π΄ Capital One Breach Affects 100M US Citizens, 6M Canadians π΄
π Read
via "Dark Reading: ".
The breach exposed credit card application data, Social Security numbers, and linked bank accounts, among other information.π Read
via "Dark Reading: ".
Darkreading
Capital One Breach Affects 100M US Citizens, 6M Canadians
The breach exposed credit card application data, Social Security numbers, and linked bank accounts, among other information.
ATENTIONβΌ New - CVE-2018-16871
π Read
via "National Vulnerability Database".
A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.π Read
via "National Vulnerability Database".
π΄ Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking π΄
π Read
via "Dark Reading: ".
Lack of security in the default settings of Internet-enabled video cameras make co-opting video feeds not just a movie-hacker technique, but a reality for millions of cameras.π Read
via "Dark Reading: ".
Darkreading
Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking
Lack of security in the default settings of Internet-enabled video cameras make co-opting video feeds not just a movie-hacker technique, but a reality for millions of cameras.
π New York Updates Data Breach Notification Law π
π Read
via "Subscriber Blog RSS Feed ".
The law, which updates data breach notification requirements in the state, was one of two forms of legislation signed last week to better protect New York residents against security breaches.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New York Updates Data Breach Notification Law
The law, which updates data breach notification requirements in the state, was one of two forms of legislation signed last week to better protect New York residents against security breaches.
π΄ Suffering SOC Saga Continues π΄
π Read
via "Dark Reading: ".
New study exposes low confidence among security professionals in their security operations centers.π Read
via "Dark Reading: ".
Dark Reading
Suffering SOC Saga Continues
New study exposes low confidence among security professionals in their security operations centers.
β Apple iMessage Allows Remote Attackers to Read iPhone Messages, Images β
π Read
via "Threatpost".
Remote exploitation can be achieved with no user interaction.π Read
via "Threatpost".
Threat Post
Apple iMessage Flaw Allows Remote Attackers to Read iPhone Messages
Remote exploitation can be achieved with no user interaction.
π΄ Apple iOS Flaw Could Give Attacker Access via iMessage π΄
π Read
via "Dark Reading: ".
Google Project Zero researchers found an iOS vulnerability that could let an attacker snoop on a victim's phone remotely.π Read
via "Dark Reading: ".
Darkreading
Apple iOS Flaw Could Give Attacker Access via iMessage
Google Project Zero researchers found an iOS vulnerability that could let an attacker snoop on a victim's phone remotely.
ATENTIONβΌ New - CVE-2017-18381
π Read
via "National Vulnerability Database".
The installation process in Open edX before 2017-01-10 exposes a MongoDB instance to external connections with default credentials.π Read
via "National Vulnerability Database".
β DHS Warning: Small Aircraft are Ripe for Hacking β
π Read
via "Threatpost".
Hackers with physical access to small aircraft can easily hack the plane's CAN bus system and take control of key navigation systems.π Read
via "Threatpost".
Threat Post
DHS Warning: Small Aircraft are Ripe for Hacking
Hackers with physical access to small aircraft can easily hack the plane's CAN bus system and take control of the navigation systems.
π΄ New AT&T Cybersecurity Managed Threat Detection and Response service π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
New AT&T Cybersecurity Managed Threat Detection and Response service
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
π΄ Container Security Is Falling Behind Container Deployments π΄
π Read
via "Dark Reading: ".
Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey.π Read
via "Dark Reading: ".
Darkreading
Container Security Is Falling Behind Container Deployments
Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey.
β Cyberattacks on connected cars could gridlock entire cities β
π Read
via "Naked Security".
It would require taking over and stranding 20% of a city's cars to freeze traffic, and only 10% to impede ambulances, physicists calculate.π Read
via "Naked Security".
Naked Security
Cyberattacks on connected cars could gridlock entire cities
It would require taking over and stranding 20% of a cityβs cars to freeze traffic, and only 10% to impede ambulances, physicists calculate.
π΄ Keep Your Eye on Digital Certificates π΄
π Read
via "Dark Reading: ".
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.π Read
via "Dark Reading: ".
Dark Reading
Keep Your Eye on Digital Certificates
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
π SanDisk's SSD Dashboard uses hardcoded password, lacks encrypted updates π
π Read
via "Security on TechRepublic".
Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution.π Read
via "Security on TechRepublic".
TechRepublic
SanDisk's SSD Dashboard uses hardcoded password, lacks encrypted updates
Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution.
π iOS and Android patched 440 security vulnerabilities in 2019, so far π
π Read
via "Security on TechRepublic".
Android patched more CVEs than Apple did, according to a Zimperium report.π Read
via "Security on TechRepublic".
TechRepublic
iOS and Android patched 440 security vulnerabilities in 2019, so far
Android patched more CVEs than Apple did, according to a Zimperium report.
π Capital One is not alone: 3.5B malicious login attacks target banks and customers π
π Read
via "Security on TechRepublic".
Phishing and credential stuffing attacks are top threats to financial services organizations and customers, according to Akamai.π Read
via "Security on TechRepublic".
TechRepublic
Capital One is not alone: 3.5B malicious login attacks target banks and customers
Phishing and credential stuffing attacks are top threats to financial services organizations and customers, according to Akamai.
β Black Hat USA 2019 Preview β
π Read
via "Threatpost".
Threatpost editors discuss the top trends, keynotes and sessions that they look forward to at Black Hat USA and DEF CON 2019.π Read
via "Threatpost".
Threat Post
Black Hat USA 2019 Preview
Threatpost editors discuss the top trends, keynotes and sessions that they look forward to at Black Hat USA and DEF CON 2019.
β Georgia hit with malware yet again β
π Read
via "Naked Security".
The Department of Public Safety says it won't pay, but given the umpteen times the state's agencies have been hit, somebody's not listening.π Read
via "Naked Security".
Naked Security
Georgia hit with malware yet again
The Department of Public Safety says it wonβt pay, but given the umpteen times the stateβs agencies have been hit, somebodyβs not listening.
β iMessage bug could have allowed attackers to read data from any iPhone β
π Read
via "Naked Security".
Google's Project Zero has unveiled details of a bug in Apple's iMessage that lets attackers read data from an iPhone without any user interaction.π Read
via "Naked Security".
Naked Security
iMessage bug could have allowed attackers to read data from any iPhone
Googleβs Project Zero has unveiled details of a bug in Appleβs iMessage that lets attackers read data from an iPhone without any user interaction.
π 5 experimental cybersecurity trends your business needs to know about π
π Read
via "Security on TechRepublic".
These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights.π Read
via "Security on TechRepublic".
TechRepublic
5 experimental cybersecurity trends your business needs to know about
These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights.