π΄ New Domains: A Wide-Open Playing Field for Cybercrime π΄
π Read
via "Dark Reading: ".
As bad actors increasingly exploit new domains for financial gain and other nefarious purposes, security teams need to employ policies and practices to neutralize the threat in real time. Here's why and how.π Read
via "Dark Reading: ".
Darkreading
New Domains: A Wide-Open Playing Field for Cybercrime
As bad actors increasingly exploit new domains for financial gain and other nefarious purposes, security teams need to employ policies and practices to neutralize the threat in real time. Here's why and how.
π Despite risks, only 38% of CEOs are highly engaged in cybersecurity π
π Read
via "Security on TechRepublic".
Business leaders believe AI and IoT will seriously impact their security plan, but they're unsure how to invest resources to defend against new threats.π Read
via "Security on TechRepublic".
TechRepublic
Despite risks, only 38% of CEOs are highly engaged in cybersecurity
Business leaders believe AI and IoT will seriously impact their security plan, but they're unsure how to invest resources to defend against new threats.
β ThreatList: Microsoft IIS Sees Triple-Digit Spike in Cyberattack Volume β
π Read
via "The first stop for security news | Threatpost ".
Most of the attacks originated in China.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Microsoft IIS Sees Triple-Digit Spike in Cyberattack Volume
Most of the attacks originated in China.
β Google+ Privacy Snafu Leaves a Cloud Over the Tech Landscape β
π Read
via "The first stop for security news | Threatpost ".
Google was caught not disclosing a potential data breach -- leaving questions as to whether a lack of transparency is the new normal.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Google+ Privacy Snafu Leaves a Cloud Over the Tech Landscape
Google was caught not disclosing a potential data breach β leaving questions as to whether a lack of transparency is the new normal.
β How Shared Pools of Cloud Computing Power Are Changing the Way Attackers Operate β
π Read
via "The first stop for security news | Threatpost ".
Cloud computing is creating new challenges among security professionals as attackers embrace the "as-a-service model", giving unsophisticated cybercriminals a leg up in carrying out attacks.π Read
via "The first stop for security news | Threatpost ".
Threat Post
How Shared Pools of Cloud Computing Power Are Changing the Way Attackers Operate
Cloud computing is creating new challenges among security professionals as attackers embrace the βas-a-service modelβ, giving unsophisticated cybercriminals a leg up in carrying out attacks.
π΄ DoD Weapon Systems Contain Security Vulnerabilities π΄
π Read
via "Dark Reading: ".
GAO report outlines challenges for the US Department of Defense to handle security flaws in weapon systems.π Read
via "Dark Reading: ".
Dark Reading
DoD Weapon Systems Contain Security Vulnerabilities
GAO report outlines challenges for the US Department of Defense to handle security flaws in weapon systems.
π΄ Lessons Learned from the Facebook Breach: Why Logic Errors Are So Hard to Catch π΄
π Read
via "Dark Reading: ".
By ensuring that each layer of protection scours an application for unintended uses, you can find the flaws before the bad guys do.π Read
via "Dark Reading: ".
Darkreading
Lessons Learned from the Facebook Breach: Why Logic Errors Are So Hard to Catch
By ensuring that each layer of protection scours an application for unintended uses, you can find the flaws before the bad guys do.
β Slideshow: Intel from Virus Bulletin 2018 β
π Read
via "The first stop for security news | Threatpost ".
This year's Virus Bulletin conference featured top-tier research from some of the world's best threat intelligence experts.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Slideshow: Intel from Virus Bulletin 2018
This yearβs Virus Bulletin conference featured top-tier research from some of the worldβs best threat intelligence experts.
β New Ninth-Gen Intel CPUs Shield Against Some Spectre, Meltdown Variants β
π Read
via "The first stop for security news | Threatpost ".
New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants.π Read
via "The first stop for security news | Threatpost ".
