ATENTIONβΌ New - CVE-2018-14916
π Read
via "National Vulnerability Database".
LOYTEC LGATE-902 6.3.2 devices allow Arbitrary file deletion.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14887
π Read
via "National Vulnerability Database".
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14886
π Read
via "National Vulnerability Database".
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14885
π Read
via "National Vulnerability Database".
Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14868
π Read
via "National Vulnerability Database".
Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14867
π Read
via "National Vulnerability Database".
Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10761
π Read
via "National Vulnerability Database".
Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing encryption, aka MouseJack.π Read
via "National Vulnerability Database".
β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From the controversial DeepNude app to the Molotov-cocktail-throwing hacker who dropped his USB stick - and everything in between.π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
From the controversial DeepNude app to the Molotov-cocktail-throwing hacker who dropped his USB stick β and everything in between.
β Crave that Instagram verified badge? Donβt fall for this login-stealing scam β
π Read
via "Naked Security".
It's yet another way to trick Instagram users out of their login credentials. Don't fall for it, lest your account be hijacked!π Read
via "Naked Security".
Naked Security
Crave that Instagram verified badge? Donβt fall for this login-stealing scam
Itβs yet another way to trick Instagram users out of their login credentials. Donβt fall for it, lest your account be hijacked!
β Cloud computing giant PCM hacked β
π Read
via "Naked Security".
The attackers allegedly stole admin credentials for Office 365 accounts, and planned to use stolen data to conduct gift card fraud.π Read
via "Naked Security".
Naked Security
Cloud computing giant PCM hacked
The attackers allegedly stole admin credentials for Office 365 accounts, and planned to use stolen data to conduct gift card fraud.
π΄ Too Many Tools? Tidy Up in 'KonMari' Style π΄
π Read
via "Dark Reading: ".
You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.π Read
via "Dark Reading: ".
Dark Reading
Too Many Tools? Tidy Up in 'KonMari' Style
You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.
π΄ Planning a Bug Bounty Program? Follow In Shopify's Footsteps π΄
π Read
via "Dark Reading: ".
Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.π Read
via "Dark Reading: ".
Dark Reading
Planning a Bug Bounty Program? Follow In Shopify's Footsteps
Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.
π΄ To Pay or Not To Pay? That Is the (Ransomware) Question π΄
π Read
via "Dark Reading: ".
From Albany, New York, to Atlanta, Georgia, to Del Rio, Texas, cities across the US have been hit with ransomware attacks.π Read
via "Dark Reading: ".
Dark Reading
To Pay or Not To Pay? That Is the (Ransomware) Question
From Albany, New York, to Atlanta, Georgia, to Del Rio, Texas, cities across the US have been hit with ransomware attacks.
π΄ Back to Basics with Log Management, SIEMs & MSSPs π΄
π Read
via "Dark Reading: ".
Still not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.π Read
via "Dark Reading: ".
Dark Reading
Back to Basics with Log Management, SIEMs & MSSPs
Still not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.
π΄ Staying Ahead of the Bot Landscape π΄
π Read
via "Dark Reading: ".
Thinking of the bot landscape as homogeneous paints an overly simplistic picture.π Read
via "Dark Reading: ".
Dark Reading
Staying Ahead of the Bot Landscape
Thinking of the bot landscape as homogeneous paints an overly simplistic picture.
π΄ How to Defend Credentials From Automated Attack Tools π΄
π Read
via "Dark Reading: ".
The following recommendations can help both end users and Web defenders mitigate credential abuse attacks.π Read
via "Dark Reading: ".
Dark Reading
How to Defend Credentials From Automated Attack Tools
The following recommendations can help both end users and Web defenders mitigate credential abuse attacks.
π΄ 3 Security Imperatives And The Evolving Digital Topology π΄
π Read
via "Dark Reading: ".
No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.π Read
via "Dark Reading: ".
Dark Reading
3 Security Imperatives And The Evolving Digital Topology
No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.
π΄ DHS's Bob Kolasky Goes All in on Risk Management π΄
π Read
via "Dark Reading: ".
As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.π Read
via "Dark Reading: ".
Dark Reading
DHS's Bob Kolasky Goes All in on Risk Management
As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.
π΄ Capture the Flag: Training Made Fun π΄
π Read
via "Dark Reading: ".
CTFs require participants to be creative while using their critical-thinking and problem-solving skills to ultimately arrive at a functional solution.π Read
via "Dark Reading: ".
Dark Reading
Capture the Flag: Training Made Fun
CTFs require participants to be creative while using their critical-thinking and problem-solving skills to ultimately arrive at a functional solution.
π΄ Security Considerations in a BYOD Culture π΄
π Read
via "Dark Reading: ".
The 'bring your own device' movement has put security pros on high alert for a new breed of predator on the hunt to find ways to exploit the ever-expanding attack surface.π Read
via "Dark Reading: ".
Dark Reading
Security Considerations in a BYOD Culture
The 'bring your own device' movement has put security pros on high alert for a new breed of predator on the hunt to find ways to exploit the ever-expanding attack surface.
π΄ The 10 Essential Basics of Infosec Forensics π΄
π Read
via "Dark Reading: ".
Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.π Read
via "Dark Reading: ".
Dark Reading
The 10 Essential Basics of Infosec Forensics
Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.