ATENTIONβΌ New - CVE-2013-7475
π Read
via "National Vulnerability Database".
The contact-form-plugin plugin before 3.52 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-6713
π Read
via "National Vulnerability Database".
The job-manager plugin before 0.7.19 for WordPress has multiple XSS issues.π Read
via "National Vulnerability Database".
π΄ Internet Routing Security Initiative Launches Online 'Observatory' π΄
π Read
via "Dark Reading: ".
Mutually Agreed Norms for Routing Security (MANRS) lets network operators and the public view online router incidents worldwide.π Read
via "Dark Reading: ".
Dark Reading
Internet Routing Security Initiative Launches Online 'Observatory'
Mutually Agreed Norms for Routing Security (MANRS) lets network operators and the public view online router incidents worldwide.
π How to change a root password in a Docker image π
π Read
via "Security on TechRepublic".
If you deploy Docker containers based on an official imagine, you might want to set a root password for heightened security.π Read
via "Security on TechRepublic".
TechRepublic
How to change a root password in a Docker image
If you deploy Docker containers based on an official imagine, you might want to set a root password for heightened security.
π Think Tank: Standard Contractual Clauses for International Transfers Should Mirror GDPR π
π Read
via "Subscriber Blog RSS Feed ".
The Centre for Information Policy Leadership issued a lengthy white paper last week highlighting challenges and recommendations around standard contractual clauses (SCCs) for international data transfers.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Think Tank: Standard Contractual Clauses for International Transfers Should Mirror GDPR
The Centre for Information Policy Leadership issued a lengthy white paper last week highlighting challenges and recommendations around standard contractual clauses (SCCs) for international data transfers.
β 22 Critical Flaws Patched in Adobe Photoshop β
π Read
via "Threatpost".
Patched critical flaws in Adobe's Photoshop CC photo editing application enable arbitrary code execution.π Read
via "Threatpost".
Threat Post
22 Critical Flaws Patched in Adobe Photoshop
Patched critical flaws in Adobe's Photoshop CC photo editing application enable arbitrary code execution.
π΄ Barracuda Buys Bot-Battling Tech from InfiSecure π΄
π Read
via "Dark Reading: ".
The intellectual property acquired will add to Barracuda's bot-detection capabilities.π Read
via "Dark Reading: ".
Darkreading
Barracuda Buys Bot-Battling Tech from InfiSecure
The intellectual property acquired will add to Barracuda's bot-detection capabilities.
β Shades of BlueKeep: Wormable Remote Desktop Bugs Top August Patch Tuesday List β
π Read
via "Threatpost".
The flaws allow remote code-execution without user interaction or authentication, and are highly exploitable.π Read
via "Threatpost".
Threat Post
Shades of BlueKeep: Wormable Remote Desktop Bugs Top August Patch Tuesday List
The flaws allow remote code-execution without user interaction or authentication, and are highly exploitable.
π΄ Microsoft Patches Wormable RCE Vulns in Remote Desktop Services π΄
π Read
via "Dark Reading: ".
Similar to the now-patched 'BlueKeep' vulnerability, two flaws fixed today could let malware spread across vulnerable computers.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π΄ Orgs Doing More App Security Testing but Fixing Fewer Vulns π΄
π Read
via "Dark Reading: ".
On average, US organizations took nearly five months to fix critical vulnerabilities according to WhiteHat Security's annual vulnerability report.π Read
via "Dark Reading: ".
Dark Reading
Orgs Doing More App Security Testing but Fixing Fewer Vulns
On average, US organizations took nearly five months to fix critical vulnerabilities according to WhiteHat Security's annual vulnerability report.
π΄ Does Personality Make You Vulnerable to Cybercrime? π΄
π Read
via "Dark Reading: ".
A new study explores the connections between personality traits and susceptibility to different cyberattacks.π Read
via "Dark Reading: ".
Darkreading
Does Personality Make You Vulnerable to Cybercrime?
A new study explores the connections between personality traits and susceptibility to different cyberattacks.
π΄ Apple's New Bounty Program Has Huge Incentives, Big Risks π΄
π Read
via "Dark Reading: ".
Industry observers applaud the program's ability to find exploits but fear unintended consequences.π Read
via "Dark Reading: ".
Darkreading
Apple's New Bounty Program Has Huge Incentives, Big Risks
Industry observers applaud the program's ability to find exploits but fear unintended consequences.
ATENTIONβΌ New - CVE-2014-10375
π Read
via "National Vulnerability Database".
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.π Read
via "National Vulnerability Database".
β Coinbase explains background to June zero-day Firefox attack β
π Read
via "Naked Security".
A recent, highly targeted attack on cryptocurrency exchange Coinbase offers a glimpse into how sophisticated phishing attacks can be.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ You Gotta Reach 'Em to Teach 'Em π΄
π Read
via "Dark Reading: ".
As threats continue to evolve and cybercriminals become more sophisticated, organizations that lack a mature security awareness and training program place themselves at serious risk.π Read
via "Dark Reading: ".
Dark Reading
You Gotta Reach 'Em to Teach 'Em
As threats continue to evolve and cybercriminals become more sophisticated, organizations that lack a mature security awareness and training program place themselves at serious risk.
β Fortnite World Cup champion and family swatted while live streaming β
π Read
via "Naked Security".
"They come in with guns, bro. They literally pulled up, holy sh*t."π Read
via "Naked Security".
Naked Security
Fortnite World Cup champion and family swatted while live streaming
βThey come in with guns, bro. They literally pulled up, holy sh*t.β
β TikTok Scammers Cash In On Adult Dating, Impersonation Tricks β
π Read
via "Threatpost".
Scammers are profiting from TikTok's younger audience with adult dating and account impersonation tricks.π Read
via "Threatpost".
Threat Post
TikTok Scammers Cash In On Adult Dating, Impersonation Tricks
Scammers are profiting from TikTok's younger audience with adult dating and account impersonation tricks.
β Norman Cryptominer Employs Sophisticated Obfuscation Tactics β
π Read
via "Threatpost".
A new XMRig Monero cryptominer stands apart, despite its non-flashy name.π Read
via "Threatpost".
Threat Post
Norman Cryptominer Employs Sophisticated Obfuscation Tactics
A new XMRig Monero cryptominer stands apart, despite its non-flashy name.
β Patch time! Microsoft warns of new worm-ready RDP bugs β
π Read
via "Naked Security".
Microsoft's Patch Tuesday bought some bad news yesterday: more wormable RDP vulnerabilities, this time affecting Windows 10 users.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Facebook Records User Audio, Sparking Privacy Questions β
π Read
via "Threatpost".
Hundreds of contractors reportedly were hired to transcribe Messenger voice chats in order to test the accuracy of an AI algorithm -- raising questions about what Facebook does with the data.π Read
via "Threatpost".
Threat Post
Facebook Records User Audio, Sparking Privacy Questions
Hundreds of contractors reportedly were hired to transcribe Messenger voice chats in order to test the accuracy of an AI algorithm β raising questions about what Facebook does with the data.
π΄ Microservices Flip App Security on Its Head π΄
π Read
via "Dark Reading: ".
With faster application deployment comes increased security considerations.π Read
via "Dark Reading: ".
Dark Reading
Microservices Flip App Security on Its Head
With faster application deployment comes increased security considerations.