patrolling the New Cybersecurity Perimeter π΄
π Read
via "Dark Reading: ".
Remote work and other developments demand a shift to managing people rather than devices.π Read
via "Dark Reading: ".
Darkreading
Patrolling the New Cybersecurity Perimeter
Remote work and other developments demand a shift to managing people rather than devices.
π The KGB's eavesdropping and spying devices in everyday items π
π Read
via "Security on TechRepublic".
The KGB Espionage Museum's curator Agne Urbaityte explains why and how plates and ashtrays were used as eavesdropping and spying devices.π Read
via "Security on TechRepublic".
TechRepublic
The KGB's eavesdropping and spying devices in everyday items
The KGB Espionage Museum's curator Agne Urbaityte explains why and how plates and ashtrays were used as eavesdropping and spying devices.
π΄ Startup Raises $13.7M to Stop Breaches with Behavioral Analytics π΄
π Read
via "Dark Reading: ".
TrueFort plans to use the funding to expand sales, marketing, R&D, customer support, and go-to-market initiatives.π Read
via "Dark Reading: ".
Dark Reading
Startup Raises $13.7M to Stop Breaches with Behavioral Analytics
TrueFort plans to use the funding to expand sales, marketing, R&D, customer support, and go-to-market initiatives.
ATENTIONβΌ New - CVE-2016-7404
π Read
via "National Vulnerability Database".
OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.π Read
via "National Vulnerability Database".
π΄ Pledges to Not Pay Ransomware Hit Reality π΄
π Read
via "Dark Reading: ".
While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay.π Read
via "Dark Reading: ".
Darkreading
Pledges to Not Pay Ransomware Hit Reality
While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay.
π Friday Five: 6/21 Edition π
π Read
via "Subscriber Blog RSS Feed ".
A $600,000 ransom is paid, a phishing attack yields more victims than expected, and a trio of university data breaches - catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 6/21 Edition
A $600,000 ransom is paid, a phishing attack yields more victims than expected, and a trio of university data breaches - catch up on the week's news with this roundup!
π΄ Four CVEs Describe SACKs of Linux and FreeBSD Vulnerabilities π΄
π Read
via "Dark Reading: ".
Four new CVEs present issues that have a potential DoS impact on almost every Linux user.π Read
via "Dark Reading: ".
Darkreading
Four CVEs Describe SACKs of Linux and FreeBSD Vulnerabilities
Four new CVEs present issues that have a potential DoS impact on almost every Linux user.
ATENTIONβΌ New - CVE-2017-15694
π Read
via "National Vulnerability Database".
When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.π Read
via "National Vulnerability Database".
π΄ Cyber-Risks Hiding Inside Mobile App Stores π΄
π Read
via "Dark Reading: ".
As the number of blacklisted apps on Google Play continues to drop, attackers find new ways to compromise smartphones.π Read
via "Dark Reading: ".
Darkreading
Cyber-Risks Hiding Inside Mobile App Stores
As the number of blacklisted apps on Google Play continues to drop, attackers find new ways to compromise smartphones.
β Podcast: Dating App Privacy and NASA Cyberattack β
π Read
via "Threatpost".
The Threatpost team discusses the top news of the week - from a NASA cyberincident to dating app privacy issues.π Read
via "Threatpost".
Threat Post
Podcast: Dating App Privacy and NASA Cyberattack
The Threatpost team discusses the top news of the week - from a NASA cyberincident to dating app privacy issues.
β Microsoft Outlook for Android Open to XSS Attacks β
π Read
via "Threatpost".
A spoofing bug (CVE-2019-1105) can open the door to an email attack chain.π Read
via "Threatpost".
Threat Post
Microsoft Outlook for Android Open to XSS Attacks
A spoofing bug (CVE-2019-1105) can open the door to an email attack chain.
β MobOk Malware Hides in Photo Editors on Google Play, Siphons Cash β
π Read
via "Threatpost".
Pink Camera apps secretly signed users up for premium subscription services.π Read
via "Threatpost".
Threat Post
MobOk Malware Hides in Photo Editors on Google Play, Siphons Cash
Pink Camera apps secretly signed users up for premium subscription services.
π How to view your privacy settings for Microsoft Office 365 π
π Read
via "Security on TechRepublic".
You can and should review your privacy settings for Microsoft Office 365. Learn how in this step-by-step tutorial.π Read
via "Security on TechRepublic".
TechRepublic
How to view your privacy settings for Microsoft Office 365
You can and should review your privacy settings for Microsoft Office 365. Learn how in this step-by-step tutorial.
β Monday review β the hot 20 stories of the week β
π Read
via "Naked Security".
From Bella Thorne publishing her own nudes to the Yubikey recall - and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 20 stories of the week
From Bella Thorne publishing her own nudes to the Yubikey recall β and everything in between. Itβs weekly roundup time.
β Facebook posts reveal your hidden illnesses, say researchers β
π Read
via "Naked Security".
The language we use could be indicators of disease and, with patient consent, could be monitored just like physical symptoms.π Read
via "Naked Security".
Naked Security
Facebook posts reveal your hidden illnesses, say researchers
The language we use could be indicators of disease and, with patient consent, could be monitored just like physical symptoms.
β Desjardinsβ employee from hell spills 2.9m records β
π Read
via "Naked Security".
The leak, carried out by a since-fired rogue employee, affected 2.7 million people and 173,000 businesses - about 41% of its clientele.π Read
via "Naked Security".
Naked Security
Desjardinsβ employee from hell spills 2.9m records
The leak, carried out by a since-fired rogue employee, affected 2.7 million people and 173,000 businesses β about 41% of its clientele.
β Mobile apps riddled with high-risk vulnerabilities, warns report β
π Read
via "Naked Security".
Be careful before installing that mobile app on your iOS or Android device - many mobile applications are riddled with vulnerabilities.π Read
via "Naked Security".
Naked Security
Mobile apps riddled with high-risk vulnerabilities, warns report
Be careful before installing that mobile app on your iOS or Android device β many mobile applications are riddled with vulnerabilities.
β Mozilla patched two Firefox zero-day flaws in one week β
π Read
via "Naked Security".
Two emergency zero days affecting a browser in one week counts as unusual - especially when they pop up as separate alerts two days apart.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β The Modern-Day Heist: IP Theft Techniques That Enable Attackers β
π Read
via "Threatpost".
There's more than one way to get inside a company.π Read
via "Threatpost".
Threat Post
The Modern-Day Heist: IP Theft Techniques That Enable Attackers
There's more than one way to get inside a company.
β Iran Targeting U.S. With Destructive Wipers, Warns DHS β
π Read
via "Threatpost".
The Department of Homeland Security is warning that U.S. agencies are being targeted by Iranian-backed cyberattacks with destructive wiper malware.π Read
via "Threatpost".
Threat Post
Iran Targeting U.S. With Destructive Wipers, Warns DHS
The Department of Homeland Security is warning that U.S. agencies are being targeted by Iranian-backed cyberattacks with destructive wiper malware.
π΄ Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks π΄
π Read
via "Dark Reading: ".
The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.π Read
via "Dark Reading: ".
Darkreading
Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks
The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.