β Donβt let the crooks βborrowβ your home router as a hacking server β
π Read
via "Naked Security".
Crooks don't have to break *into* your network to benefit - they can bounce *off* it so you take the blame and look like a hacker yourself.π Read
via "Naked Security".
Naked Security
Donβt let the crooks βborrowβ your home router as a hacking server
Crooks donβt have to break *into* your network to benefit β they can bounce *off* it so you take the blame and look like a hacker yourself.
π How the Air Force used a bug bounty program to hack its own cloud server π
π Read
via "Security on TechRepublic".
The Air Force paid out $123,000 to researchers who found vulnerabilities in the organization's move to the cloud. Here's why.π Read
via "Security on TechRepublic".
TechRepublic
How the Air Force used a bug bounty program to hack its own cloud server
The Air Force paid out $123,000 to researchers who found vulnerabilities in the organization's move to the cloud. Here's why.
π Businesses need to patch for BlueKeep to avoid another WannaCry π
π Read
via "Security on TechRepublic".
BitSight is sounding an alarm over the potential for patching to taper off, leaving legacy systems at risk for the potentially potent vulnerability.π Read
via "Security on TechRepublic".
TechRepublic
Businesses need to patch for BlueKeep to avoid another WannaCry
BitSight is sounding an alarm over the potential for patching to taper off, leaving legacy systems at risk for the potentially potent vulnerability.
β Smominru Cryptominer Scrapes Credentials for Half-Million Machines β
π Read
via "Threatpost".
The adversaries have retooled with EternalBlue and credential theft to add a new "access mining" revenue stream.π Read
via "Threatpost".
Threat Post
Smominru Cryptominer Scrapes Credentials for Half-Million Machines
The adversaries have retooled with EternalBlue and credential theft to add a new "access mining" revenue stream.
ATENTIONβΌ New - CVE-2015-9291 (cpanel)
π Read
via "National Vulnerability Database".
cPanel before 11.52.0.13 does not prevent arbitrary file-read operations via get_information_for_applications (CPANEL-1221).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-5297 (pixman)
π Read
via "National Vulnerability Database".
An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.π Read
via "National Vulnerability Database".
β Black Hat 2019: Securityβs Powerful Cultural Transformation β
π Read
via "Threatpost".
Dino Dai Zovi, mobile security lead at Square, discusses ongoing transformation in security's role in the workplace during the keynote.π Read
via "Threatpost".
Threat Post
Black Hat 2019: Securityβs Powerful Cultural Transformation
Black Hat 2019: Security's Powerful Cultural Transformation
π΄ Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says π΄
π Read
via "Dark Reading: ".
Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.π Read
via "Dark Reading: ".
Dark Reading
Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.
π΄ Enterprises Must Be Wary of Ransomware Targeting Network File Shares &Cloud Assets π΄
π Read
via "Dark Reading: ".
New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights β
π Read
via "Threatpost".
From government surveillance to domestic abuse, technology is being used in new and disturbing ways that threaten human rights - how can the security industry fight back?π Read
via "Threatpost".
Threat Post
Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights
From government surveillance to domestic abuse, technology is being used in new and disturbing ways that threaten human rights - how can the security industry fight back?
π΄ North Korean Cyber Ops Reportedly Stole $2B to Fund Weapons Programs π΄
π Read
via "Dark Reading: ".
Unlike many nations, North Korea often engages in cyber operations to generate much-needed cash for the country's coffers. In that respect, its hackers have been extremely successful.π Read
via "Dark Reading: ".
Dark Reading
North Korean Cyber Ops Reportedly Stole $2B to Fund Weapons Programs
Unlike many nations, North Korea often engages in cyber operations to generate much-needed cash for the country's coffers. In that respect, its hackers have been extremely successful.
π΄ Buttigieg Campaign Adds a CISO π΄
π Read
via "Dark Reading: ".
Democratic presidential hopeful Pete Buttigieg's campaign reportedly may be the first to bring a security exec on board.π Read
via "Dark Reading: ".
Dark Reading
Buttigieg Campaign Adds a CISO
Democratic presidential hopeful Pete Buttigieg's campaign reportedly may be the first to bring a security exec on board.
π Hacking for the Greater Good Has Never Been Easier π
π Read
via "Subscriber Blog RSS Feed ".
Experts on a panel at Black Hat stressed Wednesday that there's never been a greater need for hackers and public interest technologists to foster a safe digital society.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Hacking for the Greater Good Has Never Been Easier
Experts on a panel at Black Hat stressed Wednesday that there's never been a greater need for hackers and public interest technologists to foster a safe digital society.
π΄ Researchers Show Vulnerabilities in Facial Recognition π΄
π Read
via "Dark Reading: ".
The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
Researchers Show Vulnerabilities in Facial Recognition
The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.
π΄ Black Hat 2019: Security Culture Is Everyone's Culture π΄
π Read
via "Dark Reading: ".
In his Black Hat USA keynote, Square's Dino Dai Zovi discussed lessons learned throughout his cybersecurity career and why culture trumps strategy.π Read
via "Dark Reading: ".
Dark Reading
Black Hat 2019: Security Culture Is Everyone's Culture
In his Black Hat USA keynote, Square's Dino Dai Zovi discussed lessons learned throughout his cybersecurity career and why culture trumps strategy.
β Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks β
π Read
via "Threatpost".
Academic researchers carry out attacks on high-end commercial devices as well as narrowband IoT sensors.π Read
via "Threatpost".
Threat Post
Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks
Academic researchers carry out attacks on high-end commercial devices as well as narrowband IoT sensors.
β Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack β
π Read
via "Threatpost".
At Black Hat USA 2019, researchers showed how a previously-disclosed flaw on Windows systems that could allow arbitrary code execution could also impact Hyper-V.π Read
via "Threatpost".
Threat Post
Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack
At Black Hat USA 2019, researchers showed how a flaw on Windows systems could allow arbitrary code execution on Hyper-V.
β Microsoft puts another nail in VBScript coffin β
π Read
via "Naked Security".
Listen up, VBScript fans: your favourite scripting language's days are numbered.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door β
π Read
via "Threatpost".
A raft of bugs in six popular models can allow a hacker to wreak havoc on a corporate network.π Read
via "Threatpost".
Threat Post
DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door
A raft of bugs in six popular models can allow a hacker to wreak havoc on a corporate network.
β Black Hat 2019: WhatsApp Users Still Open to Message Manipulation β
π Read
via "Threatpost".
Attack vectors disclosed last year are still fully exploitable, researchers demoed at Black Hat USA 2019.π Read
via "Threatpost".
Threat Post
Black Hat 2019: WhatsApp Users Still Open to Message Manipulation
Attack vectors disclosed last year are still fully exploitable, researchers demoed at Black Hat USA 2019.
β S2 Ep3: Ransomware, surveillance and data theft β Naked Security Podcast β
π Read
via "Naked Security".
Episode 3 of the podcast is now live. This week, host Anna Brading is joined by Paul Ducklin, Mark Stockley and Ben Jones.π Read
via "Naked Security".
Naked Security
S2 Ep3: Ransomware, surveillance and data theft β Naked Security Podcast
Episode 3 of the podcast is now live. This week, host Anna Brading is joined by Paul Ducklin, Mark Stockley and Ben Jones.