π΄ FBI Publishes GandCrab Decryption Keys π΄
π Read
via "Dark Reading: ".
Publishing the keys should render existing versions of the ransomware far less dangerous for victims.π Read
via "Dark Reading: ".
Darkreading
FBI Publishes GandCrab Decryption Keys
Publishing the keys should render existing versions of the ransomware far less dangerous for victims.
β LenovoEMC Storage Gear Leaks Sensitive Financial Data β
π Read
via "Threatpost".
Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.π Read
via "Threatpost".
Threat Post
LenovoEMC Storage Gear Leaks Sensitive Financial Data
Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.
ATENTIONβΌ New - CVE-2018-13442
π Read
via "National Vulnerability Database".
SolarWinds Network Performance Monitor 12.3 allows SQL Injection via the /api/ActiveAlertsOnThisEntity/GetActiveAlerts TriggeringObjectEntityNames parameter.π Read
via "National Vulnerability Database".
π΄ Security Snapshot: OS, Authentication, Browser & Cloud Trends π΄
π Read
via "Dark Reading: ".
New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.π Read
via "Dark Reading: ".
Dark Reading
Security Snapshot: OS, Authentication, Browser & Cloud Trends
New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.
π΄ Lenovo NAS Firmware Flaw Exposes Stored Data π΄
π Read
via "Dark Reading: ".
More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.π Read
via "Dark Reading: ".
Dark Reading
Lenovo NAS Firmware Flaw Exposes Stored Data
More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.
β Researchers hide data in music β and human ears canβt detect it β
π Read
via "Naked Security".
It's now possible to secretly transfer data inside music without turning it into unlistenable mush.π Read
via "Naked Security".
Naked Security
Researchers hide data in music β and human ears canβt detect it
Itβs now possible to secretly transfer data inside music without turning it into unlistenable mush.
β Facebook rolls out anti-scam reporting tool in UK β
π Read
via "Naked Security".
Facebook has coughed up Β£3m to help launch an anti-scam service as well as introducing a tool to report scam ads on its UK site.π Read
via "Naked Security".
Naked Security
Facebook rolls out anti-scam reporting tool in UK
Facebook has coughed up Β£3m to help launch an anti-scam service as well as introducing a tool to report scam ads on its UK site.
β Microsoft, Google and Apple clouds banned in Germanyβs schools β
π Read
via "Naked Security".
Citing privacy issues, Germany just banned its schools from using Microsoft Office 365, Google Docs, and Apple's iWork cloud services.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ The 10 Essentials of Infosec Forensics π΄
π Read
via "Dark Reading: ".
Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.π Read
via "Dark Reading: ".
Dark Reading
The 10 Essentials of Infosec Forensics
Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.
β RDP exposed: the wolves already at your door β
π Read
via "Naked Security".
While everyone waits for BlueKeep to be exploited, another RDP threat is already at the door, according to new research from Sophos.π Read
via "Naked Security".
Naked Security
RDP exposed: the wolves already at your door
While everyone waits for BlueKeep to be exploited, another RDP threat is already at the door, according to new research from Sophos.
π΄ Master Next-Level Network Defense Techniques at Black Hat USA π΄
π Read
via "Dark Reading: ".
Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.π Read
via "Dark Reading: ".
Dark Reading
Master Next-Level Network Defense Techniques at Black Hat USA
Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.
β StrongPity APT Returns with Retooled Spyware β
π Read
via "Threatpost".
The group is using malicious versions of WinRAR and other legitimate software packages to infect targets, likely via watering-hole attacks.π Read
via "Threatpost".
Threat Post
StrongPity APT Returns with Retooled Spyware
The group is using malicious versions of WinRAR and other legitimate software packages to infect targets, likely via watering-hole attacks.
π Top 5 things to consider for your disaster recovery plan π
π Read
via "Security on TechRepublic".
You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to consider for your disaster recovery plan
You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.
π Top 5 things to consider for your disaster recovery plan π
π Read
via "Security on TechRepublic".
You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to consider for your disaster recovery plan
You never know when disaster might strike, and being prepared can make all the difference. Tom Merritt suggests five tips for your disaster recovery plan.
π Why 70% of healthcare orgs have suffered data breaches π
π Read
via "Security on TechRepublic".
Digital transformation initiatives bring a slew of data privacy concerns to US health organizations, according to a Thales report.π Read
via "Security on TechRepublic".
TechRepublic
Why 70% of healthcare orgs have suffered data breaches
Digital transformation initiatives bring a slew of data privacy concerns to US health organizations, according to a Thales report.
π΄ For Real Security, Don't Let Failure Be Your Measure of Success π΄
π Read
via "Dark Reading: ".
For too long, we've focused almost exclusively on keeping out the bad guys rather than what to do when they get in (and they will).π Read
via "Dark Reading: ".
Darkreading
For Real Security, Don't Let Failure Be Your Measure of Success
For too long, we've focused almost exclusively on keeping out the bad guys rather than what to do when they get in (and they will).
π Malicious libraries in package repositories reveal a fundamental security flaw π
π Read
via "Security on TechRepublic".
The proliferation of malicious packages in repositories for software developers that rely on typosquatting points to a problem: A reliance on flat namespaces.π Read
via "Security on TechRepublic".
TechRepublic
Malicious libraries in package repositories reveal a fundamental security flaw
The proliferation of malicious packages in repositories for software developers that rely on typosquatting points to a problem: A reliance on flat namespaces.
ATENTIONβΌ New - CVE-2017-12652 (libpng)
π Read
via "National Vulnerability Database".
libpng before 1.6.32 does not properly check the length of chunks against the user limit.π Read
via "National Vulnerability Database".
π΄ Data Loss, Leakage Top Cloud Security Concerns π΄
π Read
via "Dark Reading: ".
Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers.π Read
via "Dark Reading: ".
Dark Reading
Data Loss, Leakage Top Cloud Security Concerns
Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers.
π Top 5 blockchain challenges businesses face π
π Read
via "Security on TechRepublic".
While blockchain technology can offer great opportunities, the hype surrounding it often leads to unrealistic expectations, according to the World Economic Forum.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 blockchain challenges businesses face
While blockchain technology can offer great opportunities, the hype surrounding it often leads to unrealistic expectations, according to the World Economic Forum.