π Dutch Data Protection Authority Issues First GDPR Fine π
π Read
via "Subscriber Blog RSS Feed ".
The fine, against a large hospital, stems from its apparent lack of internal patient record security.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Dutch Data Protection Authority Issues First GDPR Fine
The fine, against a large hospital, stems from its apparent lack of internal patient record security.
π΄ Security Training That Keeps Up with Modern Development π΄
π Read
via "Dark Reading: ".
Black Hat USA speakers to discuss what it will take to 'shift knowledge left' to build up a corps of security-savvy software engineers.π Read
via "Dark Reading: ".
Dark Reading
Security Training That Keeps Up with Modern Development
Black Hat USA speakers to discuss what it will take to 'shift knowledge left' to build up a corps of security-savvy software engineers.
ATENTIONβΌ New - CVE-2018-13897
π Read
via "National Vulnerability Database".
Clients hostname gets added to DNS record on device which is running dnsmasq resulting in an information exposure in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660π Read
via "National Vulnerability Database".
π΄ Johannesburg Ransomware Attack Leaves Residents in the Dark π΄
π Read
via "Dark Reading: ".
The virus affected the network, applications, and databases at City Power, which delivers electricity to the South African financial hub.π Read
via "Dark Reading: ".
Darkreading
Johannesburg Ransomware Attack Leaves Residents in the Dark
The virus affected the network, applications, and databases at City Power, which delivers electricity to the South African financial hub.
β New Loader Variant Behind Widespread Malware Attacks β
π Read
via "Threatpost".
Malware infection technique called TxHollower gets updated with stealthy features.π Read
via "Threatpost".
Threat Post
New Loader Variant Behind Widespread Malware Attacks
Malware infection technique called TxHollower gets updated with stealthy features.
β Streamlining Patch Management: Expert Advice β
π Read
via "Threatpost".
Webinar examines challenges in patch management and offers solutions to streamline the process.π Read
via "Threatpost".
Threat Post
Streamlining Patch Management: Expert Advice
Webinar examines challenges in patch management and offers solutions to streamline the process.
π΄ Louisiana Declares Cybersecurity State of Emergency π΄
π Read
via "Dark Reading: ".
A series of attacks on school district systems leads the governor to declare the state's first cybersecurity state of emergency.π Read
via "Dark Reading: ".
Darkreading
Louisiana Declares Cybersecurity State of Emergency
A series of attacks on school district systems leads the governor to declare the state's first cybersecurity state of emergency.
π΄ Russian Threat Group May Have Devised a 'Man-on-the-Side' Attack π΄
π Read
via "Dark Reading: ".
Data from an intrusion last year suggests Iron Liberty group may have a new trick up its sleeve, Secureworks says.π Read
via "Dark Reading: ".
Darkreading
Russian Threat Group May Have Devised a 'Man-on-the-Side' Attack
Data from an intrusion last year suggests Iron Liberty group may have a new trick up its sleeve, Secureworks says.
π΄ Android Spyware Has Ties to Election Interference π΄
π Read
via "Dark Reading: ".
Recently revealed surveillance-ware comes from a consultant with close ties to Russia's GRU who was sanctioned by the US for election-tampering.π Read
via "Dark Reading: ".
Darkreading
Android Spyware Has Ties to Election Interference
Recently revealed surveillance-ware comes from a consultant with close ties to Russia's GRU who was sanctioned by the US for election-tampering.
π΄ Senate Report: US Election Security 'Sorely Lacking' in 2016 π΄
π Read
via "Dark Reading: ".
Senate Intelligence Committee report released today cites weaknesses, but finds no evidence of vote-tampering.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2019-0202
π Read
via "National Vulnerability Database".
The Apache Storm Logviewer daemon exposes HTTP-accessible endpoints to read/search log files on hosts running Storm. In Apache Storm versions 0.9.1-incubating to 1.2.2, it is possible to read files off the host's file system that were not intended to be accessible via these endpoints.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-11779
π Read
via "National Vulnerability Database".
In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.π Read
via "National Vulnerability Database".
β S2 Ep1: FaceApp, logic bombs and stranger danger β Naked Security Podcast β
π Read
via "Naked Security".
Weβre finally back with Series 2 of the Naked Security Podcast. While youβve been missing us, weβve been working out how to improve the show and kitting out a dedicated studio. Youβll now find longer episodes with more opportunities to get involved. Send us your general cybersecurity questions and join the discussion via social media [β¦]π Read
via "Naked Security".
Naked Security
S2 Ep1: FaceApp, logic bombs and stranger danger β Naked Security Podcast
Weβre finally back with Series 2 of the Naked Security Podcast. Listen now!
β Browser plug-ins peddled personal data from over 4m browsers β
π Read
via "Naked Security".
Nacho Analytics gathered data like passwords, tax and prescription data from browser add-ons - and those who bought it can keep it.π Read
via "Naked Security".
Naked Security
Browser plug-ins peddled personal data from over 4m browsers
Nacho Analytics gathered data like passwords, tax and prescription data from browser add-ons β and those who bought it can keep it.
ATENTIONβΌ New - CVE-2018-20856
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-20855
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-20854
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel before 4.20. drivers/phy/mscc/phy-ocelot-serdes.c has an off-by-one error with a resultant ctrl->phys out-of-bounds read.π Read
via "National Vulnerability Database".
π΄ What Every Security Team Should Know About Internet Threats π΄
π Read
via "Dark Reading: ".
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.π Read
via "Dark Reading: ".
Dark Reading
What Every Security Team Should Know About Internet Threats
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.
β BlueKeep guides make imminent public exploit more likely β
π Read
via "Naked Security".
A public exploit for Microsoft's BlueKeep vulnerability is just days away. In fact, for those with deep pockets, it's already here.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Black Hat Q&A: Inside the Black Hat NOC π΄
π Read
via "Dark Reading: ".
Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.π Read
via "Dark Reading: ".
Dark Reading
Black Hat Q&A: Inside the Black Hat NOC
Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.