Threat Post
New Ninth-Gen Intel CPUs Shield Against Some Spectre, Meltdown Variants
New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants.
β New Ninth-Gen Intel CPUs Shield Against Some Spectre, Meltdown Variants β
π Read
via "The first stop for security news | Threatpost ".
New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants.π Read
via "The first stop for security news | Threatpost ".
Threat Post
New Ninth-Gen Intel CPUs Shield Against Some Spectre, Meltdown Variants
New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants.
π΄ Microsoft Fixes Privilege Escalation 0Day Under Active Attack π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
Perimeter recent news | Dark Reading
Explore the latest news and expert commentary on Perimeter, brought to you by the editors of Dark Reading
π΄ Constructing the Future of ICS Cybersecurity π΄
π Read
via "Dark Reading: ".
As industrial control systems are connected to the cloud and the IoT, experts discuss security challenges.π Read
via "Dark Reading: ".
Dark Reading
Constructing the Future of ICS Cybersecurity
As industrial control systems are connected to the cloud and the IoT, experts discuss security challenges.
β Microsoft Patches Zero-Day Under Active Attack by APT β
π Read
via "The first stop for security news | Threatpost ".
A zero-day vulnerability tied to the Windowβs Win32k component is under active attack, warns Microsoft.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Microsoft Patches Zero-Day Under Active Attack by APT
A zero-day vulnerability tied to the Windowβs Win32k component is under active attack, warns Microsoft.
π΄ Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Darkreading
Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods
The trend underscores the need for organizations of all sizes to be prepared to detect and respond to threats faster, CrowdStrike says.
π΄ Git Gets Patched for Newly Found Flaw π΄
π Read
via "Dark Reading: ".
A vulnerability in Git could allow an attacker to place malicious, auto-executing code in a sub-module.π Read
via "Dark Reading: ".
Dark Reading
Git Gets Patched for Newly Found Flaw
A vulnerability in Git could allow an attacker to place malicious, auto-executing code in a sub-module.
β Airport mislays worldβs most expensive USB stick β
π Read
via "Naked Security".
In October 2017, a member of the public found a USB stick containing a trove of data on security systems and procedures at one of the worldβs busiest airports.π Read
via "Naked Security".
Naked Security
Airport mislays worldβs most expensive USB stick
In October 2017, a member of the public found a USB stick containing a trove of data on security systems and procedures at one of the worldβs busiest airports.
β Cyber tormentor leaves a trail that lands him 17.5 years β
π Read
via "Naked Security".
Ryan S. Lin pleaded guilty to cyberstalking, distribution of child abuse imagery, hoax bomb threats, computer fraud and abuse, and ID theft.π Read
via "Naked Security".
Naked Security
Cyber tormentor leaves a trail that lands him 17.5 years
Ryan S. Lin pleaded guilty to cyberstalking, distribution of child abuse imagery, hoax bomb threats, computer fraud and abuse, and ID theft.
β 291 records breached per second in first half of 2018 β
π Read
via "Naked Security".
Over 4.5 billion data records were breached in the first half of this year, according to Gemalto's Breach Level Index released this week.π Read
via "Naked Security".
β Google+ wakes up to what the rest of us already knew β
π Read
via "Naked Security".
Google's closing down the platform nobody uses and might face a class-action lawsuit over a G+ spawned breach it took 7 months to report.π Read
via "Naked Security".
Naked Security
Google+ wakes up to what the rest of us already knew
Googleβs closing down the platform nobody uses and might face a class-action lawsuit over a G+ spawned breach it took 7 months to report.
β Podcast: Key Takeaways For DevOps in BSIMM9 β
π Read
via "The first stop for security news | Threatpost ".
From supply chain to orchestration tools, here are the new trends that DevOps should pay attention to in this year's BSIMM report.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Podcast: Key Takeaways For DevOps in BSIMM9
From supply chain to orchestration tools, here are the new trends that DevOps should pay attention to in this yearβs BSIMM report.