π΄ Former Twitter CISO Launches Startup to Secure Cloud Collaboration π΄
π Read
via "Dark Reading: ".
Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing.π Read
via "Dark Reading: ".
Dark Reading
Former Twitter CISO Launches Startup to Secure Cloud Collaboration
Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing.
π New Bill Aims to Better Secure U.S. IP, Supply Chain Security π
π Read
via "Subscriber Blog RSS Feed ".
The legislation, which cites a rash of Chinese IP theft, would develop a national strategy to prevent risks to U.S. tech.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New Bill Aims to Better Secure U.S. IP, Supply Chain Security
The legislation, which cites a rash of Chinese IP theft, would develop a national strategy to prevent risks to U.S. tech.
π Enterprises may be clouding up their security future π
π Read
via "Security on TechRepublic".
Security is hard enough without adding multiple clouds into the mix.π Read
via "Security on TechRepublic".
TechRepublic
Enterprises may be clouding up their security future
Security is hard enough without adding multiple clouds into the mix.
π΄ Why the Network Is Central to IoT Security π΄
π Read
via "Dark Reading: ".
Is there something fishy about your network activity? Better make sure all of your IoT devices are under control.π Read
via "Dark Reading: ".
Darkreading
Why the Network Is Central to IoT Security
Is there something strange about your network activity? Better make sure all of your IoT devices are under control.
β Hondaβs Security βSoft Spotsβ Exposed in Unsecured Database β
π Read
via "Threatpost".
A researcher said that he found a Honda ElasticSearch database exposing 40GB of internal system and device data.π Read
via "Threatpost".
Threat Post
Hondaβs Security βSoft Spotsβ Exposed in Unsecured Database
A researcher said that he found a Honda ElasticSearch database exposing 40GB of internal system and device data.
π΄ Apple Device Management Firm Jamf Acquires Digita Security π΄
π Read
via "Dark Reading: ".
Digita Security's Apple Mac endpoint protection solutions will join Jamf's MDM suite for iOS and MacOS.π Read
via "Dark Reading: ".
Dark Reading
Apple Device Management Firm Jamf Acquires Digita Security
Digita Security's Apple Mac endpoint protection solutions will join Jamf's MDM suite for iOS and MacOS.
ATENTIONβΌ New - CVE-2007-6763
π Read
via "National Vulnerability Database".
SAS Drug Development (SDD) before 32DRG02 mishandles logout actions, which allows a user (who was previously logged in) to access resources by pressing a back or forward button in a web browser.π Read
via "National Vulnerability Database".
β Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware β
π Read
via "Threatpost".
The RIG exploit kit and Safari redirects are both in the adversaries' bag of tricks.π Read
via "Threatpost".
Threat Post
Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware
The RIG exploit kit and Safari redirects are both in the adversaries' bag of tricks.
π΄ Flaws in SanDisk SSD Dashboard Present Malware & Data Loss Risks π΄
π Read
via "Dark Reading: ".
Organizations using the utility should immediately install the latest version of the software, security vendor Trustwave says.π Read
via "Dark Reading: ".
Dark Reading
Flaws in SanDisk SSD Dashboard Present Malware & Data Loss Risks
Organizations using the utility should immediately install the latest version of the software, security vendor Trustwave says.
π΄ Google Cloud Debuts New Security Capabilities π΄
π Read
via "Dark Reading: ".
Updates include Advanced Protection Program for the enterprise and general availability of password vaulted apps in Cloud Identity and G Suite.π Read
via "Dark Reading: ".
Dark Reading
Google Cloud Debuts New Security Capabilities
Updates include Advanced Protection Program for the enterprise and general availability of password vaulted apps in Cloud Identity and G Suite.
ATENTIONβΌ New - CVE-2015-5297
π Read
via "National Vulnerability Database".
An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.π Read
via "National Vulnerability Database".
