π΄ The SOC Gets a Makeover π΄
π Read
via "Dark Reading: ".
Today's security operations center is all about reducing the number of alerts with emerging technologies - and enhancing old-school human collaboration. Here's how some real-world SOCs are evolving.π Read
via "Dark Reading: ".
Dark Reading
The SOC Gets a Makeover
Today's security operations center is all about reducing the number of alerts with emerging technologies - and enhancing old-school human collaboration. Here's how some real-world SOCs are evolving.
π΄ Why a Healthy Data Diet Is the Secret to Healthy Security π΄
π Read
via "Dark Reading: ".
In the same way that food is fuel to our bodies, data is the fuel on which our security programs run. Here are 10 action items to put on your cybersecurity menu.π Read
via "Dark Reading: ".
Darkreading
Why a Healthy Data Diet Is the Secret to Healthy Security
In the same way that food is fuel to our bodies, data is the fuel on which our security programs run. Here are 10 action items to put on your cybersecurity menu.
π΄ Report: Data Breaches Hit Share Prices, Too π΄
π Read
via "Dark Reading: ".
A data breach has a measurable impact on stock price, according to a report looking at incidents from the past six yearsπ Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2017-14026
π Read
via "National Vulnerability Database".
In Ice Qube Thermal Management Center versions prior to version 4.13, the web application does not properly authenticate users which may allow an attacker to gain access to sensitive information.π Read
via "National Vulnerability Database".
π΄ Take (Industrial) Control: A Look at the 2018 ICS Threat Landscape π΄
π Read
via "Dark Reading: ".
New research sheds light on the biggest threats to strike ICS systems in the first half of 2018, and what's in store for the rest of this year.π Read
via "Dark Reading: ".
Darkreading
Take (Industrial) Control: A Look at the 2018 ICS Threat Landscape
New research sheds light on the biggest threats to strike ICS systems in the first half of 2018, and what's in store for the rest of this year.
β U.S. Ties Lazarus to North Korea and Major Hacking Conspiracy β
π Read
via "The first stop for security news | Threatpost ".
The DoJ said a DPRK spy, Park Jin-hyok, was involved in βa conspiracy to conduct multiple destructive cyberattacks around the world."π Read
via "The first stop for security news | Threatpost ".
Threat Post
U.S. Ties Lazarus to North Korea and Major Hacking Conspiracy
The DoJ said a DPRK spy, Park Jin-hyok, was involved in βa conspiracy to conduct multiple destructive cyberattacks around the world.β
π΄ The Best Way To Secure US Elections? Paper Ballots π΄
π Read
via "Dark Reading: ".
Voting machines that do not provide a paper trail or cannot be independently audited should immediately be removed, concludes a new report from the National Academies of Sciences, Engineering, and Medicine.π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
β ThreatList: Attacks on Industrial Control Systems on the Rise β
π Read
via "The first stop for security news | Threatpost ".
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Attacks on Industrial Control Systems on the Rise
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report.
β Dark web sites could be exposed by routine slip-up β
π Read
via "Naked Security".
A simple misconfiguration could expose the IP addresses of dark web sites.π Read
via "Naked Security".
Naked Security
Dark web sites could be exposed by routine slip-up
A simple misconfiguration could expose the IP addresses of dark web sites.
β Firefox finally casts Windows XP users adrift β
π Read
via "Naked Security".
Mozilla's browser is waving goodbye to millions of XP holdouts.π Read
via "Naked Security".
Naked Security
Firefox finally casts Windows XP users adrift
Mozillaβs browser is waving goodbye to millions of XP holdouts.
β Top MacOS App Exfiltrates Browser Histories Behind Usersβ Backs β
π Read
via "The first stop for security news | Threatpost ".
A macOS App called Adware Doctor blocks ads, but shareβs user browser history with a China-based domain.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Top MacOS App Exfiltrates Browser Histories Behind Usersβ Backs
A macOS App called Adware Doctor blocks ads, but shares user browser history with a China-based domain.
β Teen hacker admits to SWATting schools, airline flight β
π Read
via "Naked Security".
The teenager made bomb threats to schools, and to a flight between the UK and San Francisco while it was in mid-air.π Read
via "Naked Security".
Naked Security
Teen hacker admits to SWATting schools, airline flight
The teenager made bomb threats to schools, and to a flight between the UK and San Francisco while it was in mid-air.
β Threat Actors Eyeing IQY Files To Peddle Malspam β
π Read
via "The first stop for security news | Threatpost ".
The Necurs Botnet, DarkHydrus and other threat actors are turning to the inconspicuous files.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Threat Actors Eyeing IQY Files To Peddle Malspam
The Necurs Botnet, DarkHydrus and other threat actors are turning to the inconspicuous files.
β Former NASA contractor arrested on charges of sextorting seven women β
π Read
via "Naked Security".
Richard Gregory Bauer allegedly weaseled private information out of the women on Facebook by pretending to be working on a class project.π Read
via "Naked Security".
Naked Security
Former NASA contractor arrested on charges of sextorting seven women
Richard Gregory Bauer allegedly weaseled private information out of the women on Facebook by pretending to be working on a class project.
β Threatpost News Wrap Podcast For Sept. 7 β
π Read
via "The first stop for security news | Threatpost ".
The Threatpost team breaks down the biggest news from the week ended Sept. 7.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Threatpost News Wrap Podcast For Sept. 7
The Threatpost team breaks down the biggest news from the week ended Sept. 7.
ATENTIONβΌ New - CVE-2016-9040
π Read
via "National Vulnerability Database".
An exploitable denial of service exists in the the Joyent SmartOS OS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFSADDENTRIES when used with a 32 bit model. An attacker can cause a buffer to be allocated and never freed. When repeatedly exploit this will result in memory exhaustion, resulting in a full system denial of service.π Read
via "National Vulnerability Database".
π΄ The Role of Incident Response in ICS Security Compliance π΄
π Read
via "Dark Reading: ".
The data-driven nature of IR can provide many of the reporting requirements governing industrial control system safety, finance, consumer privacy, and notifications.π Read
via "Dark Reading: ".
Darkreading
The Role of Incident Response in ICS Security Compliance
The data-driven nature of IR can provide many of the reporting requirements governing industrial control system safety, finance, consumer privacy, and notifications.
π΄ British Airways Issues Apology for Severe Data Breach π΄
π Read
via "Dark Reading: ".
The airline "is deeply sorry" for its worst-ever cyberattack, which has affected 380,000 customers.π Read
via "Dark Reading: ".
Dark Reading
British Airways Issues Apology for Severe Data Breach
The airline is deeply sorry for its worst-ever cyberattack, which has affected 380,000 customers.
β British Airways Website, Mobile App Breach Compromises 380k β
π Read
via "The first stop for security news | Threatpost ".
The airline said information like name, address and bank card details like CVC code were compromised.π Read
via "The first stop for security news | Threatpost ".
Threat Post
British Airways Website, Mobile App Breach Compromises 380k
The airline said information like name, address and bank card details like CVC code were compromised.
ATENTIONβΌ New - CVE-2017-1115
π Read
via "National Vulnerability Database".
IBM Campaign 9.1, 9.1.2, and 10 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 121153.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-1114
π Read
via "National Vulnerability Database".
IBM Campaign 9.1, 9.1.2, and 10 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 121152.π Read
via "National Vulnerability Database".