π΄ Why You Need a Global View of IT Assets π΄
π Read
via "Dark Reading: ".
It may seem obvious, but many companies lose sight of the fact that they can't protect what they don't know they even have.π Read
via "Dark Reading: ".
Darkreading
Why You Need a Global View of IT Assets
It may seem obvious, but many companies lose sight of the fact that they can't protect what they don't know they even have.
ATENTIONβΌ New - CVE-2018-10531
π Read
via "National Vulnerability Database".
An issue was discovered in the America's Army Proving Grounds platform for the Unreal Engine. With a false packet sent via UDP, the application server responds with several bytes, giving the possibility of DoS amplification, even being able to be used in DDoS attacks.π Read
via "National Vulnerability Database".
π US Coast Guard Issues Cybersecurity Best Practices for Ships π
π Read
via "Subscriber Blog RSS Feed ".
In addition to a list of best practices, the Coast Guard confirmed in an alert this week that malware affected the shipboard network of a vessel in February.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
US Coast Guard Issues Cybersecurity Best Practices for Ships
In addition to a list of best practices, the Coast Guard confirmed in an alert this week that malware affected the shipboard network of a vessel in February.
π΄ New Ransomware Targets QNAP's Network-Attached Storage Devices π΄
π Read
via "Dark Reading: ".
More than 19,000 systems in the US are potentially at risk from eCh0raix.π Read
via "Dark Reading: ".
Darkreading
New Ransomware Targets QNAP's Network-Attached Storage Devices
More than 19,000 systems in the US are potentially at risk from eCh0raix.
β Bug in Anesthesia Respirators Allows Cyber-Tampering β
π Read
via "Threatpost".
GE Healthcare said an attacker could modify gas composition parameters within the devices' respirator function.π Read
via "Threatpost".
Threat Post
Bug in Anesthesia Respirators Allows Cyber-Tampering
GE Healthcare said an attacker could modify gas composition parameters within the devices' respirator function.
π΄ Financial Firms Face Threats from Employee Mobile Devices π΄
π Read
via "Dark Reading: ".
A new report says that phishing and man-in-the-middle attacks are major risks to financial institutions - via mobile devices in the hands of their employees.π Read
via "Dark Reading: ".
Darkreading
Financial Firms Face Threats from Employee Mobile Devices
A new report says that phishing and man-in-the-middle attacks are major risks to financial institutions - via mobile devices in the hands of their employees.
π΄ Industry Insight: Checking Up on Healthcare Security π΄
π Read
via "Dark Reading: ".
Modern threats putting healthcare organization at risk, how they're improving their security posture, and where many fall short.π Read
via "Dark Reading: ".
Dark Reading
Industry Insight: Checking Up on Healthcare Security
Modern threats putting healthcare organization at risk, how they're improving their security posture, and where many fall short.
β βMozilla arenβt villains after allβ β ISPs back down after public outcry β
π Read
via "Naked Security".
Mozilla was nominated for an "Internet Villain" award - and The People Of The Internet were not pleasedπ Read
via "Naked Security".
Naked Security
βMozilla arenβt villains after allβ β ISPs back down after public outcry
Mozilla was nominated for an βInternet Villainβ award β and The People Of The Internet were not pleased
β GDPR superpowers lead to whopper ICO fines for BA, Marriott β
π Read
via "Naked Security".
The ICO isn't pulling its punches: The penalty for BA's data breach is about 367 times higher than the previous record-setting fine.π Read
via "Naked Security".
Naked Security
GDPR superpowers lead to whopper ICO fines for BA, Marriott
The ICO isnβt pulling its punches: The penalty for BAβs data breach is about 367 times higher than the previous record-setting fine.
β Cyberattack lands ship in hot water β
π Read
via "Naked Security".
Less than two months after warning of cybersecurity problems on ships, the US Coast Guard has revealed that a large international vessel has suffered a cyberattack.π Read
via "Naked Security".
Naked Security
Cyberattack lands ship in hot water
Less than two months after warning of cybersecurity problems on ships, the US Coast Guard has revealed that a large international vessel has suffered a cyberattack.
π΄ Persistent Threats Can Last Inside SMB Networks for Years π΄
π Read
via "Dark Reading: ".
The average dwell time for riskware can be as much as 869 days.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π Cybersecurity: Malware lingers in SMBs for an average of 800 days before discovery π
π Read
via "Security on TechRepublic".
Small and medium-sized businesses lack the IT staff needed to run comprehensive security detection and response, according to Infocyte.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity: Malware lingers in SMBs for an average of 800 days before discovery
Small and medium-sized businesses lack the IT staff needed to run comprehensive security detection and response, according to Infocyte.
β Implementing Bug Bounty Programs: The Right and Wrong Approaches β
π Read
via "Threatpost".
Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs.π Read
via "Threatpost".
Threat Post
Implementing Bug Bounty Programs: The Right and Wrong Approaches
Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs.
β Facial recognition surveillance must be banned, says Fight for the Future β
π Read
via "Naked Security".
βWe donβt need to regulate it, we need to ban it entirely.βπ Read
via "Naked Security".
Naked Security
Facial recognition surveillance must be banned, says Fight for the Future
βWe donβt need to regulate it, we need to ban it entirely.β
π΄ Learn the Unique Weaknesses of Apple Devices at Black Hat USA π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
Learn the Unique Weaknesses of Apple Devices at Black Hat USA
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
β Apple Disables Walkie-Talkie App Due to Eavesdropping Flaw β
π Read
via "Threatpost".
Apple has disabled the Walkie Talkie app from its Apple Watch products after a vulnerability was discovered enabling bad actors to eavesdrop on iPhone conversations.π Read
via "Threatpost".
Threat Post
Apple Disables Walkie-Talkie App Due to Eavesdropping Flaw
Apple has disabled the Walkie Talkie app from its Apple Watch products after a vulnerability was discovered enabling bad actors to eavesdrop on iPhone conversations.
β Apple Issues Silent Update Removing Zoomβs Hidden Server β
π Read
via "Threatpost".
The tech giant addressed a widely publicized Zoom bug with an automatic update mechanism usually reserved for removing malware.π Read
via "Threatpost".
Threat Post
Apple Issues Silent Update Removing Zoomβs Hidden Server
The tech giant addressed a widely publicized Zoom bug with an automatic update mechanism usually reserved for removing malware.
π Gone phishing: Why summer brings increased security threats to the enterprise π
π Read
via "Security on TechRepublic".
Employees working away from the office, including over vacation, could increase the chance of network compromise.π Read
via "Security on TechRepublic".
TechRepublic
Gone phishing: Why summer brings increased security threats to the enterprise
Employees working away from the office, including over vacation, could increase the chance of network compromise.
π΄ The Security of Cloud Applications π΄
π Read
via "Dark Reading: ".
Despite the great success of the cloud over the last decade, misconceptions continue to persist. Here's why the naysayers are wrong.π Read
via "Dark Reading: ".
Darkreading
The Security of Cloud Applications
Despite the great success of the cloud over the last decade, misconceptions continue to persist. Here's why the naysayers are wrong.
π΄ Summer: A Time for Vacations & Cyberattacks? π΄
π Read
via "Dark Reading: ".
About a third of cybersecurity professionals believe that their companies see more cyberattacks during the summer, but the survey data does not convince on the reasons for the perception of a summer bump.π Read
via "Dark Reading: ".
Darkreading
Summer: A Time for Vacations & Cyberattacks?
About a third of cybersecurity professionals believe that their companies see more cyberattacks during the summer, but the survey data does not convince on the reasons for the perception of a summer bump.