β Five Eyes nations demand access to encrypted messaging β
π Read
via "Naked Security".
The alliance wants tech companies to build backdoor access to usersβ encrypted data, by force if necessary.π Read
via "Naked Security".
Naked Security
Five Eyes nations demand access to encrypted messaging
The alliance wants tech companies to build backdoor access to usersβ encrypted data, by force if necessary.
β North Carolina county falls for BEC scam, to the tune of $1,728,083 β
π Read
via "Naked Security".
The county could only claw back some of the $2,504,601 it paid to a scammer posing as a contractor working on building a new high school.π Read
via "Naked Security".
Naked Security
North Carolina county falls for BEC scam, to the tune of $1,728,083
The county could only claw back some of the $2,504,601 it paid to a scammer posing as a contractor working on building a new high school.
π΄ A Realistic Path Forward for Security Orchestration and Automation π΄
π Read
via "Dark Reading: ".
Security teams often look to technology to solve their security challenges. Yet sometimes investing in new products can create more issues.π Read
via "Dark Reading: ".
Dark Reading
A Realistic Path Forward for Security Orchestration and Automation
Security teams often look to technology to solve their security challenges. Yet sometimes investing in new products can create more issues.
β Researchers hack camera in fake video attack β
π Read
via "Naked Security".
Tampering with surveillance cameras is a common activity for Hollywood heroes and criminals alike. Now, researchers have shown how they can do it in real life.π Read
via "Naked Security".
Naked Security
Researchers hack camera in fake video attack
Tampering with surveillance cameras is a common activity for Hollywood heroes and criminals alike. Now, researchers have shown how they can do it in real life.
π Top 10 IoT security risks for businesses π
π Read
via "Security on TechRepublic".
Organizations must adopt a security-by-design approach to best combat threats created by the Internet of Things, according to Deloitte.π Read
via "Security on TechRepublic".
TechRepublic
Top 10 IoT security risks for businesses
Organizations must adopt a security-by-design approach to best combat threats created by the Internet of Things, according to Deloitte.
π΄ SecOps Success Through Employee Retention π΄
π Read
via "Dark Reading: ".
To keep your turnover low, focus on these areas: compensation, advancement opportunities, training, and environment.π Read
via "Dark Reading: ".
Dark Reading
SecOps Success Through Employee Retention
To keep your turnover low, focus on these areas: compensation, advancement opportunities, training, and environment.
β For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software β
π Read
via "Threatpost".
The complaint claims the networking giant knowingly sold bug-riddled software to federal and state governments, that would allow complete network compromise.π Read
via "Threatpost".
Threat Post
For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software
The complaint claims the networking giant knowingly sold bug-riddled software to federal and state governments, that would allow complete network compromise.
π On Sharing Data While Maintaining Compliance in the U.K. π
π Read
via "Subscriber Blog RSS Feed ".
The U.K.'s data protection authority recently issued new draft guidelines to sharing data while maintaining compliance.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
On Sharing Data While Maintaining Compliance in the U.K.
The U.K.'s data protection authority recently issued new draft guidelines to sharing data while maintaining compliance.
β Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger β
π Read
via "Threatpost".
Researchers are warning that unpatched flaws found in the Hickory Smart BlueTooth Enabled Deadbolt allow an attacker with access to a victim's phone to break into their houses.π Read
via "Threatpost".
Threat Post
Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger
Researchers are warning that unpatched flaws found in the Hickory Smart Bluetooth Enabled Deadbolt allow an attacker with access to a victim's phone to break into their houses.
β Brand-New SystemBC Proxy Malware Spotted Using SOCKS5 for Stealth β
π Read
via "Threatpost".
The proxy is being distributed by the RIG and Fallout exploit kits.π Read
via "Threatpost".
Threat Post
Brand-New SystemBC Proxy Malware Spotted Using SOCKS5 for Stealth
The proxy is being distributed by the RIG and Fallout exploit kits.