π΄ Four CVEs Describe SACKs of Linux and FreeBSD Vulnerabilities π΄
π Read
via "Dark Reading: ".
Four new CVEs present issues that have a potential DoS impact on almost every Linux user.π Read
via "Dark Reading: ".
Darkreading
Four CVEs Describe SACKs of Linux and FreeBSD Vulnerabilities
Four new CVEs present issues that have a potential DoS impact on almost every Linux user.
ATENTIONβΌ New - CVE-2017-15694
π Read
via "National Vulnerability Database".
When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.π Read
via "National Vulnerability Database".
π΄ Cyber-Risks Hiding Inside Mobile App Stores π΄
π Read
via "Dark Reading: ".
As the number of blacklisted apps on Google Play continues to drop, attackers find new ways to compromise smartphones.π Read
via "Dark Reading: ".
Darkreading
Cyber-Risks Hiding Inside Mobile App Stores
As the number of blacklisted apps on Google Play continues to drop, attackers find new ways to compromise smartphones.
β Podcast: Dating App Privacy and NASA Cyberattack β
π Read
via "Threatpost".
The Threatpost team discusses the top news of the week - from a NASA cyberincident to dating app privacy issues.π Read
via "Threatpost".
Threat Post
Podcast: Dating App Privacy and NASA Cyberattack
The Threatpost team discusses the top news of the week - from a NASA cyberincident to dating app privacy issues.
β Microsoft Outlook for Android Open to XSS Attacks β
π Read
via "Threatpost".
A spoofing bug (CVE-2019-1105) can open the door to an email attack chain.π Read
via "Threatpost".
Threat Post
Microsoft Outlook for Android Open to XSS Attacks
A spoofing bug (CVE-2019-1105) can open the door to an email attack chain.
β MobOk Malware Hides in Photo Editors on Google Play, Siphons Cash β
π Read
via "Threatpost".
Pink Camera apps secretly signed users up for premium subscription services.π Read
via "Threatpost".
Threat Post
MobOk Malware Hides in Photo Editors on Google Play, Siphons Cash
Pink Camera apps secretly signed users up for premium subscription services.
π How to view your privacy settings for Microsoft Office 365 π
π Read
via "Security on TechRepublic".
You can and should review your privacy settings for Microsoft Office 365. Learn how in this step-by-step tutorial.π Read
via "Security on TechRepublic".
TechRepublic
How to view your privacy settings for Microsoft Office 365
You can and should review your privacy settings for Microsoft Office 365. Learn how in this step-by-step tutorial.
β Monday review β the hot 20 stories of the week β
π Read
via "Naked Security".
From Bella Thorne publishing her own nudes to the Yubikey recall - and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 20 stories of the week
From Bella Thorne publishing her own nudes to the Yubikey recall β and everything in between. Itβs weekly roundup time.
β Facebook posts reveal your hidden illnesses, say researchers β
π Read
via "Naked Security".
The language we use could be indicators of disease and, with patient consent, could be monitored just like physical symptoms.π Read
via "Naked Security".
Naked Security
Facebook posts reveal your hidden illnesses, say researchers
The language we use could be indicators of disease and, with patient consent, could be monitored just like physical symptoms.
β Desjardinsβ employee from hell spills 2.9m records β
π Read
via "Naked Security".
The leak, carried out by a since-fired rogue employee, affected 2.7 million people and 173,000 businesses - about 41% of its clientele.π Read
via "Naked Security".
Naked Security
Desjardinsβ employee from hell spills 2.9m records
The leak, carried out by a since-fired rogue employee, affected 2.7 million people and 173,000 businesses β about 41% of its clientele.
β Mobile apps riddled with high-risk vulnerabilities, warns report β
π Read
via "Naked Security".
Be careful before installing that mobile app on your iOS or Android device - many mobile applications are riddled with vulnerabilities.π Read
via "Naked Security".
Naked Security
Mobile apps riddled with high-risk vulnerabilities, warns report
Be careful before installing that mobile app on your iOS or Android device β many mobile applications are riddled with vulnerabilities.
β Mozilla patched two Firefox zero-day flaws in one week β
π Read
via "Naked Security".
Two emergency zero days affecting a browser in one week counts as unusual - especially when they pop up as separate alerts two days apart.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β The Modern-Day Heist: IP Theft Techniques That Enable Attackers β
π Read
via "Threatpost".
There's more than one way to get inside a company.π Read
via "Threatpost".
Threat Post
The Modern-Day Heist: IP Theft Techniques That Enable Attackers
There's more than one way to get inside a company.
β Iran Targeting U.S. With Destructive Wipers, Warns DHS β
π Read
via "Threatpost".
The Department of Homeland Security is warning that U.S. agencies are being targeted by Iranian-backed cyberattacks with destructive wiper malware.π Read
via "Threatpost".
Threat Post
Iran Targeting U.S. With Destructive Wipers, Warns DHS
The Department of Homeland Security is warning that U.S. agencies are being targeted by Iranian-backed cyberattacks with destructive wiper malware.
π΄ Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks π΄
π Read
via "Dark Reading: ".
The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.π Read
via "Dark Reading: ".
Darkreading
Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks
The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.
π Why half of enterprises struggle to keep pace with cloud security π
π Read
via "Security on TechRepublic".
SaaS applications are supplanting traditional desktop software, and visibility into cloud workloads is a major problem, according to Symantec.π Read
via "Security on TechRepublic".
TechRepublic
Why half of enterprises struggle to keep pace with cloud security
SaaS applications are supplanting traditional desktop software, and visibility into cloud workloads is a major problem, according to Symantec.
π΄ Raspberry Pi Used in JPL Breach π΄
π Read
via "Dark Reading: ".
NASA report shows exfiltration totaling more than 100 GB of information since 2009.π Read
via "Dark Reading: ".
Darkreading
Raspberry Pi Used in JPL Breach
NASA report shows exfiltration totaling more than 100 GB of information since 2009.
π Preventing Tax Professional Data Theft Continues to Be a Challenge π
π Read
via "Subscriber Blog RSS Feed ".
A committee whose job is to oversee tax administration issues for the IRS says limitations at the agency are fostering cybersecurity risks.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Preventing Tax Professional Data Theft Continues to Be a Challenge
A committee whose job is to oversee tax administration issues for the IRS says limitations at the agency are fostering cybersecurity risks.
β Facebook Faces Lawsuit Over Massive 2018 Data Breach β
π Read
via "Threatpost".
An attempt by Facebook to block a lawsuit, regarding a massive 2018 data breach, has been shot down.π Read
via "Threatpost".
Threat Post
Facebook Faces Lawsuit Over Massive 2018 Data Breach
An attempt by Facebook to block a lawsuit, regarding a massive 2018 data breach, has been shot down.
ATENTIONβΌ New - CVE-2017-17945
π Read
via "National Vulnerability Database".
The ASUS HiVivo aspplication before 5.6.27 for ASUS Watch has Missing SSL Certificate Validation.π Read
via "National Vulnerability Database".
π΄ Health Insurer Reports Data Breach That Began 9 Years Ago π΄
π Read
via "Dark Reading: ".
Dominion National first spotted something awry in April of 2019.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading