π΄ The Best Way To Secure US Elections? Paper Ballots π΄
π Read
via "Dark Reading: ".
Voting machines that do not provide a paper trail or cannot be independently audited should immediately be removed, concludes a new report from the National Academies of Sciences, Engineering, and Medicine.π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
β ThreatList: Attacks on Industrial Control Systems on the Rise β
π Read
via "The first stop for security news | Threatpost ".
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Attacks on Industrial Control Systems on the Rise
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report.
β Dark web sites could be exposed by routine slip-up β
π Read
via "Naked Security".
A simple misconfiguration could expose the IP addresses of dark web sites.π Read
via "Naked Security".
Naked Security
Dark web sites could be exposed by routine slip-up
A simple misconfiguration could expose the IP addresses of dark web sites.
β Firefox finally casts Windows XP users adrift β
π Read
via "Naked Security".
Mozilla's browser is waving goodbye to millions of XP holdouts.π Read
via "Naked Security".
Naked Security
Firefox finally casts Windows XP users adrift
Mozillaβs browser is waving goodbye to millions of XP holdouts.
β Top MacOS App Exfiltrates Browser Histories Behind Usersβ Backs β
π Read
via "The first stop for security news | Threatpost ".
A macOS App called Adware Doctor blocks ads, but shareβs user browser history with a China-based domain.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Top MacOS App Exfiltrates Browser Histories Behind Usersβ Backs
A macOS App called Adware Doctor blocks ads, but shares user browser history with a China-based domain.
β Teen hacker admits to SWATting schools, airline flight β
π Read
via "Naked Security".
The teenager made bomb threats to schools, and to a flight between the UK and San Francisco while it was in mid-air.π Read
via "Naked Security".
Naked Security
Teen hacker admits to SWATting schools, airline flight
The teenager made bomb threats to schools, and to a flight between the UK and San Francisco while it was in mid-air.
β Threat Actors Eyeing IQY Files To Peddle Malspam β
π Read
via "The first stop for security news | Threatpost ".
The Necurs Botnet, DarkHydrus and other threat actors are turning to the inconspicuous files.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Threat Actors Eyeing IQY Files To Peddle Malspam
The Necurs Botnet, DarkHydrus and other threat actors are turning to the inconspicuous files.
β Former NASA contractor arrested on charges of sextorting seven women β
π Read
via "Naked Security".
Richard Gregory Bauer allegedly weaseled private information out of the women on Facebook by pretending to be working on a class project.π Read
via "Naked Security".
Naked Security
Former NASA contractor arrested on charges of sextorting seven women
Richard Gregory Bauer allegedly weaseled private information out of the women on Facebook by pretending to be working on a class project.
β Threatpost News Wrap Podcast For Sept. 7 β
π Read
via "The first stop for security news | Threatpost ".
The Threatpost team breaks down the biggest news from the week ended Sept. 7.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Threatpost News Wrap Podcast For Sept. 7
The Threatpost team breaks down the biggest news from the week ended Sept. 7.
ATENTIONβΌ New - CVE-2016-9040
π Read
via "National Vulnerability Database".
An exploitable denial of service exists in the the Joyent SmartOS OS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFSADDENTRIES when used with a 32 bit model. An attacker can cause a buffer to be allocated and never freed. When repeatedly exploit this will result in memory exhaustion, resulting in a full system denial of service.π Read
via "National Vulnerability Database".
π΄ The Role of Incident Response in ICS Security Compliance π΄
π Read
via "Dark Reading: ".
The data-driven nature of IR can provide many of the reporting requirements governing industrial control system safety, finance, consumer privacy, and notifications.π Read
via "Dark Reading: ".
Darkreading
The Role of Incident Response in ICS Security Compliance
The data-driven nature of IR can provide many of the reporting requirements governing industrial control system safety, finance, consumer privacy, and notifications.
π΄ British Airways Issues Apology for Severe Data Breach π΄
π Read
via "Dark Reading: ".
The airline "is deeply sorry" for its worst-ever cyberattack, which has affected 380,000 customers.π Read
via "Dark Reading: ".
Dark Reading
British Airways Issues Apology for Severe Data Breach
The airline is deeply sorry for its worst-ever cyberattack, which has affected 380,000 customers.
β British Airways Website, Mobile App Breach Compromises 380k β
π Read
via "The first stop for security news | Threatpost ".
The airline said information like name, address and bank card details like CVC code were compromised.π Read
via "The first stop for security news | Threatpost ".
Threat Post
British Airways Website, Mobile App Breach Compromises 380k
The airline said information like name, address and bank card details like CVC code were compromised.
ATENTIONβΌ New - CVE-2017-1115
π Read
via "National Vulnerability Database".
IBM Campaign 9.1, 9.1.2, and 10 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 121153.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-1114
π Read
via "National Vulnerability Database".
IBM Campaign 9.1, 9.1.2, and 10 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 121152.π Read
via "National Vulnerability Database".
π΄ Palestinian, Middle East Targets Hit with New Surveillance Attacks π΄
π Read
via "Dark Reading: ".
'Big Bang' group returns with new campaign after last year's RAT attacks.π Read
via "Dark Reading: ".
Darkreading
Palestinian, Middle East Targets Hit with New Surveillance Attacks
'Big Bang' group returns with new campaign after last year's RAT attacks.
ATENTIONβΌ New - CVE-2016-9044
π Read
via "National Vulnerability Database".
An exploitable command execution vulnerability exists in Information Builders WebFOCUS Business Intelligence Portal 8.1 . A specially crafted web parameter can cause a command injection. An authenticated attacker can send a crafted web request to trigger this vulnerability.π Read
via "National Vulnerability Database".
β Open .Git Directories Leave 390K Websites Vulnerable β
π Read
via "The first stop for security news | Threatpost ".
An exhaustive scan shows hundreds of thousands of websites potentially exposing sensitive data such as database passwords, API keys and so on.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Open .Git Directories Leave 390K Websites Vulnerable
An exhaustive scan shows hundreds of thousands of websites potentially exposing sensitive data such as database passwords, API keys and so on.
π΄ 8 Attack Vectors Puncturing Cloud Environments π΄
π Read
via "Dark Reading: ".
These methods may not yet be on your security team's radar, but given their impact, they should be.π Read
via "Dark Reading: ".
Darkreading
8 Attack Vectors Puncturing Cloud Environments
These methods may not yet be on your security team's radar, but given their impact, they should be.
π΄ TLS 1.3 Won't Break Everything π΄
π Read
via "Dark Reading: ".
The newest version of TLS won't break everything in your security infrastructure, but you do need to be prepared for the changes it brings.π Read
via "Dark Reading: ".
Dark Reading
TLS 1.3 Won't Break Everything
The newest version of TLS won't break everything in your security infrastructure, but you do need to be prepared for the changes it brings.
π΄ Apple (Finally) Removes MacOS App Caught Stealing User Browser Histories π΄
π Read
via "Dark Reading: ".
The fact that the app likely has been exfiltrating data for years is "rather f#@&'d" up, says the security researcher who reported the issue to Apple one month ago.π Read
via "Dark Reading: ".
Dark Reading
Apple (Finally) Removes MacOS App Caught Stealing User Browser Histories
The fact that the app likely has been exfiltrating data for years is rather f#@&'d up, says the security researcher who reported the issue to Apple one month ago.