π΄ Chronicle Folds into Google π΄
π Read
via "Dark Reading: ".
Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.π Read
via "Dark Reading: ".
Dark Reading
Chronicle Folds into Google
Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.
π΄ New Exploit for Microsoft Excel Power Query π΄
π Read
via "Dark Reading: ".
Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.π Read
via "Dark Reading: ".
Darkreading
New Exploit for Microsoft Excel Power Query
Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.
β Cryptocurrency phish dials back the fear, cranks up the politeness β
π Read
via "Naked Security".
Spammers and scammers are getting better at spelling and grammar - so make sure you aren't relying on language alone to spot phishes...π Read
via "Naked Security".
Naked Security
Cryptocurrency phish dials back the fear, cranks up the politeness
Spammers and scammers are getting better at spelling and grammar β so make sure you arenβt relying on language alone to spot phishesβ¦
β Google Maps shortcut turns into 100-car mud pie in farmerβs field β
π Read
via "Naked Security".
Trying to save 20 minutes, 100 drivers took a Google Maps shortcut... into a field, where the mud-stuck cars then caused a 2-hour delay.π Read
via "Naked Security".
Naked Security
Google Maps shortcut turns into 100-car mud pie in farmerβs field
Trying to save 20 minutes, 100 drivers took a Google Maps shortcut⦠into a field, where the mud-stuck cars then caused a 2-hour delay.
β Mozillaβs bizarre robo-surfer project demonstrates ad snooping β
π Read
via "Naked Security".
In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that you're someone else.π Read
via "Naked Security".
Naked Security
Mozillaβs bizarre robo-surfer project demonstrates ad snooping
In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that youβre someone else.
β $50 DeepNude app undresses women with a single click β
π Read
via "Naked Security".
"I'm not a voyeur, I'm a technology enthusiast,β says the creator, who combined deepfake AI with a need for cash to get ka-CHING!π Read
via "Naked Security".
Naked Security
$50 DeepNude app undresses women with a single click
βIβm not a voyeur, Iβm a technology enthusiast,β says the creator, who combined deepfake AI with a need for cash to get ka-CHING!
β Death of the VPN: Enterprise Security Needs New Foundations β
π Read
via "Threatpost".
Twenty years in, enterprise VPNs occupy a uniquely solid position in a changing landscape.π Read
via "Threatpost".
Threat Post
Death of the VPN: Enterprise Security Needs New Foundations
Twenty years in, enterprise VPNs occupy a uniquely solid position in a changing landscape.
π΄ Black Hat USA's New Micro Summits Deliver Focused, Practical Security Insights π΄
π Read
via "Dark Reading: ".
This year Black Hat USA is introducing special half-day programs focused on important topics that combine subject matter expertise with networking opportunities.π Read
via "Dark Reading: ".
Dark Reading
Black Hat USA's New Micro Summits Deliver Focused, Practical Security Insights
This year Black Hat USA is introducing special half-day programs focused on important topics that combine subject matter expertise with networking opportunities.
π How SMBs can better protect sensitive data against cyberattacks π
π Read
via "Security on TechRepublic".
Know your enemy and know your risk are two pieces of advice offered in a new report from security company eSentire.π Read
via "Security on TechRepublic".
TechRepublic
How SMBs can better protect sensitive data against cyberattacks
Know your enemy and know your risk are two pieces of advice offered in a new report from security company eSentire.
π΄ How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy π΄
π Read
via "Dark Reading: ".
Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.π Read
via "Dark Reading: ".
Darkreading
How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy
Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.
β FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps β
π Read
via "Threatpost".
The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S.π Read
via "Threatpost".
Threat Post
FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps
The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S.
π Friday Five: 6/28 Edition π
π Read
via "Subscriber Blog RSS Feed ".
A $600,000 ransomware payment, statistics on the cybersecurity talent shortage, and more - catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 6/28 Edition
A $600,000 ransomware payment, statistics on the cybersecurity talent shortage, and more - catch up on the week's news with this roundup!
π΄ Cloud Provider PCM Suffers Data Breach π΄
π Read
via "Dark Reading: ".
Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.π Read
via "Dark Reading: ".
Darkreading
Cloud Provider PCM Suffers Data Breach
Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.
ATENTIONβΌ New - CVE-2018-15555
π Read
via "National Vulnerability Database".
On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.π Read
via "National Vulnerability Database".
π΄ Key Biscayne Hit by Cybersecurity Attack π΄
π Read
via "Dark Reading: ".
Key Biscayne is the third Florida town to be hit by hackers in June.π Read
via "Dark Reading: ".
Darkreading
Key Biscayne Hit by Cybersecurity Attack
Key Biscayne is the third Florida town to be hit by hackers in June.
ATENTIONβΌ New - CVE-2018-15520
π Read
via "National Vulnerability Database".
Various Lexmark devices have a Buffer Overflow (issue 2 of 2).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-15519
π Read
via "National Vulnerability Database".
Various Lexmark devices have a Buffer Overflow (issue 1 of 2).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14919
π Read
via "National Vulnerability Database".
LOYTEC LGATE-902 6.3.2 devices allow XSS.π Read
via "National Vulnerability Database".
π How to set up multi-factor authentication for an IAM user in AWS π
π Read
via "Security on TechRepublic".
MFA protocols are a simple best practice for increasing the overall access security of AWS cloud services and could prevent costly security breaches in your enterprise.π Read
via "Security on TechRepublic".
TechRepublic
How to set up multi-factor authentication for an IAM user in AWS
MFA protocols are a simple best practice for increasing the overall access security of AWS cloud services and could prevent costly security breaches in your enterprise.
β MongoDB Leak Exposed Millions of Medical Insurance Records β
π Read
via "Threatpost".
Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com.π Read
via "Threatpost".
Threat Post
MongoDB Leak Exposed Millions of Medical Insurance Records
Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com.
β New Dridex Variant Slips By Anti-Virus Detection β
π Read
via "Threatpost".
A never-before-seen Dridex variant has been spotted in phishing emails using anti-virus detection evasion tactics.π Read
via "Threatpost".
Threat Post
New Dridex Variant Slips By Anti-Virus Detection
A never-before-seen Dridex variant has been spotted in phishing emails using anti-virus detection evasion tactics.