ATENTIONβΌ New - CVE-2015-5297 (pixman)
π Read
via "National Vulnerability Database".
An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.π Read
via "National Vulnerability Database".
β Black Hat 2019: Securityβs Powerful Cultural Transformation β
π Read
via "Threatpost".
Dino Dai Zovi, mobile security lead at Square, discusses ongoing transformation in security's role in the workplace during the keynote.π Read
via "Threatpost".
Threat Post
Black Hat 2019: Securityβs Powerful Cultural Transformation
Black Hat 2019: Security's Powerful Cultural Transformation
π΄ Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says π΄
π Read
via "Dark Reading: ".
Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.π Read
via "Dark Reading: ".
Dark Reading
Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.
π΄ Enterprises Must Be Wary of Ransomware Targeting Network File Shares &Cloud Assets π΄
π Read
via "Dark Reading: ".
New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights β
π Read
via "Threatpost".
From government surveillance to domestic abuse, technology is being used in new and disturbing ways that threaten human rights - how can the security industry fight back?π Read
via "Threatpost".
Threat Post
Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights
From government surveillance to domestic abuse, technology is being used in new and disturbing ways that threaten human rights - how can the security industry fight back?
π΄ North Korean Cyber Ops Reportedly Stole $2B to Fund Weapons Programs π΄
π Read
via "Dark Reading: ".
Unlike many nations, North Korea often engages in cyber operations to generate much-needed cash for the country's coffers. In that respect, its hackers have been extremely successful.π Read
via "Dark Reading: ".
Dark Reading
North Korean Cyber Ops Reportedly Stole $2B to Fund Weapons Programs
Unlike many nations, North Korea often engages in cyber operations to generate much-needed cash for the country's coffers. In that respect, its hackers have been extremely successful.
π΄ Buttigieg Campaign Adds a CISO π΄
π Read
via "Dark Reading: ".
Democratic presidential hopeful Pete Buttigieg's campaign reportedly may be the first to bring a security exec on board.π Read
via "Dark Reading: ".
Dark Reading
Buttigieg Campaign Adds a CISO
Democratic presidential hopeful Pete Buttigieg's campaign reportedly may be the first to bring a security exec on board.
π Hacking for the Greater Good Has Never Been Easier π
π Read
via "Subscriber Blog RSS Feed ".
Experts on a panel at Black Hat stressed Wednesday that there's never been a greater need for hackers and public interest technologists to foster a safe digital society.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Hacking for the Greater Good Has Never Been Easier
Experts on a panel at Black Hat stressed Wednesday that there's never been a greater need for hackers and public interest technologists to foster a safe digital society.
π΄ Researchers Show Vulnerabilities in Facial Recognition π΄
π Read
via "Dark Reading: ".
The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
Researchers Show Vulnerabilities in Facial Recognition
The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.
π΄ Black Hat 2019: Security Culture Is Everyone's Culture π΄
π Read
via "Dark Reading: ".
In his Black Hat USA keynote, Square's Dino Dai Zovi discussed lessons learned throughout his cybersecurity career and why culture trumps strategy.π Read
via "Dark Reading: ".
Dark Reading
Black Hat 2019: Security Culture Is Everyone's Culture
In his Black Hat USA keynote, Square's Dino Dai Zovi discussed lessons learned throughout his cybersecurity career and why culture trumps strategy.
β Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks β
π Read
via "Threatpost".
Academic researchers carry out attacks on high-end commercial devices as well as narrowband IoT sensors.π Read
via "Threatpost".
Threat Post
Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks
Academic researchers carry out attacks on high-end commercial devices as well as narrowband IoT sensors.
β Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack β
π Read
via "Threatpost".
At Black Hat USA 2019, researchers showed how a previously-disclosed flaw on Windows systems that could allow arbitrary code execution could also impact Hyper-V.π Read
via "Threatpost".
Threat Post
Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack
At Black Hat USA 2019, researchers showed how a flaw on Windows systems could allow arbitrary code execution on Hyper-V.
β Microsoft puts another nail in VBScript coffin β
π Read
via "Naked Security".
Listen up, VBScript fans: your favourite scripting language's days are numbered.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door β
π Read
via "Threatpost".
A raft of bugs in six popular models can allow a hacker to wreak havoc on a corporate network.π Read
via "Threatpost".
Threat Post
DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door
A raft of bugs in six popular models can allow a hacker to wreak havoc on a corporate network.
β Black Hat 2019: WhatsApp Users Still Open to Message Manipulation β
π Read
via "Threatpost".
Attack vectors disclosed last year are still fully exploitable, researchers demoed at Black Hat USA 2019.π Read
via "Threatpost".
Threat Post
Black Hat 2019: WhatsApp Users Still Open to Message Manipulation
Attack vectors disclosed last year are still fully exploitable, researchers demoed at Black Hat USA 2019.
β S2 Ep3: Ransomware, surveillance and data theft β Naked Security Podcast β
π Read
via "Naked Security".
Episode 3 of the podcast is now live. This week, host Anna Brading is joined by Paul Ducklin, Mark Stockley and Ben Jones.π Read
via "Naked Security".
Naked Security
S2 Ep3: Ransomware, surveillance and data theft β Naked Security Podcast
Episode 3 of the podcast is now live. This week, host Anna Brading is joined by Paul Ducklin, Mark Stockley and Ben Jones.
β More than 2m AT&T phones illegally unlocked by bribed insiders β
π Read
via "Naked Security".
The alleged, now indicted ringleader paid more than $1m in bribes to insiders who planted malware and hardware for remote unlocking.π Read
via "Naked Security".
Naked Security
More than 2m AT&T phones illegally unlocked by bribed insiders
The alleged, now indicted ringleader paid more than $1m in bribes to insiders who planted malware and hardware for remote unlocking.
β Twitter may have shared your data with its ad partners without your permission β
π Read
via "Naked Security".
Some user data, such as country and device type, was exposed to some advertisers for over a year.π Read
via "Naked Security".
Naked Security
Twitter may have shared your data with its ad partners without your permission
Some user data, such as country and device type, was exposed to some advertisers for over a year.
π΄ Slow Your Roll Before Disclosing a Security Incident π΄
π Read
via "Dark Reading: ".
Transparency rules, but taking the right amount of time to figure out what happened will go a long way toward setting the record straight.π Read
via "Dark Reading: ".
Darkreading
Slow Your Roll Before Disclosing a Security Incident
Transparency rules, but taking the right amount of time to figure out what happened will go a long way toward setting the record straight.
β Cisco 220 Series Smart Switch owners told to apply urgent patch β
π Read
via "Naked Security".
Businesses running any of Ciscoβs 220 Series Smart Switches have some urgent patching work on their hands.π Read
via "Naked Security".
Naked Security
Cisco 220 Series Smart Switch owners told to apply urgent patch
Businesses running any of Ciscoβs 220 Series Smart Switches have some urgent patching work on their hands.
π΄ WhatsApp Messages Can Be Intercepted, Manipulated π΄
π Read
via "Dark Reading: ".
Check Point security researchers demonstrate how a dangerous security weakness in the messaging application can be abused to spread fake news and carry out online scams.π Read
via "Dark Reading: ".
Dark Reading
WhatsApp Messages Can Be Intercepted, Manipulated
Check Point security researchers demonstrate how a dangerous security weakness in the messaging application can be abused to spread fake news and carry out online scams.