π΄ Malware Researcher Hutchins Sentenced to Supervised Release π΄
π Read
via "Dark Reading: ".
Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.π Read
via "Dark Reading: ".
Darkreading
Malware Researcher Hutchins Sentenced to Supervised Release
Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.
β Louisiana Gov Declares Emergency After Cyberattacks Plague Schools β
π Read
via "Threatpost".
Attacks on at least three school districts and likely others have prompted the state's first emergency due to cyberattack.π Read
via "Threatpost".
Threat Post
Louisiana Gov Declares Emergency After Cyberattacks Plague Schools
Attacks on at least three school districts and likely others have prompted the state's first emergency due to cyberattack.
β WannaCry hero gets off lightly, avoids prison β was justice done? β
π Read
via "Naked Security".
Wrote malware for money, went straight, got busted, didn't go to prison. Has US cybercrime enforcement gone soft?π Read
via "Naked Security".
Naked Security
WannaCry hero avoids prison
Marcus Hutchins, known as @MalwareTechBlog on Twitter, has been spared jail over malware charges. British-born Hutchins, who was credited with creating a βkill switchβ for WannaCry, was arrested inβ¦
ATENTIONβΌ New - CVE-2017-18379
π Read
via "National Vulnerability Database".
In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10764
π Read
via "National Vulnerability Database".
In the Linux kernel before 4.9.6, there is an off by one in the drivers/mtd/spi-nor/cadence-quadspi.c cqspi_setup_flash() function. There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the ">" should be ">=" instead.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9289
π Read
via "National Vulnerability Database".
In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-6712
π Read
via "National Vulnerability Database".
In the Linux kernel before 3.4, a buffer overflow occurs in drivers/net/wireless/iwlwifi/iwl-agn-sta.c, which will cause at least memory corruption.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-5327
π Read
via "National Vulnerability Database".
In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2010-5332
π Read
via "National Vulnerability Database".
In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2010-5331
π Read
via "National Vulnerability Database".
In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2007-6762
π Read
via "National Vulnerability Database".
In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array.π Read
via "National Vulnerability Database".
β Ransomware hits Louisiana schools; state of emergency declared β
π Read
via "Naked Security".
The Louisiana Governor declared a state of emergency after three public school districts were seized by ransomware.π Read
via "Naked Security".
Naked Security
Ransomware hits Louisiana schools; state of emergency declared
The Louisiana Governor declared a state of emergency after three public school districts were seized by ransomware.
β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From iOS 13's password hole to logic bombs courtesy of the programmer from hell - and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
From iOS 13βs password hole to logic bombs courtesy of the programmer from hell β and everything in between. Itβs weekly roundup time.
π΄ A Security-First Approach to DevOps π΄
π Read
via "Dark Reading: ".
Aware of the risks inherent in software, businesses are recognizing the need for application security.π Read
via "Dark Reading: ".
Dark Reading
A Security-First Approach to DevOps
Aware of the risks inherent in software, businesses are recognizing the need for application security.
π Is homomorphic encryption ready to deliver confidential cloud computing to enterprises? π
π Read
via "Security on TechRepublic".
The ability to keep data encrypted while you use it for computations in the cloud could protect data from attackers and malicious insiders alike. There is still a performance hit, but you can start using open-source libraries to take advantage of that.π Read
via "Security on TechRepublic".
TechRepublic
Is homomorphic encryption ready to deliver confidential cloud computing to enterprises?
The ability to keep data encrypted while you use it for computations in the cloud could protect data from attackers and malicious insiders alike. There is still a performance hit, but you can start using open-source libraries to take advantage of that.
β Three quarters of gamers suffer hate and harassment online β
π Read
via "Naked Security".
Trolling, stalking, sexual harassment, and humiliation have become so bad that one in ten respondents had depressive or suicidal thoughts.π Read
via "Naked Security".
Naked Security
Three quarters of gamers suffer hate and harassment online
Trolling, stalking, sexual harassment, and humiliation have become so bad that one in ten respondents had depressive or suicidal thoughts.
π΄ 9 Things That Don't Worry You Today (But Should) π΄
π Read
via "Dark Reading: ".
There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.π Read
via "Dark Reading: ".
Darkreading
9 Things That Don't Worry You Today (But Should)
There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.
β NAS vendors hit by brute force ransomware attacks β
π Read
via "Naked Security".
Cybercriminals are targeting numerous Network Attached Storage vendors with a new wave of ransomware.π Read
via "Naked Security".
Naked Security
NAS targeted by brute force ransomware attacks
Cybercriminals are targeting numerous Network Attached Storage vendors with a new wave of ransomware.
β Russia targeted all 50 states in 2016 election, Senate report says β
π Read
via "Naked Security".
The Senate Intelligence Committee doesn't know what Moscow's intentions are, but Robert Mueller says they're still at it.π Read
via "Naked Security".
Naked Security
Russia targeted all 50 states in 2016 election, Senate report says
The Senate Intelligence Committee doesnβt know what Moscowβs intentions are, but Robert Mueller says theyβre still at it.
β βWannaCry Heroβ Avoids Jail Time in Kronos Malware Charges β
π Read
via "Threatpost".
Marcus Hutchins, also known by his online alias MalwareTech, has been spared jail time in his sentencing for the creation of the Kronos malware.π Read
via "Threatpost".
Threat Post
βWannaCry Heroβ Avoids Jail Time in Kronos Malware Charges
Marcus Hutchins, also known by his online alias MalwareTech, has been spared jail time in his sentencing for the creation of the Kronos malware.
π 100+ IT policies at your fingertips, ready for download π
π Read
via "Security on TechRepublic".
From BYOD and social media to ergonomics and encryption, TechRepublic has dozens of ready-made, downloadable IT policy templates.π Read
via "Security on TechRepublic".
TechRepublic
100+ IT Policies at Your Fingertips and Ready for Download | TechRepublic
From BYOD and social media to ergonomics and encryption, TechRepublic Premium has dozens of ready-made, downloadable IT policy templates.